From the course: Ethical Hacking: Vulnerability Analysis

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Securing mobile devices

Securing mobile devices

From the course: Ethical Hacking: Vulnerability Analysis

Start my 1-month free trial

Securing mobile devices

- [Instructor] Today's mobile devices are essentially a small computer designed to consume information. In addition to making calls, mobile devices have many functions, camera, read documents, read news, WiFi and others. Mobile devices are small and they can be easily lost or stolen. Passwords can be compromised. Because of an always on connection and the amount of time spent on mobile devices, users should take precaution to secure the device and ensure the device only allows authorized transactions. A couple of things that you should keep in mind as far as mobile device best practice. Keep software updated. Patches and updates reduce the threat from malware attacks and data exfiltration. To slow someone down from gaining access to your information, use a passphrase or password. Use a biometric such as a fingerprint if available and set idle timeout to lock the phone when not in use. Use use good web sense. Use a…

Contents