Mobile devices like smartphones and tablets are basically small portable computers. The advantages are: small, stores lots of information, connects with everything (i.e., free WiFi, Bluetooth, wireless, cellular networks, etc.), time stamps and GPS tags, video and audio recording, microphone and camera, accepts authorized and unauthorized, applications, etc. Just like your computer at home they can be hacked, infected with a virus and, if unsecured, provide access to your personal information. Small and portable allows for easy loss, thief and destruction – water, fire, crushing, dropping, etc. High cost and sensitive information leads to increase desirability by criminal elements.
The risk of mobile malware is real: hackers can steal money and sensitive information, use these devices as bots and even spy on your activities. Unfortunately, most people have not realised the importance of protecting their mobile devices from such attacks
Protect Your Mobile Device
Keep your mobile device with you at all times, treat it like your wallet or purse. Can be used to access email, company, financial, and social media accounts. Subscriber Identity Module (SIM) card can be used make telephone charges to your accounts.
How and Where to Use
Secure Your Mobile Device
Secure Your Information
Using applications (apps)
Many apps collect and transmit personal information, location, contacts and messages. Set app permissions during installation. To avoid downloading hoax or malicious software use apps from reputable providers and review user feedback.