ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Tips On How To Secure The Content Of Your Mobile Phone

Updated on October 22, 2011

Mobile phones have undoubtedly become an established necessity in today's world. As the use of this amazing gadget becomes common, it gives rise to issues related to privacy and security which are often underestimated by most of the users. Think about the amount of personal information a handset has got in form of images, messages, notes, reminders etc., plus that of other people in form of address book or contact list. No one would like such information to fall in wrong hands and, therefore, it is essential to adopt some safe practices while using mobile phone.

Start with the very basics. Make effective use of the built-in functions of your handset. Many handsets have a default feature to auto-save the sent SMS - this is an unnecessary exposure which can easily be done away with. Once this is done, take a look at other message folders such as drafts, saved and outbox. Often, such folders contain long forgotten items if not purged in time. Before sharing a mobile phone, ensure that all such folders are empty and make a habit of emptying the inbox several times a day.

Another similar item that keeps accumulating data is call lists. It is essential to empty out all the lists at the time of selling a phone. You should also know where the contacts are saved. Most of the users are not aware of the number of contacts on their phone and SIM memory. Although there is an option to move contacts between these two storage areas, it is rarely used for consolidation.

Preferably, contacts should be saved on the SIM only, since this makes it easy to share phone without worrying about left over information besides making it simpler to backup data to PC, or move it between phones and restore in case the phone meets an accident. And those who prefer contact name security, renaming obvious contacts with mnemonics or pseudonyms is a good technique to hide actual names of confidential contacts.

The next area to watch out for is application security - particularly when using third-party internet applications that may save username and/or password. It is not uncommon to find saved passwords in applications such as instant messengers, Gmail applet or other email applications and even online trading applications. For built-in applications such as notes, secured notes and wallets, ensure that passwords are not very easy to guess and information is not self-explanatory. For example, instead of ATM PIN 2345, use 2031425 without captions. It has 0, 1 and 2 intertwined between the actual numbers. Or use any other easy to remember combination, which is difficult to detect. This is essential to ward off both wallet and phone compromise.

Also, review how the available features are used. Are there family snaps saved in the phone instead of backed up at home PC? Is connectivity, such as Infra-red, Bluetooh or WiFi, on? Of particular concern is Bluetooth given its widespread use. It is common to receive connection request from unknown devices while in mobile markets where infected handsets are scanning the area, or even in apartment complexes from an adjacent floor or room. Safe practices include keeping connectivity options off by default, or keeping handsets in non-discoverable mode so that only already paired devices can connect. Also, ensure that the list of paired devices is revisited once in a while to ascertain that only known ones are present there.

Exploring all the features of a mobile phone - that is, going one by one in each menu and sub-menu item - is an essential step to know what security features are present, such as various types of call restrictions, number screening and passwords. If necessary, implement a phone start-up password. But before that, make sure that you know the PUK code since three unsuccessful log-in attempts can lock the phone. If the SIM jacket is kept at a safe place, it is not a problem to read the PUK from it for pre-paid accounts. In case of post-paid and pre-paid accounts where the SIM jacket is lost or PUK code is unavailable, one can contact the customer service department of the respective cellular company. Therefore, note it down in advance, but do not save it in phone itself. For those who have smart phones and the latest versions of Symbian or Windows Mobile, a specialised and trusted anti-virus like Kaspersky and Symantec helps.

Roving bug

Imagine being ordered to remove cell phone batteries in a high-level corporate meeting to avoid hidden bugs! The reason is roving bug - a controversial and not-yet-officially-proven hidden bugging facility that can allegedly turn a handset into a microphone without the owner's knowledge. This effectively turns a cell phone - apparently idle or even turned off - into a remote listening device. Although the manufactures and service providers internationally are not very enthusiastic about disclosing details about possibly and implementation of roving bug, the topic has found its way in newspapers at times and has been of great interest.

Security, while using mobile devices is largely a trade with usability and accepted practices and habits, like keeping self-portrait or that of the significant-other as wallpaper. Nonetheless, it is a fact that if the device is compromised, the amount of information at stake is large. But this is not taken seriously enough as yet. To ensure that our electronic footprints do not become an easy target, a review of phone usage habits is required along with keeping up-to-date with latest security threats, learning from others' mistakes and finally, developing a security-oriented mindset that tries to pierce through the ‘normal' usage pattern to identify what can go wrong and how!

Comments

    0 of 8192 characters used
    Post Comment

    No comments yet.

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)