{"id":929,"date":"2013-01-09T10:00:27","date_gmt":"2013-01-09T15:00:27","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=929"},"modified":"2020-02-26T18:56:07","modified_gmt":"2020-02-26T14:56:07","slug":"5-ways-to-secure-your-new-mobile-device","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/5-ways-to-secure-your-new-mobile-device\/929\/","title":{"rendered":"5 Ways to Secure your New Mobile Device"},"content":{"rendered":"<p>It\u2019s that time of year when, in the afterglow of the holiday season we start to play with all of our new toys.<\/p>\n<p>For a lot of people that will mean breaking in their new mobile devices. But before you take your new smartphone out into the real world \u2013 and start downloading apps, streaming music and generally going nuts with your favorite new plaything \u2013 you should know how to protect yourself. That means keeping your device, and your data, secure. Here\u2019s how.<\/p>\n<ol>\n<li><strong>Lock It Up:<\/strong> Use a passcode to lock your device. In the event that it is lost or stolen, this basic level of defense will keep the average person from plugging into your personal life with all of the data stored on your phone with downloaded content, email and social media hubs. This is just a first line of defense, though, so don\u2019t think it\u2019s enough by itself.<\/li>\n<li><strong>Minimize Risk:<\/strong> You shouldn\u2019t be toting around a plethora of sensitive data on your phone in the first place. Sure, you might need to have a couple of documents on your phone at any given time, but it should not become a storage warehouse for sensitive information \u2013 personal or work-related \u2013 that you can\u2019t afford to lose. That\u2019s what hard drives and secure servers are for.<\/li>\n<li><strong>Beware the Coffee-Shop Attack:<\/strong> Before you settle in for a morning cup of coffee and hook your smartphone up to the local public WiFi (this goes for hotels, airports and all public wireless connections), know the risks. These unsecured networks are a hacker\u2019s dream, and there are lots of people who set up shop in these places just to hack devices in search of passwords and other sensitive information. Use data encryption services like VPNs and secure options for email and other applications. But in general, just avoid doing sensitive work on public networks.<\/li>\n<li><strong>Practice Smart App Activity:<\/strong> You should only download apps from trusted sources (like the Apple App Store or the Google Play) that vet all of the programs they sell to ensure they aren\u2019t malicious and have appropriate safety protocols. And even then, be wary of what permissions and access you give to certain apps. And just remember: Never download apps from unknown third parties \u2013 it\u2019s the quickest route to losing control of your device.<\/li>\n<li><strong>Consider Anti-Virus Programs:<\/strong> Mobile antivirus software isn\u2019t very popular yet, and some platform providers (most notably Apple) insist that they aren\u2019t necessary. But as malware becomes increasingly targeted at mobile devices, programs such as <a href=\"https:\/\/usa.kaspersky.com\/products-services\/home-computer-security\/mobile-security\" target=\"_blank\" rel=\"noopener\">Kaspersky Mobile Security<\/a> that protect your device are increasing in number and in relevance. Consider downloading one as an extra layer of defense.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s that time of year when, in the afterglow of the holiday season we start to play with all of our new toys. For a lot of people that will<\/p>\n","protected":false},"author":32,"featured_media":937,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[193,192,97],"class_list":{"0":"post-929","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-mobile-device","9":"tag-protection","10":"tag-security-2"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/5-ways-to-secure-your-new-mobile-device\/929\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/5-ways-to-secure-your-new-mobile-device\/929\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/5-ways-to-secure-your-new-mobile-device\/929\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/5-ways-to-secure-your-new-mobile-device\/929\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/5-ways-to-secure-your-new-mobile-device\/929\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/5-ways-to-secure-your-new-mobile-device\/287\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/5-ways-to-secure-your-new-mobile-device\/929\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/5-ways-to-secure-your-new-mobile-device\/929\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/mobile-device\/","name":"mobile device"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=929"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/929\/revisions"}],"predecessor-version":[{"id":15461,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/929\/revisions\/15461"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/937"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=929"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}