Friday, June 26, 2015

How to protect your mobile phone – Future in North

Telenor believes the time has come to secure your phone and your tablet better and launches a security service for mobile.

New technology provides new opportunities for criminals. Tablets and smartphones used today for everything that was previously reserved for computers.

We surf, update social media, store documents and pay for goods and services. The amount of information we store in mobiles and tablets, can make them coveted target for intruders.

– The threats on the Internet has become much more complex and some players are more sophisticated than they were a few years ago. The former boy dashes has evolved into a cyber arena where criminals including chasing money and driver ID and information theft. Organised criminals pretending to be your bank or other you normally trust to get you to disclose sensitive information, says Bjørn Ivar Moen, head of mobile operations in Telenor Norway.



Launching on Android

Some people are using mobile phones or tablet computers at work, without using antivirus. It makes mobile phones and tablet to a potential switch.

– Getting mobile phone taken over by criminals, among other things, lead to the loss of personal and corporate sensitive information. One danger we have so far been spared in Norway, but as we see in other countries, someone could be able to send out expensive SMS messages to payment services they earn money, says Moen.

Telenor is launching a security service that is integrated with My Telenor app.

The State Security runs in the background of your phone at all times and provides better protection against both viruses and infected websites.

– Currently we are launching the service for private customers with smartphones that have Android operating system, such as Samsung, Sony and HTC, says Moen.

Six tips for better security

1 . Use screen lock: It is important that you use some sort of screen lock to unlock the phone. Pin-code you must enter to use the SIM card when you turn on your phone, no one stops from getting access to everything you have stored on the phone when the phone is turned on. Use a screen lock password, fingerprint or other phone locking devices as well. The main thing is that no one can access directly on your phone if you lose it or have it stolen.

2. Be critical of what you install: It’s smart to be a bit wary of what apps you download, especially if you use an Android phone. In contrast to Apple’s App Store, where everything is controlled manually before putting it out, checked apps posted on Google Play only via electronic tests. This allows the infected apps easier slip through security checkpoints. About downloading apps that have good reviews and many users there may be an indication that the application is safe, but you’ll still need to think through both privacy and security. But one is not sure – or want to try new apps that nobody else has tried, reviewed or commented on, or downloading apps from sites other than Google Play, make sure you have a security solution installed in advance, for example security to My Telenor.

3. Keep everything updated: Always download new updates for your phone, both the operating system and the applications you have installed. This can provide new and nice features, but first and foremost it is important as such updates gladly seal any security holes.

4. Make copies: A growing number of stores his life on a phone, including pictures, contacts, documents and more personal and great value. Therefore, it is smart to synchronize this to a safe cloud, such as My Sky, which provides safe and easy storage of images, and My Contacts, which provides safe and easy storage of your contacts.

5. Use good, strong passwords: Use a strong password with some length. It should include at least ten characters, but you must be happy to put together some arbitrary word after another. It is easier to remember than you think. Also be sure to use different passwords for different online services – and two-step verification which it supported.

6. Stop: Be wary if you are asked to perform or install anything you have not even asked for. Where physical browsing, can also offer a potential risk. About browsing on an open network and sends such bank info over an unencrypted connection, this could in theory be intercepted by unknown. Do you use an encrypted service on websites, there is less risk of unauthorized see what you are doing.

LikeTweet

No comments:

Post a Comment