9 Mobile Device Security Mistakes You Can Easily Avoid

Mobile Device Security Mistakes to Avoid

Mobile devices are your lifeline as you juggle your full-time job and manage your family’s schedule. You don’t know what you’d do without your smartphone to give you directions to your son’s baseball game or the cooking app on your tablet that makes dinnertime a breeze.

But there’s a downside to using your smartphone as your personal assistant—mobile device security threats! As smartphone and tablet use is on the rise, so are hackers’ attacks on mobile devices. Internet crime used to be focused on Windows computers, but Android devices have caught up in terms of cybercrime rates, according to Marius Milcher, head of development at Decibel Technology. He adds that Apple devices aren’t immune to hackers, either.

"Mobile devices are not designed with security in mind. They are designed for ease of use."

Smartphones and other mobile devices are susceptible to a number of security threats, leaving your data, your identity and even your money vulnerable to cybercriminals. “Mobile devices are not designed with security in mind. They are designed for ease of use,” says Jeffrey Bernstein, Managing Director of T&M Protection Resources.

Maintaining your privacy doesn’t have to mean giving up the mobile devices that help you manage your daily life. You can keep yourself and your family protected from data thieves by avoiding some common mobile device security mistakes. Stay one step ahead of hackers with these security tips from technology experts.

9 mobile device security threats to avoid

1. Free WiFi

Nearly every coffee shop, airport and even some doctors’ offices have free WiFi these days. But these public Internet connections are “prime territory for hackers looking to steal your personal information,” says Jim Lastinger, CEO at VPN provider Ghost Path.

While you’re browsing the web and sipping your latte, the guy two tables over could be tracking your every move, gaining access to passwords and other important data. Lastinger recommends protecting yourself by using a virtual private network (VPN) app to encrypt the data going to and from your device.

2. Downloading untrustworthy apps

Apps create the perfect disguise for hackers to place malware or spyware on your mobile device. Edward Kiledjian, chief information security officer at Bombardier Aerospace, shares some tips for downloading new apps:

  • Verify the number of ratings an app has received, as well as any complaints from previous users.
  • Only download from reputable app stores and research the developer to ensure they’re trustworthy.
  • Familiarize yourself with the app’s security features before downloading it.

3. Unprotected mobile banking

The rise of mobile banking means it’s easier than ever for hackers to access your bank accounts. Anti-virus and anti-malware software as well as password management software are essential to keeping your personal information out of the hands of cybercriminals, according to Darren Guccione, CEO and co-founder of Keeper, Inc. He advises you to also keep a vigilant eye out for phishing scams—a fake site that imitates your bank’s website to capture your account number and password.

4. Ransomware

The newest threat to mobile devices is Ransomware. This specialized malware locks you out of your device until you pay the malware developer a fee to regain access.

To combat Ransomware, make sure you run automatic backup software regularly and never click on links from people you don’t know, says David Coher, principle of reliability and cybersecurity for Southern California Edison.

5. Jailbreaking your mobile device

Many mobile device manufacturers include restrictions, called Digital Rights Management (DRM), on their products. Some mobile device users bypass these DRMs by “jailbreaking” their mobile devices so they can make personalized modifications or install unauthorized apps.

Jailbreaking your smartphone may seem like a good idea, but it leaves you susceptible to cyberattacks, says Arthur Zilberman, CEO of IT at LaptopMD. He explains that the manufacturer restrictions are there to help keep your device secure, so you’re leaving yourself open to malware if you remove them.

6. Giving apps unlimited permissions

Many people don’t think twice about granting permission for an app to access information on their mobile device. This can be a grave mistake, according to Max Aulakh, chief security architect at MAFAZO Digital Solutions. Many apps request permission to access your contacts, emails and other personal information they don’t really need, cautions Aulakh.

The solution is simple: read an app’s permissions requests before agreeing to any terms. Restrict the app’s permissions or cancel the installation if you feel it’s asking for too much access.

7. Weak passwords

Hackers will often exploit security flaws in popular apps to gain access to your username and password. Weak password habits leave you extremely vulnerable.

Protect your personal information by using a variety of unique, strong passwords and not allowing your apps to auto-login, according to Robert Siciliano, online safety expert at Intel Security.

8. Unsecured personal information

No one wants to think about what would happen if their smartphone is lost or stolen but it’s a scenario you should consider. If your device fell into the wrong hands, cybercriminals would not only have access to your passwords, but to much more personal data, such as photos, videos, addresses and health information.

Think twice about the kind of information you keep stored on your phone, especially without password protection. Coher recommends enabling features like Find My Phone as well as remote locking and data-wiping software to limit these risks.

9. Ignoring updates

It’s easy to ignore an update when you have such a busy schedule. But those updates are usually fixing security holes. Kiledjian says one of the easiest ways to keep your device safe is by promptly installing updates to your operating software and apps as soon as they become available.

Protect your data and prevent cybercrime

Don’t let cybercriminals interrupt your life. Following these expert tips will help keep your personal information safe while you use your mobile devices to manage your family’s routines.

If fighting cybercriminals sounds like fun, a career in cyber security could be in your future! Learn more about these rewarding and in-demand career options in our article, "Information Security Careers: Become the Next Cyber Superhero."

About the author

Ashley Brooks

Ashley is a freelance writer for Collegis education who writes student-focused articles on behalf of Rasmussen University. She believes in the power of words and knowledge and enjoys using both to encourage others on their learning journeys

female writer

Related Content

Related Content

This piece of ad content was created by Rasmussen University to support its educational programs. Rasmussen University may not prepare students for all positions featured within this content. Please visit www.rasmussen.edu/degrees for a list of programs offered. External links provided on rasmussen.edu are for reference only. Rasmussen University does not guarantee, approve, control, or specifically endorse the information or products available on websites linked to, and is not endorsed by website owners, authors and/or organizations referenced. Rasmussen University is accredited by the Higher Learning Commission, an institutional accreditation agency recognized by the U.S. Department of Education.

logo-accreditation-acen logo-accreditation-ccne chart-credential-laddering-associates-bachelors-masters 0 Credits 90 Credits 180 Credits 48 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE'S DEGREE Start Here MASTER'S DEGREE PURSUERS End Here BACHELOR'S DEGREE End Here MASTER'S DEGREE chart-credential-laddering-associates-bachelors 0 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS 90 Credits Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE'S DEGREE 180 Credits End Here BACHELOR'S DEGREE chart-credential-laddering-msn chart-credential-laddering-nursing-programs chart-credential-laddering-post-grad-np chart-credential-laddering-nursing DNP MSN RN to BSN LPN to RN Bridge Accelerated BSN Professional Nursing ADN Practical Nursing Diploma Pre-Licensure Post-Licensure icon-colored-outline-bank icon-colored-outline-certificate icon-colored-outline-circle-dollar-sign icon-colored-outline-folder-search icon-colored-outline-hand-heart icon-colored-outline-head-blocks icon-colored-outline-head-cog icon-colored-outline-head-heart icon-colored-outline-health-plus-leaves icon-colored-outline-hospital icon-colored-outline-lifelong-learning icon-colored-outline-light-bulb-analytics icon-colored-outline-location-pin icon-colored-outline-magnifying-glass icon-colored-outline-monitor-healthcare icon-colored-outline-monitor-paper-search icon-colored-outline-nurse-rays icon-colored-outline-padlock-shield icon-colored-outline-person-presenter-screen icon-colored-outline-scales ras-logo-flame ras-logo-horizontal ras-logo-stacked icon-colored-advance icon-colored-arrows-cross-curve icon-colored-briefcase-star icon-colored-build icon-colored-bulb-analytics icon-colored-certificate icon-colored-continual-development icon-colored-duo-chatbox icon-colored-folder-mortarboard icon-colored-forward-ribbon icon-colored-gears-clock icon-colored-globe-pen icon-colored-growth icon-colored-hand-bubble icon-colored-hand-stars icon-colored-hands-gear icon-colored-head-blocks icon-colored-head-cog icon-colored-health-plus-leaves icon-colored-hospital-building icon-colored-laptop-cbe-skyscraper icon-colored-laptop-checkmark icon-colored-laptop-webpage icon-colored-location-map icon-colored-location-pin icon-colored-monitor-paper-scan icon-colored-mortarboard-dollar icon-colored-national icon-colored-people-chat-bubbles icon-colored-person-cheer-star icon-colored-person-laptop-checkboxes icon-colored-person-screen-instructor icon-colored-person-whiteboard icon-colored-phone-chatbox icon-colored-police-light icon-colored-prep icon-colored-presenter icon-colored-regional icon-colored-save-time icon-colored-shirt-hat icon-colored-skyscraper icon-colored-state icon-colored-student-centered icon-colored-support icon-colored-world-experience icon-triangle-arrow-up-plant icon-triangle-calendar-pencil icon-triangle-clock-rotating-arrows icon-triangle-display-gears icon-triangle-hand-right-speech-bubble icon-triangle-laptop-coding-brackets icon-triangle-mortarboard icon-triangle-paper-ribbon icon-triangle-person-cheer-star icon-triangle-person-juggle icon-triangle-triple-people-chat-bubble icon-modality-campus icon-modality-field icon-modality-online icon-modality-residential icon-arrow icon-bank icon-camera icon-filter icon-general-chart icon-general-connect icon-general-degree icon-general-discuss icon-general-email icon-general-find icon-general-hat icon-general-heart icon-general-laptop-building icon-general-laptop icon-general-leader icon-general-map icon-general-money icon-general-paperwork icon-general-people icon-general-phone icon-general-speak-out icon-head-heart icon-info-circle icon-mail-forward icon-mglass icon-play-solid icon-quote-mark-left icon-quote-mark-right icon-scales icon-share-square-o icon-simple-chat icon-simple-desktop icon-simple-find icon-simple-hamburger icon-simple-phone icon-spinner icon-tag icon-testimonial-quotes icon-util-checkbox-white icon-util-checkbox icon-util-checked-white icon-util-checked icon-util-chevron-down icon-util-chevron-left icon-util-chevron-right icon-util-chevron-up icon-util-circle-arrow-down icon-util-circle-dot icon-util-language-switch icon-util-loading icon-util-open-window-link icon-util-pdf-link icon-util-refresh icon-util-x rebrand-arrows icon-social-facebook-colored icon-social-facebook-square-colored icon-social-facebook-square icon-social-facebook icon-social-google-plus-square icon-social-google-plus icon-social-instagram-colored icon-social-instagram icon-social-linkedin-square-colored icon-social-linkedin-square icon-social-linkedin icon-social-pinterest-p-colored icon-social-pinterest-p icon-social-twitter-colored icon-social-twitter-square icon-social-twitter icon-social-youtube-play-colored icon-social-youtube-play graduate-cap-star-coin hand-coin hand-heart nurse-stethoscope-rays card-send-smile person-yoga-pose suitcase-star