ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

How to increase your Smartphone security?

Updated on November 18, 2015

Smartphones and us

It is hard to imagine life without smartphones. When Smartphones were first introduced, features like calculators, calendars and notepads seemed amazing. Today people use them for all kind of reasons – calling, browsing, streaming videos, playing games etc. Our phones are getting larger in size and more powerful every year. It won’t come as a surprise if one day laptops and desk PC-s would disappear, leaving an army of these multipurpose mini-computers in our pockets. We trust them with our most precious information – personal pictures, text messages, and emails. But are they really worth our trust?

Security concerns

Smartphones are mini computers, even though they are not as powerful as some modern PC-s. Consequently, there is a high interest in breaking these easy-to-crack devices. The main concern is data confidentiality – making sure your personal information will not get in the wrong hands. Due to its architecture smartphones are both secure and vulnerable to malware and other threats. For example, Apple iOS offers good protection against malware attacks but is only moderately good at isolating applications. Android, on the other hand, runs applications in full isolation, which restricts their ability to inappropriately interact with sensitive systems, as well as other applications.

Human factor

Human factor is important in all stages of security threats. It is often the user, who allows certain attacks to take place and compromises device security measures. A lot of effort has been made to increase user awareness on the topic of information security. Importance of such awareness is especially high in case of BYODs (Bring Your Own Device), when companies allow employees to access network with their own devices. To name a few, issues such as attacks via wireless networks, malware and Trojans, spreading through downloaded games or stolen devices have huge potential risks. It is therefore understandable why network administrators are under high pressure in dealing with all those potentially infected devices on their network.

Phones are actually safe

Analysis of different sources has shown that Android phones are preferred much more as targets, mostly because their number of users is higher than iOS users. Thanks to sandbox architecture of Android and process isolation the risk of infection is minimized. However, users tend to compromise security by installing third-party applications like games without taking notice of information being required and accessed by particular application. We cannot realistically talk about data confidentiality until users are continuing to ignore such threats. The best advice that could be given in such circumstances – being sceptical about installing another third-party application.

Nothing is FREE

It was surprising to find out how many threats are out there that most users do not even know about. Especially popular among many users is free Wireless Internet offered almost everywhere we go. Countless smartphones connect to these networks every day without knowing of potential threats hidden behind this FREE service. Assuming your phone is by default secure creates additional problems – users often do not enable passwords or use the same password for all their accounts. In case phone is stolen there is no way of protecting the data on it.

Preventive safeguards

Preventive safeguards should be implemented in every device and any network, where information contains sensitive data, like personal pictures, passwords, bank transactions etc. These include using antivirus software, verifying every application installed, monitoring device performance and keeping system up-to-date. Ideally, risk analysis should be done in order to identify main threats for certain networks and users (e.g. in one company). Considering it is highly time and resource consuming, there is no better way than making sure only company-owned devices with restricted user rights (not allowing install third-party applications) are allowed to be used on the network.

Final note

Mobile security is a relatively new issue – smartphones have gained in popularity during last 5-7 years. However, the speed of growth and development is impressive, latest phone today will be out of date already in about 6 months. That is why security threats and attacks are only relevant to today’s mobile phones. In order to meet the challenges of future generation security issues we need to think ahead of our time and predict potential future threats.

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)