Posted On: August 16, 2022 by Peoples Bank of Kankakee County in: Cybersecurity
We use our mobile devices for just about everything in both our work and personal lives. We browse the internet, use apps, and email daily. It is now more important than ever for us to educate ourselves and actively take steps to ensure our cellphone is secure. Otherwise, we are making ourselves vulnerable to phishing, hacking, and leaking large amounts of valuable data.
Strong Passwords Boost Security
Begin securing your phone with that crucially strong password. A strong password should be unique, nothing shorter that 15 characters, and combine upper-case and lower-case letters, numbers, and symbols. Fingerprints, facial recognition, or eye recognition will strengthen security. It is wise to also have your apps password protected to add another layer of security.
Another security booster is two-factor authentication. With two-factor authentication, you will first enter a password. Next you will receive a code via email or text message to enter for account access. This is a great option for apps you use less frequently or apps that store large amounts of personal data.
Avoid Public Wi-Fi Networks
We all enjoy the convenience of internet connection wherever we go. Unfortunately, it is a good practice to avoid connecting to public Wi-Fi networks. These open networks bring many threats to your device because they are visible to anyone on that network. If you absolutely must have internet access, utilize your data plan, or install a VPN to keep your phone secure and hidden from open networks.
Important Reminder: Is your home internet or hotspot password protected? If not, stop and do it now!
Update Your Applications and Devices
It is a good cybersecurity practice to update your applications and device software often. If you get a notification something needs an update, do it as soon as possible. When you install an application, read through the user permissions to know what it needs access to. Only give permissions when you are running the app, not always. If there is an app you are not using, be sure to close it, shut off those permissions, or delete the app altogether. If you don’t intend to use the app for video or photos but it asks for it, this may be a red flag. This may be a good app to avoid.
We all depend greatly on our mobile devices. Therefore, it is important we have good practices in place to combat cyber threats. Incorporate these tips or use them as a checklist to ensure your device and data are secure.