Skip to main content
 

October is Cybersecurity Awareness Month. In this guest post, Jared Perdue, Information Security Specialist with the Information Security Office, shares how you can boost your mobile security. All month long, ITS News will highlight this year’s theme: See yourself in cyber. In this article, seeing yourself in cyber means keeping yourself, and your devices, cybersafe. For more tips about staying safe online, visit Safe Computing at UNC.

Our mobile devices contain a great deal of valuable data. No matter what device you use, be it a Windows laptop or MacBook, an iPhone or Android device, you should take some basic precautions to protect the data and the accounts on your devices. Below you’ll find basic and some more advanced tips to help you boost your mobile security.

Jared Perdue wears a t-shirt that reads "Don't worry, the bad guys are here"
Jared Perdue

Public Wi-Fi

  • When using a laptop, you should connect to your phone and use the hotspot feature to avoid exposing your data to others on the public network. Ensure the wireless network broadcasting from your phone has a strong password. For a more secure connection, tether your phone to your laptop with a USB cable.
  • Be careful when checking sensitive accounts on public networks and avoid doing so when you can. These can include email, social media, financial, medical and work accounts. Make sure two-factor authentication is set up where possible. If you must access one of these accounts, consider changing your password once you have access to a trusted network.
  • Use a Virtual Private Network (VPN) whenever possible. Only connect to sites with HTTPS (the lock icon should be present in the address bar). Do not interact with any pop-ups you encounter.
  • Advanced:
    • Disable any auto-connect functions except to trusted networks. If your device does not automatically connect to a network with a familiar name, it could be spoofed. Verify it is the network to which you normally connect.

Device security

  • Keep the device up-to-date. Run the system update feature once a month. Apple update releases can vary. Windows updates are released the second Tuesday of the month. For Pixel owners, Google releases Android updates around the fifth day of the month.
  • View the list of recent Apple updates. Follow the above advice and look for updates to your devices once per month.
  • Use antivirus/antimalware on your laptop systems such as the pre-installed Windows Defender on Windows 10 and Windows 11. Antivirus software exists for Apple iOS and Android, but varies in quality and ability to scan your entire system.
  • Restart your phone on a regular schedule. Malware typically enters a phone through a malicious app downloaded from an app store. Here it is important to review what permissions an app requests and reviews before installing as a restart will not delete an installed app. However, other means exist for malware to download and run on a phone. Restarting your phone can clear this kind of malware.
  • Regarding permissions, review what permissions an app asks for before installation and when first run. In many cases, an app will run fine without allowing all permissions or setting it to have access to the permission only when the app is open.  
  • Do not leave your device unattended in public. Similarly, be careful about who you trust with access to your device.
  • Rename the device so as not to easily identify the owner (many iPhones will default to names such as Jared’s iPhone).
  • Advanced:
    • For laptops, set up a firewall to restrict inbound and outbound connections.
    • For Windows laptops:
      • disable unnecessary services that can introduce more risk such as Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS).
      • set up Controlled Folder Access within Windows Security for ransomware protection. Note: this feature requires manual work as it will block newly installed programs from saving to folders like Documents. One example is that video games won’t be able to save progress or configurations until granted access. An easier option would be to configure the built-in OneDrive feature to restore any affected data. 

Bluetooth and NFC

  • Monitor connections using these technologies. Do not accept unexpected Bluetooth pairing requests.
  • Disable both Bluetooth and NFC (Near Field Communication) when not in use. Note: this will affect connectivity to smartwatches and other wearables. Disabling NFC will affect your ability to use apps like Apple Pay and Google Pay.
  • It is important that you do not share sensitive information over Bluetooth and NFC connections.
  • Configure Apple’s AirDrop and Google’s Nearby Share to accept only connections from people in your contact list.

Additional resources

Want to learn more about how to protect yourself and use the technologies available on your devices? Check out these resources:

Podcast

Have you heard about our podcast Data at Rest? We discussed these and other tips in Season Five – Episode 2. Subscribe on your favorite podcast service. Visit https://dataatrest.unc.edu. 

Comments are closed.