Friday, October 9, 2015

Cybersecurity Smarts (VIDEO BLOG!): Mobile Safety

Today's CyberSecurity Smarts blog is our first ever VIDEO BLOG, with mobile device security tips from Daniel Teyf, our Application and Database Security Architect. Watch it below, or view it on YouTube here.

Video Transcript: Daniel Teyf, Applications and Database Security Architect.

Today we're going to talk about the mobile device any in particular, any brand and the security that comes along with it.

Updating Your Device
A device like this also has an operating system, which manages all the components of the device, and with programs that run on it. It's important to make sure you update your device's operating system on a regular basis. Different vendors will handle this differently:
  • Apple has the ability to directly target your phone and send you an update
  • Android does it through the service provider
  • Microsoft offers updates directly from the Microsoft cloud
Encrypting Your Device
The iPhone, for the most part, is already encrypted. But it's important to make sure that you have a PIN on there. On the Android, you set up a PIN (called a screen lock) in your settings, and then further into the settings you will see the security tab with an option to encrypt the phone. It's highly recommended that you encrypt your phone so that if you lose it, that information is harder to get at.

Turn Off Your WiFi
Let's not forget what happens when we connect our phone on our home WiFi. The first time around, your have to find your network. It shows you all of the available networks to connect with, and then your phone's got it memorized. The next time you are at home your phone automatically connects to that network again. The same thing goes for your work network, or the coffee shops that you visit. Anywhere you go after that your phone tries to see if those same networks are available. How does it see? Knock, knock, knock. It sends the network name, the SSID, out to see if anyone is going to respond to it. 

What's interesting is sitting at a hotel, and putting up a wireless receiver, you can see all of these phones running around trying to connect to various networks and they are sending out the network name. You can almost build a profile about which people have relations do they work together, do they visit the same coffee shops, do they live together, etc.

Lesson to be learned: If you are not connecting to the WiFi at a location, simply turn it off.

No comments:

Post a Comment

OIT encourages open discussion, and we invite you to share your opinion on our issues. By commenting on this blog, you are agreeing to our commenting policy, outlined below.

We reserve the right not to publish comments on our blog containing any of the following elements: profanity, misinformation, spam, off-topic/irrelevant (including self promotional posts not having to do with IT or the organization), personal attacks, promotion of violence, or the promotion illegal or questionable activities.

If you repeatedly violate this policy, you will be blocked from commenting.

If you have a question regarding this blog or anything on it, please email us at

We appreciate your cooperation and support, and look forward to connecting with you!