How Do I Protect the Information on My Mobile Phone?

Mobile phones have only been publicly available for about sixteen years, but we’ve come to depend on them so heavily it is hard to remember what we did before we had them. If you have a smartphone, you now carry a fully functional computer in your pocket or purse. That’s a tremendous amount of information quite literally at your fingertips, and it is information that you do not want to fall into the wrong hands.

Common Wireless Risks

Mobile risks fall into several categories. Take a moment to consider each of these areas to identify where you may want to make changes in your own cell phone use:

  • Loss of device and information theft. Phones are small and are easy to misplace or have stolen in a moment of inattention. In addition to replacement costs, lost, stolen and ’borrowed’ phones carry the risk of information theft. Abusers may use your accounts, address lists, photos, and more to scam, harm or embarrass you or your friends, they may leverage stored passwords to access and steal your money or run up charges, gain access to sensitive material, and more.
  • Falling for scams. The biggest mobile threats you are likely to face will be socially engineered. Whether it is a phone call, text message, image, or application to download, an incoming communication may be a scam, phishing attempt, or include malicious links.
  • Oversharing. Guidelines for protecting privacy, safety, and reputation when sharing via computers also apply to mobile sharing - with two additions. Mobile devices enable instantaneous distribution of information, and they may broadcast location information.
  • Wireless networks. Smartphones are susceptible to malware and hacking when leveraging unsecured public networks.

Simple steps can protect your phone and information:

  1. Smartphones need to be updated when security fixes are developed. Though basic phones generally don’t get updated, smartphones are essentially computers and they may need updates. While some updates simply provide you with cooler functionality and upgraded features, others fix critical security vulnerabilities that you do not want to be exposed to. Your service provider should notify you whenever an update is available; ignore these at your own peril.
  2. Security software is a must for smartphone users. The mobile malware market is booming -and because few users protect these devices they are particularly attractive to hackers and cybercriminals. The fixes phone manufacturers make to their operating systems do not protect you from other types of malware attacks. The only protection against these is to use mobile security software and keep it up to date. Many of these programs can also locate a missing or stolen phone, will back up your data, and even remotely wipe all data from the phone if it is reported stolen.
  3. Minimize losses and avoid intrusions with a secure PIN. Be conscious of where you place your phone and always secure it with a unique PIN or password – not the default it came with. Then don’t share your PIN or password with others.
  4. Think before you click, download, forward, or open. Before responding, registering, downloading or providing information, get the facts. Go online to check for scams, look up the company or sender, search for hidden fees or reports of malware associated with the company or sender, and independently verify any claims. No matter how tempting the application, if the download isn’t from an app store or the site of a trusted company, walk away.
  5. Understand the terms of use. Some applications claim extensive rights to accessing and leveraging your personal information. Walk away if the app wants more access than is needed to run their service.
  6. Surf safely. Many smartphone users use free WiFi hotspots to access data (and keep their phone plan costs down), but you cannot know if that network is safe or compromised so avoid logging into accounts, especially financial accounts when using public wireless networks.
  7. Backup your phone’s information. How many friend’s (or family member’s) phone numbers do you actually know? For many users, the only source of contact information for people is stored on their cell phones. This makes the loss of a phone painful and potentially hazardous. By backing up your data you ensure you have it – even when you don’t have your phone.

Provided by Linda Criddle, Founder of    


Online Shopping & Banking
10 Tips to Safer Shopping
Avoiding Internet Crooks
Bank Online Safely
Benefits of E-books
Identity Theft Rights
Identity Theft Tax Scams
Online Auction Sites
Online Classifieds - Buying
Online Classifieds - Selling
Secure Social Engineering
Digital Family Life
Addictions and ADHD
Betrayal Online
Child Online Privacy
Children & Anorexia
Children & Inappropriate YouTube Videos
Children and Internet Advertising
Children's Photos Online
Cyberbullying Tips
Dating Online Safely
Digital Dating
Digital Literacy
Family Time
Healthy Digital Family Life
High Risk Behaviors
Impact On Children
Internet Gambling
Internet Pornography
Kids & Online Gaming
Kids Posting on YouTube
Kids’ Mobile Apps
Make Money Websites
Online Gaming & Children
Online Quizzes & Surveys
Oversharing Information Online
Protecting from Predators
Read the Fine Print
Respect Online
Risky Behavior
Safe Online Photo Sharing
Safety & Social Networks
Social Networking and Friction
Teaching Privacy
Teen Asking for Validation?
Too Much Time Online
Video Games
PC Security
Argument with a troll
Block Pornography
Bots, Botnets And Zombies
Coupon Safety
Safe Linking & Attachments
Safe URLs
Search & Collected Info
Search vs Research
Secure Websites
What is Antivirus?
What is Phishing?
Getting Started
Beginners Tips
Email Hacking
Identify Theft
Malicious Software
Organize Net News
Sending Email
Strong Passwords
Technology Overload
Cyberbullying & Online Predators
Cyberbullying Help
Cyberincident Response
Family Blogging
Harassed Online
Online Predators
Online Safety
Recognize a Cyberbully
Report Cyberbullying to Police
Report Cyberbullying to Schools
Safety: Pornography
Mobile Security
Cell Phone & Driving
Cell Phone Theft
Mobile Law Enforcement
Mobile Protection
Mobile Sexting
Parents & Cell Phones
Tweets Archived
Ethics & Legal
Cheating & Technology
Cite Sources and Avoid Plagiarism
Download Music & Videos
Facebook Passwords
Internet Addiction
Internet Content Copyrights
Kids & Impersonation
Online Impersonation
Societal Digital Piracy Costs
Managing your Online Reputation
Online Reputation
Protect Your Online Content
Protecting Privacy on Google
Teens & Reputation