LANSING – By

2017, the number of smartphone users in the United States is expected to

surpass 200 million, nearly 65 percent of the population. Negotiating security

in the face of an ever growing implementation of mobile devices presents

serious challenges for organizations. Risks include the growth of Bring Your

Own Device (coupled with a lack of security controls for these devices), loss

or theft of devices, and the proliferation of mobile malware.

Users need

to understand the risks and the steps they can take to minimize them,

particularly as cybercriminals often use employees as the entry point into an

organization’s network.

Below are some

key actions users can take to help minimize the likelihood of a successful

cyberattack offered by the Multi-State Information Sharing & Analysis

Center.

Regularly

update your device

Mobile

malware increased 75 percent in 2014 from 2013, and further increases in

malware are expected in 2015, particularly in mobile ransomware. Updated operating

systems and security software are critical in protecting against emerging

threats.

Enable

encryption

Enabling

encryption on your smartphone is one of the best ways to safeguard information

stored on the device, thwarting unauthorized access.

Use a

passcode

In case your

phone ever does fall into the wrong hands, don’t make it easy for someone to

access all your important information! Enable strong password protection on

your device and include a timeout requiring authentication after a period of

inactivity. Secure the smartphone with a unique password not the default one it

came with. Do not share your password with others.

Do not use

public Wi-Fi

Do not log

into accounts and do not conduct any sensitive transactions, such as shopping

or banking, while using public Wi-Fi.

Disable the automatically connect to Wi-Fi setting on your device.

Install

applications from trusted sources. Last fall, Gartner issued a prediction that

more than 75 percent of mobile applications will fail basic security tests

through 2015. When downloading apps, be proactive and make sure that you read the

privacy statement, review permissions, check the app reviews and look online to

see if any security company has identified the app as malicious.

Install a

phone locator/remote erase app

Misplacing your

device doesn’t have to be a catastrophe if it has a locater app. Many such apps

allow you to log on to another computer and see on a map exactly where the

device is. Remote erase apps allow you to remotely wipe data from your device,

helping minimize unauthorized access to your information in the event you

cannot locate the device.

Disable

unwanted services when not in use

Bluetooth

and Near Field Capabilities can provide an easy way for an unauthorized

user nearby to gain access to your data. Turn these features off when they are

not required.

Carefully

dispose of mobile devices

With the

constant changes in the smartphone market, many users frequently upgrade to new

devices. Make sure you wipe the information from your smartphone before disposal.

For information on how to do this, check the website of your mobile provider or

the manufacturer.

The MS-ISAC

is the focal point for cyber threat prevention, protection, response and

recovery for the nation’s state, local, tribal, and territorial governments. The

MS-ISAC 24×7 cyber security operations center provides real-time network

monitoring, early cyber threat warnings and advisories, vulnerability

identification and mitigation and incident response.