Market Overview

Ten tips for cyber secure use of mobile devices


Helsinki, Finland - 18 December 2012 -Mobile devices have become increasingly common and the markets are flooded with new applications for business and pleasure. Smartphones and tablets are also popular Christmas presents. People are using mobile devices to play games, to shop, to pay bills and share their thoughts via social media. The network security company Stonesoft shares ten tips for the cyber secure use of mobile devices.

- Almost all functions are available in the Internet today, and unfortunately also organized crime has found its way there. To a consumer, cybercrime may seem a distant threat that is mostly related to espionage between nation-states or hacking against big enterprises. However, also the consumer shopping online can be harmed. With your mobile device, you carry also a significant collection of very important personal information data, including your credit card number, with you at all times", says Joona Airamo, Chief Information Security Officer at Stonesoft.

It is worth paying attention to the secure use of smartphones and tablets. For example, malware can be harmful also for mobile devices. Also the information contained by the mobile device may easily get into wrong hands, as the devices are easy to steal.

Stonesoft's tips for secure use of mobile devices

  1. Update the programs and operating system of the mobile device regularly. Updates are usually provided automatically. On the other hand, when you are selecting a new mobile device, make sure updates are available to the operating system of the model in question.
  2. Install programs only from reliable sources, e.g. well-known appliance stores such as App Store, Google Play or Nokia Store. A game for one euro may be available for free elsewhere, but it is also quite likely to contain malware
  3. Be careful with in-apps purchases - they may become costly. For example, children may buy superpowers to their game characters without understanding that each purchase costs. In many mobile devices, these in-apps -purchases can be disabled.
  4. Be aware of the rights you have granted to different applications. From time to time, go through all user rights and privacy policies you have accepted. For example, the right to location information and the right to the network connection for the same application enable tracking your location remotely. Many camera applications and social media applications require user rights to the pictures you download to them.
  5. Change the default access code and the PIN code of the SIM card. Do not use your birth year or other number combinations that would be too easy to guess. Set your device to request the password or a secret pattern every time you use it.
  6. If your mobile devices supports data encryption, enable this capability.
  7. You can connect your mobile devices to an online service that can remotely locate a lost or stolen device and, if needed, perform a remote wipe to erase all data.
  8. If your mobile device gets stolen, inform your operator immediately so that the use of your SIM card at your expense can be disabled and your subscription can be transferred to a new card.
  9. When you are giving up your old device, erase all personal information by returning the device back to factory settings. Remove all information also from old SIM cards and memory cards.
  10. Make regular backups of all data in your mobile device. Cloud services are practical for this purpose, but do not send your employer's information to these without permission.

In addition to the basic tips listed above, Mr. Airamo reminds that employees have obligations to their employer.

"When you are using equipment provided by your employer, you should also always follow the related security instructions. Nor should you save work-related information to your own devices unless otherwise agreed."

Contact

For more information, please contact:

Joona Airamo
Chief Information Security Officer
Stonesoft Corporation
Tel. +358 40 521 1342
E-mail: joona.airamo@stonesoft.com

 

About Stonesoft

Stonesoft Corporation (NASDAQ OMX: SFT1V) delivers software based, dynamic and customer driven network security solutions that secure the information flow and simplify security management. The company's product portfolio consists of the industry's first transformable Security Engine, standalone next generation firewalls and intrusion prevention systems, and SSL VPN solutions. At the core lies Stonesoft's Management Center which unifies the management of entire networks.

Stonesoft serves private and public sector organizations requiring high availability, ease of management, compliance, dynamic security and protection of their critical digital assets and business continuity against today's rapidly evolving cyber threats. Stonesoft is a recognized researcher of advanced evasion techniques used in targeted cyber attacks to bypass security.

Stonesoft has the highest customer retention rate in the industry due to low TCO, ease of management, and overall customer excellence. Stonesoft's customer base covers more than 6,500 mid- or large-sized organizations across various industries and geographical markets.

Founded in 1990, the company's track record is well recognized by certifiers, industry analysts and demanding customers. The company's corporate headquarters are based in Helsinki, Finland and North American headquarters in Atlanta, Georgia. For more information, visit www.stonesoft.com.






This announcement is distributed by Thomson Reuters on behalf of Thomson Reuters clients.

The owner of this announcement warrants that:
(i) the releases contained herein are protected by copyright and other applicable laws; and
(ii) they are solely responsible for the content, accuracy and originality of the
information contained therein.

Source: Stonesoft Oyj via Thomson Reuters ONE

HUG#1665829

 

Around the Web, We're Loving...

Partner Network

Get Benzinga's Newsletters