Five Ways to Mitigate Cyber Threats on Your Smartphone

How to Keep Your Smartphone Data Safe

It’s no surprise that most of us use a smartphone for both business and personal use. How many of us really think about the potential cyber threats on our smartphones that exist on day-to-day basis?

Some interesting stats around average use of smartphones:

  • The average American adult (18+) spends two hours and fifty-one minutes on their smartphone every day, according to a comScore,Inc. report. That’s roughly 86 hours a month. This just shows that we are definitely using our smartphones in every facet of our daily life.
  • The average person spends one hour and 56 minutes on the top five social media platforms and according to comScore, 66% of these are done via smartphones. In case you are curious, the top social platforms based on the ComScore data is YouTube, Facebook, Snapchat, Instagram and Twitter.

The increasing amount of time people spend on their smartphones proves that cyber criminals are hiding in the background to find vulnerabilities and ways to steal your personal and/or business data.

How Can You Mitigate Potential Threats?

Here are five recommended ways to mitigate these threats:

1. Keep your software updated directly from your cell phone provider.

Based on experience, we often hesitate to do software updates. Take the time to do the recommended software updates as they become available on both on your smartphone and workstations. Keep in mind that these updates keep you safe from known bugs and potential security holes.

2. Be careful what apps you install.

Do you know about the app that you’re installing? Will the app require granting permissions to access your files, camera and keyboard? You can potentially grant a bad actor access to confidential information such as financial or other personal information.

3. Use of public Wi-Fi.

Let’s face it, how many of us when visiting a local coffee shop or other place of business access the free public Wi-Fi? Well, getting on public Wi-Fi is opening yourself up to security risks. A hacker can access the open Wi-Fi network see what you’re doing online. Ever hear of rogue Wi-Fi? Rogue Wi-Fi mimics a legitimate hotspot tricking you into thinking you are on legitimate hotspot. The cyber thieves now have access to your computer and information. To be safe, don’t use free Wi-Fi unless you have a remote Virtual Private Network (VPN) which is included in the Jungle Disk Network Threat Protection services. When connected to the VPN, all traffic is routed through a private network and encrypted so bad actors won’t have access to your data.

4. Place Wi-Fi and Bluetooth settings on off when not in use.

In general, it’s best to turn off Wi-Fi, Bluetooth and location services when not in use because some apps can use location data without you knowing it. Both Bluetooth and location services are constantly transmitting information so hackers have a way to gain access to steal information from your device.

5. Don’t lose your smartphone.

Don’t leave your phone unlocked and unattended. There’s a lot of information on those devices so keep it in a safe and secure place.

We all utilize our smartphones for storing and accessing private personal and business information. Protect your privacy and make wise choices when using your smartphone on public networks. If you would like to test the security of your home or business network, take a free threat assessment here.

Protect Your Business Data

We are passionate about helping our customers protect their data. We want you to use Jungle Disk to protect yours. Click on Sign Up to get started. It takes less than 5 minutes!

Sign Up