Will they be smart with them….??
At some point, almost everyone will have a smartphone. Those of the younger generations won’t be able to live without them. They will accomplish a variety of tasks with them. Will they be smart with them?
Smartphones intersect with the personal and professional. People use them to play games, and they use them to send emails. Sometimes, people forget that their smartphones are not immune to viruses. They forget that their smartphones are just as vulnerable as other devices, and it doesn’t matter what variety of smartphone they have. Some phones may be less vulnerable, but that doesn’t mean the owners of those types of smartphones should be any less cautious. To protect their smartphones – and themselves – smartphone users should:
- Avoid “black market” app stores: You may be able to find interesting apps or apps at discounted prices on the “black market,” but such apps often are corrupted or infected with malware. Legitimate app stores scan and remove infected apps; that isn’t the case at “black market” app stores.
- Turn off Bluetooth and Wi-Fi when not using them: Both create vulnerabilities if your phone isn’t configured properly. Bluetooth has a discoverable mode. If you don’t turn it off, other people can gain access to your device. Wi-Fi is a public network; using it opens your phone to man-in-the-middle attacks and traffic snooping. For that reason, you should turn off Bluetooth and Wi-Fi when not using them.
- Create strong passwords: Just as with any other device, you need strong passwords. You need one for the device itself as well as any accounts you might have enabled on your phone. For instance, if you have an unprotected Google account and someone accesses your phone, that person now can infiltrate and wreak havoc on your phone and possibly your Google account. The same danger exists with other accounts, such as iTunes or iCloud.
- Be careful with permissions: Read the small print before installing an app. Know what data it will be able to access and know what the app will do once installed.
- Be careful with links and attachments: Your phone is a mini-computer. If you don’t know the sender of an email, don’t open the email. If you are concerned about a link or attachment, don’t open the attachment or click on the link.