The University of Waikato - Te Whare Wānanga o Waikato
ICT Self Help
Home Waikato Home  >  ICT Self Help  >  Information Security Awareness  >  Best practices and tips for Mobile Phone Security Staff + Students Login |  - Logout

Tips for Mobile Phone Security

Below are some best practice and tips for Mobile Phone Security regardless of make and model of smartphone:

  • Install a mobile phone version of antivirus software on your phone.
  • Treat your phone as you would your desktop PC, and be cautious of opening files, SMS messages, IM's and applications sent via Bluetooth, especially if they are received from unknown sources.
  • Disable Bluetooth, or set the Bluetooth status to hidden, until you want to share something.
  • Only download and install applications from reliable sources such as the Apple iTunes store, Google Play store or Nokia OVI store.
  • Don't run or install unsigned applications from unknown sources.
  • Disable Wi-Fi access by default (this will also save a lot of battery power) and only connect to known Wi-Fi hotspots.
  • Use caution when receiving SMS messages or emails from unknown sources.
  • Avoid enabling root access to the phone, as this will significantly increase the likelihood of malware running or causing damage to files on your phone. If root access is enabled, change the password to a more secure one.
  • Periodically back up your important data to another device such as desktop PC so that it can easily be recovered and restored.
  • Install an application that can be used to remotely lock, wipe the data, or disable your phone if it becomes lost, stolen or compromised.
  • Lock your phone to your SIM card and enable a PIN to prevent access to the phone in the event that it is lost or stolen.
  • Appreciate that your phone is a vector for malware distribution, connecting to multiple PCs may allow malware to spread via USB, especially if Auto run is enabled on PCs.

Mobile based malware will not become as prevalent as it is for computers, but as malware authors have followed technology trends in the past, and as smartphones become more common, it would be expected that malware authors would at least try to target these devices as they become more popular.


<< Mobile Phone Security  |  Securely Using Mobile Apps  >>


How To Guides

Your step by step guide to various ICT services.

Help & FAQ's

View FAQs on our available topics.

Policy & Standards

View documented policies & procedures.

ICT Glossary

Site Map