How Are You Securing Your Cell Phone Data?
4 min read
We all want our information protected. In fact, the laws have been on the side of consumer protection because people in the tech world understood the implications of data leaks from mobile devices. The FCC has even made rules about what can and cannot be shared, but when it comes to security, we believe protection is a cooperative effort between:
- Our own behaviors
- Manufacturer design
- Governmental regulations
There are times where the behaviors of individuals have thankfully exposed their data. These are cases where crimes have been solved because the person using the technology didn’t protect their data. In those cases, we are glad there was a mistake, but for this article, we are going to assume our readers are law-abiding citizens who want to keep their data protected and ensure important information isn’t leaked via mobile devices.
Here at Novatech we have years of experience in blocking these potential security leaks. We will cover how you can maintain privacy in your personal life and also for your business.
The Threat from Hackers
It seems like everyone today has an Android smartphone or some type of iOS device. Few people are thinking about phone security though. It is common to connect to public wi-fi with your device and start browsing. This can be a security threat. Before your request at your local coffee shop gets to the router, it can be hijacked or intercepted. Hackers send out a beacon and have your laptop connect to them instead of the real router. You will still be able to browse the web as they forward your traffic on for you, but they will be watching the whole time. They have specialized software that specifically will be looking for credit card information and banking credentials to drain your account.
Bottom line, if your traffic is intercepted, you are unlikely to even know it happened until you get your next credit card statement and see charges for items you never ordered. Even at this point, it is unlikely you will know what happened, and you could go back to the same coffee shop in two months with a new card and have the same issue happen again.
The hackers may even push mobile malware to your machine or a malicious app to make sure they can continue to get into your phone long after you leave the store. Applications like Avast mobile security can help protect against these attacks, including phishing attacks that target your smartphone. Even so, mobile security needs multiple layers.
Beyond antivirus software like McAfee mobile security or other types of endpoint security, there are other ways to protect your sensitive data when you are roaming or far away from your secure home network.
The VPN Solution
Worried about disclosing personal data while on a business trip? Your personal information on your device or an app can be safe if you use a virtual private network. Known by the acronym VPN, these create an encrypted tunnel between your phone and the resources you need to access.
Internet security is all about creating layers of security. Between encrypting your data and also locking down your device with applications looking for malware, you will be much more protected.
Advanced Man-in-the-Middle Attacks
Another thing to think about would be man-in-the-middle attacks. Just as the name implies, attacks get in the middle of your connection to a trusted source. This goes beyond controlling the flow of traffic going to a router. For a little over a thousand dollars, attacks can create an IMSI catcher also known as a “stingray.” This pretends to be a cell phone tower! All your SMS messages are then there for the taking along with your location and timestamps. If you are a C-Suite executive, this can be devastating for your company. You can’t protect against this with touch id or antivirus software. The IMSI catcher will bypass most safeguards including security updates. What should you do to stay safe?
Moving to a Code Division Multiple Access (CDMA) network will help. IMSI data will not be present if you are not using a global-system-for-mobile (GSM) communication network. You can also try swapping out your phone entirely. Go with a phone that can’t utilize the 2G network, which is older technology that is at risk. If you are serious about security, consider getting a special encrypted phone.
These cryptophones won’t offer as many options, but you harden your security to help ensure your data will not be at risk.
The Novatech Managed Office Concept
Security for business technology is increasingly a concern for most companies. As more people move to the cloud and rely on technology just to function, it is more important than ever that the company doing your IT understands all of this. The solution is the Managed Office concept from Novatech.
Why have a separate provider for printers, IT support, and security? Roll everything into one relationship, so you only have to worry about working with one company. If you are curious about the Managed Office concept, give us a call today. We can go over your current needs and figure out a way to secure both your mobile devices as well as your printers and computers.
Speak with a sales professional today to see what we can do for you!