19.08.2013

Safe Use of Mobile Communications. Recommendations

All the users of Asan Imza and our web-pages and Facebook tabs are invited to go through the below recommendations on safe use of smartphones.
There is nothing new or sophisticated about safe use of mobile communication but very often users neglect even simple options that could protect their mobile phones. Safe use of mobile communication and protection of information stored in them is as important as saving your purse.
Please have a look with 9 guidelines below and share them with your friends!

The modern mobile communications, whether it is a smartphone or tablet are intrinsically miniature computers where we keep our electronic correspondence, documents, photos and video.
At the same time the mobile device provides access to web sites, social network, e-shops distributing various applications, movies and music channels. Competence in safe use of mobile communication and effective protection of access to information stored in it is as important as ability to use and keep own purse safe.

All the users of Asan Imza and our web-pages and Facebook tabs are invited to go through the below recommendations on safe use of smartphones.
There is nothing new or sophisticated about safe use of mobile communication but very often users neglect even simple options that could protect their mobile phones. Safe use of mobile communication and protection of information stored in them is as important as saving your purse.
Please have a look with 9 guidelines below and share them with your friends!

The modern mobile communications, whether it is a smartphone or tablet are intrinsically miniature computers where we keep our electronic correspondence, documents, photos and video.
At the same time the mobile device provides access to web sites, social network, e-shops distributing various applications, movies and music channels. Competence in safe use of mobile communication and effective protection of access to information stored in it is as important as ability to use and keep own purse safe.

1. Code secured screen locking is the must.

Protection of a mobile device in such a way may seem inconvenient, but it is the only means you can be sure that access to your information is closed to others and they have no chance to misuse it. (The examples of misuse: sending e-mails in the chats from your account, sending SMS messages at special rates, using your passwords stored in the mobile device).

2. Install antivirus software.

Protection of desktop or laptop with antivirus software is a common law. Since mobile communication device is similar to conventional computer it is to be protected in the same way. There are both chargeable and free antivirus software, for example AVG, Kaspersky, F-Secure, McAfee, etc.

3. Always disable functions you do not need.

For example if you do not use bluetooth, WiFi or GPS at the moment, disable them. Thus you protect the mobile device from possible attacks and give no possibility to have information on your location or collect the profile data. Moreover such measures would increase endurance of accumulator.

4. Refrain from acquisition of unknown applications in on-line stores.

The researches prove that two thirds of viruses are spread through alternative shops of applications and software; therefore, as a rule, such a possibility is banned in your mobile device by default. If malware appears in official shops of the phones vendors (Google Play, Apple App Store) its withdrawal is easier and more integrated. That minimises the risks considerably.

5. Before downloading go through the software profile data.

(The key points are: Is the vendor known and reliable? If known, is application really necessary and suitable to you?)
For example recently there was fact of distribution of a game application under the name of Angry Birds. After downloading it started sending SMS messages at special rates. Or application Viber that enables Internet calls: it downloads phonebook directory from smartphone to its server. Can you trust it?

6. When installing an application always check the access profile.

For example does the application try to get access to your contacts, have a possibility to send SMS messages or enquire location? If in your judgement the application does not need such personal data, refrain from providing such access when requested by the application.

7. Use updates.

If a new version of an application is released, renew it. Thus, you can get rid of possible unrecoverable errors which could be present in an older version.

8. Try not to use unsecure public WiFi network.

When you use unsecure WiFi network (in a cafe, shopping malls and so on) other users of that network with little efforts can monitor the sites you visit, see what photos, videos or movies are stored in your computer, and even read your e-mails.
Warning! User’s login and password for access to WiFi network serve for user identification only and do not protect your actions in WiFi network.

9. Use remote control.

If a mobile device vendor offers remote control through the web always use this possibility. In case of theft or loss of your mobile device you would have a chance to block it, erase the data stored in it or detect its location.

Source