Firstpost
  • Home
  • Video Shows
    Vantage Firstpost America Firstpost Africa First Sports
  • World
    US News
  • Explainers
  • News
    India Opinion Cricket Tech Entertainment Sports Health Photostories
  • Asia Cup 2025
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
Trending:
  • Nepal protests
  • Nepal Protests Live
  • Vice-presidential elections
  • iPhone 17
  • IND vs PAK cricket
  • Israel-Hamas war
fp-logo
Being Mobile: 7 security resolutions individuals should make in 2015
Whatsapp Facebook Twitter
Whatsapp Facebook Twitter
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
  • Home
  • Business
  • Being Mobile: 7 security resolutions individuals should make in 2015

Being Mobile: 7 security resolutions individuals should make in 2015

FP Archives • January 30, 2015, 13:02:38 IST
Whatsapp Facebook Twitter

Don’t leave your smartphone or tablet unattended in public: It only takes a few seconds for someone to use an open device to collect login information and copy passwords.

Advertisement
Subscribe Join Us
Add as a preferred source on Google
Prefer
Firstpost
On
Google
Being Mobile: 7 security resolutions individuals should make in 2015

By Ritesh Chopra The countdown is over and the confetti has been cleaned up. We all have our set of New Year resolutions for 2015 - to eat healthier, be more organized or even revive a good habit - whether at work or your personal life. One such resolution can be related to something that is not only an extension of us in our personal lives but also a lifeline for many Indians in their work life- the mobile device. Mobile devices undoubtedly have become an integral part of our lives, as the number of mobile Internet users in India is expected to reach 213 million by June 2015 (IAMAI-IMRB). Driven by strong adoption of cheaper smartphone penetration, affordable data plans and the need to stay connected, this number is expected to increase by 40 million in the next six months. The advent of Bring Your Own Device (BYOD) in recent years while provides flexibility and business profitability, has turned personal security concerns into a corporate one with unprecedented increase in endpoints – leading into a slew of possible security threats. [caption id=“attachment_2010043” align=“alignleft” width=“380”] ![Reuters](https://images.firstpost.com/wp-content/uploads/2014/07/internet-reuters2.jpg1_2.jpg) Reuters[/caption] This year, as a responsible individual - let’s resolve to keep a critical eye on that shiny, new mobile device, by following a few resolutions to up our mobile security game. #1. Don’t leave your device unattended Don’t leave your smartphone or tablet unattended in public: It only takes a few seconds for someone to use an open device to collect login information and copy passwords. Someone can also send out emails from your official id, so make sure to lock your screen even if you’re going to be away from your device for a short while. Nothing can be more embarrassing then spamming your professional contacts. #2. Put a password on it This is one important way to avoid unauthorized access, yet too many of us use simple passwords that are easy to guess. Also, configure your device to automatically lock after a period of time. Don’t write passwords down; commit them to memory. #3. Install a mobile anti-malware on your device This might seem unnecessary, as most people don’t realize that mobile devices are equally exposed to viruses, spyware, malware etc. as PC/laptop. In India, 57 percent users aren’t aware that security solutions for mobile devices exist, while 63 percent have experienced some form of mobile cybercrime in the past 12 months, as per Norton Report 2013. As mobile becomes the fastest-growing target for cybercriminals – with sophisticated attacks such as ransomware, identity theft and spear-phishing becoming a reality. Therefore, it is mandatory that you install an anti-malware protection that establishes a security perimeter around your device – to detect the existing and emerging mobile threats and keep the software updated. This way, no matter what the bad guys have up their sleeves, you can keep your information and device safe. Opt for a reliable product to do this job. #4. Backup your data Most of us have first-hand experience or have heard of someone who had their mobile device stolen, or their account locked, leading them to lose their files such as contacts, images, music playlists etc. One way to avoid such heartbreaks is to regularly back up files. It is relatively easy to do, and many devices have the capabilities to backup data wirelessly, so you can quickly restore the information on your device if the data is lost or accidently deleted. If you lose your device, you should be able to swipe the data off the phone and retrieve the information on another device. #5. Examine an app’s reputation before downloading Shop and download apps from trusted app markets after reading a few reviews and ratings. While apps ask for access to many features on your device, many users don’t examine these permissions carefully. This allows malicious app developers to persuade users to grant unnecessary permissions – accessing your identify, contacts, gallery, location etc. Beware of the implications before granting access. #6. Scan the Wi-Fi hotspots and Bluetooth devices before connecting Don’t allow automatic connections. Some mobile devices are set up to automatically connect with available Wi-Fi networks and Bluetooth devices. Disabling this option will prevent your phone from connecting and transmitting data without your knowledge. Take control! #7. Keep a tab on who has access to your device The way households connect to the Internet has changed considerably in recent years. Users who use their devices for personal and professional purposes must be well aware of who all have access to their devices. According to Norton Report 2013, 66 percent of consumers use their personal device for work and play. While 51 percent of parents let their kids play, download and shop on their work device. Such practices must be avoided. Remember, protection should focus on the information – and not just the device. The author is India country manager at Norton by Symantec.

Tags
Security Bluetooth Password mobile Symantec Norton by Symantec
End of Article
Written by FP Archives

see more

Latest News
Find us on YouTube
Subscribe
End of Article

Impact Shorts

Tata Harrier EV vs Mahindra XEV 9e: Design and road presence compared

Tata Harrier EV vs Mahindra XEV 9e: Design and road presence compared

The Tata Harrier EV and Mahindra XEV 9e are new electric SUVs in India. The Harrier EV has a modern, familiar design, while the XEV 9e features a bold, striking look. They cater to different preferences: the Harrier EV for subtle elegance and the XEV 9e for expressive ruggedness.

More Impact Shorts

Top Stories

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Who is CP Radhakrishnan, India's next vice-president?

Who is CP Radhakrishnan, India's next vice-president?

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Who is CP Radhakrishnan, India's next vice-president?

Who is CP Radhakrishnan, India's next vice-president?

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Top Shows

Vantage Firstpost America Firstpost Africa First Sports
Latest News About Firstpost
Most Searched Categories
  • Web Stories
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Tech/Auto
  • Entertainment
  • IPL 2025
NETWORK18 SITES
  • News18
  • Money Control
  • CNBC TV18
  • Forbes India
  • Advertise with us
  • Sitemap
Firstpost Logo

is on YouTube

Subscribe Now

Copyright @ 2024. Firstpost - All Rights Reserved

About Us Contact Us Privacy Policy Cookie Policy Terms Of Use
Home Video Shorts Live TV