The mobile device market is developing at a very dynamic pace. Today, we can't imagine not having access to information, including our own and external data, at any time, anywhere. But the more we use mobile devices en masse, the greater our risk of network threats. How can we protect ourselves?
Types of Threats
➡ At purchase. When buying a device, we may risk acquiring equipment that is stolen, damaged, or infected with a virus.
➡ During use. Using a mobile device inherently carries the greatest risk. Therefore, you should ensure the security of data on your laptop, smartphone, or tablet against unauthorized access. Most often – unfortunately – we ourselves allow this access; a very popular cyberattack method is requesting consent to process our data, clicking on a link found in an email, SMS message, or on a website. By clicking, we install malicious software. On the other hand, when using a public wireless network (Wi-Fi), there is a risk of revealing our unencrypted data, including login and password, which are transmitted in plain text.
➡ At sale. If we sell our device, we must be aware of the possibility of data and files that were stored on it during use, as well as data stored in the applications used, escaping with it.
Precautions After Purchase
When buying any mobile device, you should always check its source of origin, functionality, and the seller's reputation. Before making payment, type the seller's name into a search engine. It should appear online, e.g., in auction site rankings. Ask for an invoice – it will be a document of legality. For used devices, the seller is also obliged to provide a warranty.
Naturally, the greatest dangers occur during the period of device use. First and foremost, you should not leave it unattended. However, theft happens everywhere, so we should protect the contents of our device from unauthorized access in advance, or at least make access significantly more difficult. Here's what to do after purchase:
➡ record the equipment's identification data (serial number, IMEI number, etc.) and store it in a safe place,
➡ set a keyboard lock using the most complex code possible,
➡ in the "Security" option, enter contact details for a person to be contacted if the device is found,
➡ set the device location function.
The latter function is available in iOS and Android systems. In iOS, it is enabled by default after logging into an Apple account. If the device is connected to a Wi-Fi or cellular network, you can remotely:
➡ locate the device on a map,
➡ play a sound, even if it is muted,
➡ enable screen lock with contact information displayed,
➡ erase the device's content; however, this option should be used as a last resort, after ensuring you have a backup copy.
In the Android system, this function starts automatically after logging into your Google account. However, the options for remote screen locking and device erasure must be set up by yourself. On devices running Windows, you need to log in to a Microsoft account.
Safe Usage
When using a mobile device, you must adhere to basic safety principles, including:
➡ installing applications only from trusted sources. Some programs, especially those advertised as antivirus, have names very similar to original ones, but are actually malicious software,
➡ when logging into online banking – in any questionable situation, contact your bank's helpline. Remember that no bank will ever ask you for your login password, transaction verification numbers (for scratch cards), PIN number for your card, etc.,
➡ try not to use public Wi-Fi. It's best to have your own, well and securely configured network. It's good to use internet access included in your subscription; currently, all mobile network operators offer this option. Avoid installing any software if this installation is a condition for using free Wi-Fi,
➡ do not share your location if the service you are logging into asks for it. It's best to disable geolocation on your device. A bonus here can be – apart from protection against unwanted access – battery savings, which will allow for longer device use without needing to charge.
Disturbing Signs
Symptoms that should concern a mobile device user are most often:
➡ a sudden increase in the phone bill, especially SMS charges,
➡ an installed application downloading/sending giant amounts of data,
➡ an SMS message appearing on the screen that cannot be found later,
➡ after installing an antivirus program, a message appears stating that a paid update is required,
➡ the antivirus program stops working, even though it has not been turned off or uninstalled,
➡ interference, audible during outgoing phone calls, despite full signal,
➡ lack of access to the device – a lock appearing at intervals of a few seconds, a message requiring payment to restore access, a message requiring payment of a fine for alleged legal violation (e.g., downloading illegal pornographic content),
➡ rapid battery drain and the need to charge the device, device overheating.
In summary, minimizing the risk of exposing our personal data is possible by following a few simple rules and managing your device rationally. However, remember that if we notice suspicious symptoms and our device starts to show some irregularities in its functioning, we should go to a service center. Attempts to resolve the problem on your own may result in irreversible data loss, and in extreme cases – destruction of the device.
Author: Konrad Bielawski, data recovery specialist at Data LAB. Enthusiast of electronic gadgets, wanting to protect other gadget enthusiasts from the danger of data loss on the network.