A woman's hand touching her phone

Security Made Simple – Part 5

Your Handbook for Everyday Security


This series of articles is based on a handbook used as an outline for cybersecurity courses, viewed from a user perspective. The handbook, or these articles, is copyrighted by Vasco F. Gonçalves, working for SDNC sàrl.


Mobile Security Essentials

App Permissions

  1. Review App Permissions: Regularly check and manage app permissions on your mobile device to control what data apps can access.
    • Example: Review and revoke unnecessary permissions, such as location access for apps that don’t require it for their functionality.
  2. Permission Prompts: Pay attention to permission prompts when installing new apps and evaluate whether the requested access aligns with the app’s purpose.
    • Example: A photo editing app requesting access to contacts might be unnecessary and could indicate potential data misuse.

Wireless Security

  1. Secure Wi-Fi Connections: Avoid connecting to unsecured or public Wi-Fi networks, which could expose your device to security risks.
    • Example: Use VPNs when connecting to public Wi-Fi to encrypt data and enhance security.
  2. Bluetooth Awareness: Disable Bluetooth when not in use to prevent unauthorized access or attacks through Bluetooth vulnerabilities.

Remote Wiping and Device Management

  1. Remote Wipe Functionality: Enable remote wiping on your mobile device to protect sensitive data if the device is lost or stolen.
    • Example: Services like Find My iPhone (iOS) or Find My Device (Android) allow remote wiping to erase data if the device is unrecoverable.
  2. Device Tracking and Locking: Utilize features that enable device tracking and locking remotely to prevent unauthorized access.
    • Example: Geolocation services help track and locate the device, while remotely locking it secures personal data.

Best Practices for Mobile Security

Biometric Authentication: Use biometric authentication methods like fingerprints or facial recognition for added security.

Regular Updates: Keep your device’s operating system and apps updated to patch vulnerabilities and improve security.

Next, many expect that – we will speak about:

Understanding Crypto Wallets

Leave a Reply