Securing Mobile Devices

Objective

After completing this lesson, you will be able to use your mobile devices securely

Mobile Devices When You're on the Go

Do you know anyone without a mobile phone? You probably don’t, and if you do, it’s a rare situation. What began as a simple communication tool has become our go-to device for navigation, news, fitness, shopping, and more. Knowing how to secure your mobile device is important for cybersecurity.

In the previous unit, you learned about phishing and social engineering. While those same cybersecurity threats apply to communication using mobile devices, there are other threats you should be aware of too.

Unseen Security Risks: A Day in the Life of Luisa

Read this story about Luisa. Can you count how many times she exposes herself to a cybersecurity threat in her busy day?

Spanish woman in café on tablet

An energetic young woman named Luisa lived in the vibrant city of Madrid. Always engrossed in her work, Luisa had an inseparable companion – her mobile phone.

One sunny afternoon, Luisa rented a car for a business meeting across the city. She synchronized her phone to the car's Bluetooth to make hands-free calls.

After the meeting, she stopped at her favorite café, 'Café del Sol'. In a loud phone conversation, she discussed confidential details of the business deal she had just closed, unaware of people listening in around her. Once she had finished her call, she left her phone unsupervised on the table to collect her coffee from the counter.

Last stop of the day was the airport, where she sat in a crowded lounge, awaiting her flight. Luisa always used her time as efficiently as possible. First, she plugged in her phone to the airport charger, as her battery was low. Then, she read her confidential e-mails on her laptop, unprotected by a privacy screen protector.

When she arrived at her final destination, she had just enough energy to log onto the hotel wi-fi to send a presentation to her manager. What a day!

How many cybersecurity threats did you spot? What advice do you have for Luisa?

Let’s examine the example more closely:

  • Syncing your mobile device with a rental car is not a good idea – it exposes your data to hackers.
  • Talking on the phone in a public place means that anyone can hear you. Never discuss confidential or private information in this situation.
  • Leaving your phone or laptop unattended means threat actors can access your device, or even steal it.
  • Not using a privacy screen protector allows anyone near you to view your screen. There can also be cameras that can film you as you enter your passwords, for example.
  • Charging your phone in a public charging station can expose you to juice-jacking, where a threat actor can use the cable to install malware on your device.
  • Using insecure wi-fi networks exposes you to cyber attacks.

Mobile devices are essential, especially when you’re on the go. But remember how easily you can expose yourself to a cybersecurity threat – and it only takes a few seconds or a lapse in concentration.

Log in to track your progress & complete quizzes