MOBILE

How to Protect Your Mobile Devices

4/13/2012 8:56:55 AM

We take our smartphones and tablets pretty much everywhere we go, which exposes them to the possibility of theft and loss. And because our mobile devices generally store a wide variety of personal data, including emails and access to mobile bank accounts, it's important to invest in a mobile security app that can remotely lock and wipe a lost device. Most mobile security apps also provide antivirus protection, which can be important because smartphones and tablets are essentially tiny computers. Here, we'll cover how mobile security software can protect your smartphones and tablets.

Description: How to Protect Your Mobile Devices

Virus & Spyware Protection

Description: Virus & Spyware Protection

Cybercriminals are now targeting smartphones and tablets with their malicious software, and there are a variety of ways they can reach your mobile device. One of the most common infiltration methods is through the apps you download. Webroot's Secure-Anywhere Mobile Premier scans the apps you download for threats such as viruses, spyware, and Trojans, and it will block any malicious software from installing on your Android device. Secure Web browsing is another common feature to help prevent viruses from infecting your phone or tablet from infected websites. For example, Webroot's SecureWeb (free) for iOS utilizes Webroot's URL filtering to visually indicate if the site is safe to enter, while at the same time blocking any threats from a compromised website.

Extras

Mobile security developers typically provide a few extras that help to further protect your device. For example, some mobile security suites offer the ability to block text message spam, which may include a link to a malicious URL. You may even be able to create a list of approved or blocked contacts to control who can reach your mobile devices. One of the most effective security extras is a SIM (subscriber identity module) card locking feature in which your mobile phone will go into lockdown mode when the SIM card is removed. Automatic SIM card lock is a great feature because the first thing a phone thief typically does is remove the SIM cards so that authorities won't be able to trace the missing phone. Another helpful feature is built-in password protection to encrypt key files and folders on your phone behind a password.

Description: Automatic SIM card lock is a great feature because the first thing a phone thief typically does is remove the SIM cards so that authorities won't be able to trace the missing phone.

Automatic SIM card lock is a great feature because the first thing a phone thief typically does is remove the SIM cards so that authorities won't be able to trace the missing phone.

Anti-Theft Defense

Most mobile security products give you the freedom to delete your personal information off the phone from a PC by accessing a secure Web address provided by the mobile security developer. For example, Webroot's SecureAnywhere Mobile Premier ($19.99; www.webroot.com) includes access to a Mobile Security Portal where you can log in with your secret username and password to remotely lock, wipe, and locate an Android-based device. Some mobile security apps let you remotely disable, clean personal files, and find your mobile phone by sending a text message with a keyword. Typically, the app will turn on your mobile devices GPS to help you locate it on a map. Some tools, such as Webroot's SecureAnywhere Mobile Premier, can force the phone to sound a loud alert, which can help you locate it if the device is nearby.

Description: SecureAnywhere Mobile Premier from Webroot features an App Inspector to scan downloaded apps for viruses before they are installed on your phone.

SecureAnywhere Mobile Premier from Webroot features an App Inspector to scan downloaded apps for viruses before they are installed on your phone.

Built-in Password Protection

Both Android and iOS mobile operating systems give you the ability to set up a password to unlock your phone. (Note that these steps may be slightly different, depending on your model of phone). To set up a password on an Android device            (must run Android 2.2 or later), tap the Menu button, select Settings, choose Security, and tap Screen Lock. At the Screen Lock window, you'll be able to choose between pattern (must connect dots in order), PIN (enter number), or password to unlock the phone. With iOS, tap Settings, choose General, and select Passcode Lock. In the Passcode Lock window, you can select Require Passcode and set a four-digit code that you’ll need to enter when unlocking your iPhone or iPad.

Description: With iOS devices, you can set a four-digit PIN.

With iOS devices, you can set a four-digit PIN.

Other  
  •  Not iPad 3 – Reasons why Apple chose to name its new tablet, “the new iPAD”
  •  Users Complaining Of "Overheating" In New Ipad
  •  Angry Bomber
  •  Upgrade your Android tablet (Part 3) - Optimise battery life
  •  Upgrade your Android tablet (Part 2) - Bricked
  •  Upgrade your Android tablet (Part 1) - Tackling a tablet
  •  Upgrade Android : Archos! Bless you, One step beyond, Custom modes, Flash master & Gingerbread device
  •  CyanogenMod overclocking : Built-in controls, Alright Governor & Custom tools
  •  7-inch iPad hitting the market?
  •  iPod Docks
  •  Great Business Apps for Your iPad/iPod/iPhone : Car Butler, List n Do, Magnifying Glass with Light, WorkSnug
  •  Nokia Teams Up With Windows Phone
  •  The future of malware : Social networking, Enterprise targets & Smartphone threats
  •  Useful apps for iPad (Part 2) : Evernote, Wave Accounting & Dataviz Docs To Go
  •  Useful apps for iPad (Part 1) : Bento for iPad & Numbers 1.5 for iPad
  •  Android Market Under Threat From ‘RuFraud’
  •  Memory update to boost mobile devices : Manufacturer backing
  •  Intel Enters Smartphone Market
  •  Take control of your files (Part 2) - View your files on PC
  •  Take control of your files (Part 1) - Stop and drop, Share and share alike
  •  
    Most View
    Google Nexus 4 - Features Of A High-End Smartphone For Half The Price
    Buying Tips : Cooling Bargains (Part 2)
    Windows Server 2008 and Windows Vista : Administering GPOs (part 1) - Creating GPOs, Linking GPOs
    What Is CEBP?
    Macro Marvels (Part 3)
    Gigabyte GA-F2A85X-UP4 Mainboard & AMD A10-5800K Processor Review (Part 6)
    The Criteria Of Choosing A Travel Camera
    Imation DataGuard T5R – Good Choice For Off-Site Backups
    Game Programming with DirectX : 3D Models - OBJ Models (part 1) - Understanding the OBJ Model Format
    Easy Adoption of Enterprise Mobility
    Top 10
    Innovate & Inspire - Delight, Surprise, Love, Connection (Part 3)
    Innovate & Inspire - Delight, Surprise, Love, Connection (Part 2)
    Innovate & Inspire - Delight, Surprise, Love, Connection (Part 1)
    Tablet Operating Systems (Part 3)
    Tablet Operating Systems (Part 2)
    Tablet Operating Systems (Part 1)
    Manage Add-Ons For Internet Explorer (Part 3)
    Manage Add-Ons For Internet Explorer (Part 2)
    Manage Add-Ons For Internet Explorer (Part 1)
    Cupertino Comes Out Fighting (Part 1)