- Top 10 Computer Security Tips
- Securing Confidential Electronic Data
- Network Access Controls
- How to retrieve a lost mobile/smartphone?
- Security Documents
- Security for Mobile/Smartphones
- Cloud Computing Security Best Practices
With ever advancement in technologies, cell and smart phones, tablets and notebook computers are commonplace with increasing capabilities. Mobile devices (or mobile computing devices) are information systems capable of storing and processing large amounts of information without having a fixed physical location, and they are highly portable. While mobile devices by default are inherently insecure, we need to embrace them as they will continue to proliferate and be used for both business and personal purposes.
A stolen or lost mobile device with unprotected storage allows an attacker or malicious person to access the data on it. If the device is infected with malware, it may lead to use of services running in the background, or leaking sensitive information. Here are some general tips for maintaining the security of your mobile device.