Securing Mobile Devices

This article discusses the best practices for securing your mobile devices. 

Mobile devices are standard for both business and personal use. However, our ability to keep up with this rapidly evolving technology leaves many devices open to exploits and attacks. Almost all Americans own a cell phone, creating an abundance of targets for attackers. 

Follow these best practices to help secure your mobile devices:

Update your mobile device on a regular basis 

Don’t ignore the update alerts on your mobile device. Using outdated software increases the risk of the device getting hacked, so be sure to update as needed.  

Encrypt data by locking your device

If the mobile device is lost or stolen, the encryption on the mobile device will protect the data stored. Since the data is encrypted while the mobile device is locked, strong passwords or the use of biometrics are suggested.

Lock your device when unattended

It’s very important to lock your mobile device every time you leave it unattended. If the mobile device lands in the wrong hands while unlocked, the data within the mobile device may be subject to unauthorized exposure. Please be sure to report any unauthorized exposure to our office.

Devices must lock out the user interface after a period of time

It’s recommended that mobile devices lock out after a period of time and require a password to regain access. The lockout should occur after no more than 5 minutes for smart phones and 15 minutes for tablets. All smart phones should be configured so that all data is permanently deleted after the incorrect passcode has been entered more than 10 times.  

Avoid Public Wi-Fi

Be cautious when utilizing any public Wi-Fi networks as bad actors can easily access the network and watch what you are doing on your device and steal your personal information. Utilize a hotspot or VPN (Virtual Private Network) to maintain security and anonymity.

App Permissions

When downloading a new app onto your device, check the permissions requested such as access to contacts, messages, microphone, etc. Before speeding through the install, if these permissions aren’t necessary, always be conscious to limit sharing of your information to ensure it’s not compromised. As an example, the game Solitaire from some vendors will request access to contacts and phone, which isn’t related to the app function.

Additional security for your apps

Passwords or biometrics should always be added to apps on mobile devices. Sensitive data like banking information is often stored directly on the mobile device. If the mobile device is lost or stolen, the passwords or biometrics will add an additional layer of protection to the sensitive data if the device is unlocked. You can also enable Antivirus software for your devices which will have little to no impact on the devices performance and notify you of potential security issues with your device.

Tracking #542569-03

Exp. 02/2027 

This material is for general information only and is not intended to provide specific advice or recommendations for any individual. This material was prepared by LPL Financial, LLC

Ready to discuss
Your Financial Future?