McGuire 1

Marissa McGuire

Dr. Bai

Technology 101

October 16, 2014

Mobile Device Protection

The consequences of losing a smartphone or other mobile device are significant because these devices store personal and business data. The goal, therefore, for mobile device users is to make their data as secure as possible. Techniques include avoiding unsafe links, using cation when downloading apps, turning off GPS tracking, and installing mobile security software.

A high percentage of users follow unknown links, which can lead to a malicious website. Malicious links can inject malware on a mobile device. The malware may steal personal information or create toll fraud, which secretly contacts wireless messaging services that impose steep fees on a monthly bill(Bao). Users should avoid tapping or clicking unknown links.

Any device that connects to the internet is susceptibleto mobile malware.[1] Popular games are likely candidates to house malware, and if often is difficult to distinguish the legitimate apps from the fake app. Users should check the reliability of the seller, the descriptions and reviews of the app, and the requested permissions before downloading.

GPS technology can track the mobile device’s location as long as it is and receiving signals to and from satellites. Although this feature maybe helpful, serious privacy concerns can arisewhen the technology is used in malicious ways, such as to stalk individuals or trace their whereabouts (Fields).

Users can enable the password feature on their mobile device as the first step in stopping prying eyes from viewing contents, More protection is necessary, however, to stop viruses and spyware and to safeguard personal and business data. Mobile security apps can lock a mobile device remotely, erase its memory, and activate its GPS function (Bao).

Some techniques users can take to protect their mobile devices include avoiding unsafe links, using caution when downloading, turning off GPS tracking, and sing mobile security software. Users should take these measures to protect their mobile devices.

References

Bao, He Gao. "Securing Mobile Devices." Technology Today September 2014: no pages . Web. 1 October 2014.

Bennett, Lewis Taylor Jameson and Kathryn Leona. Mobile Tecnologies . New York: Maxwel Press, 2014. Print.

Fields, Charlotte. Secure Your Mobile Device. n/a n/a n/a. Web. 22 Sept. 2014.

[1] According to Jameson and Bennett, cyber thieves target apps on poplar devices(72).