IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

Overlooking Mobile Phone Security

22 March 2011 By Saran

phonesThe average person spends a lot of time and money on making sure that his personal laptop or desktop computer is secure. From firewalls to anti-virus software to spyware removers – all these kinds of software are installed onto computers to make sure that any kind of malware is kept out. But do you pay as much attention to security on your mobile phone?

According to a recent survey conducted in the UK, mobile phone users do not really pay that much attention to security. IT Pro has this story:

Results from a survey of UK mobile phone users has found too many of us are playing fast and loose with sensitive data stored on our mobile phones.

More alarmingly though, it also found that the majority (99 per cent) of those questioned also used their mobiles for business use, creating a potentially weak security link to their employers’ corporate systems.

So what kind of sensitive data is stored in mobile phones? I think that you can answer this yourself but let’s take a look at some of them:

• Bank account details
• PINs
• Passwords
• Social security numbers

More than these things, mobile phone users also admitted to accessing and storing business data on their phones. This includes downloading spreadsheets and other business documents.

The worst part is that despite the fact that this information is stored in mobile phones, the units themselves do not have passwords and other forms of security measures.

The bottom line? At the very least, we have to put passwords on our mobile phones. Even better, enable encryption.

Photo courtesy of http://www.flickr.com/photos/osde-info/763025492/sizes/s/

Filed Under: Real-World Issues, Tips, Wireless Security Tagged With: cellphones, mobile.-security

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security