Skip to main content

DeleteMe’s Best Practices for Mobile Device Security

DeleteMe’s Best Practices for Mobile Device Security

Will Simonds

October 7, 2019

Reading time: 4 minutes

Until fairly recently, there was a disconnect between the way many users treated security of personal computers versus their portable devices.  PC’s receive antivirus applications, firewalls, layers of advanced network permissions, and many users have developed relatively sophisticated attitudes towards email-communications, encrypting sensitive attachments, and becoming more cognizant of phishing techniques.

Mobile devices, on the other hand, spent much of the past decade being treated blithely, with little real concern for device security other than a 4 digit password.  Application level security remains rare. Behavior is generally far more risk-tolerant, particularly with permissions granted to unsigned applications, and file-sharing via chat or cloud applications undeservedly treated as risk-free.

This is changing, but slowly.  The most recent generation of smartphones has made fingerprint authentication near-universal, and network carriers are being more proactive in providing customers protections against unsolicited communications.  However, significant weak-spots remain in device security, particularly in how user information is concentrated and shared by applications in ways not transparent to the end-user.  

Here are some tools and tips DeleteMe recommends for users wanting to improve mobile-device security, and general recommendations for best-practices in daily usage:

1. Use the tools the device manufacturer and phone-carrier provide

Too often people disable features already available to them within the settings of their devices, and resort to third-party ‘security’ applications written by some unknown 3rd-party provider.  

  • Ensure lock-screens require both PIN # and fingerprint or facial-recognition unlock.  
  • Create stronger passwords than minimum required.  
  • Utilize the SIM-card lock feature on Android phones which requires re-entering passwords for accessing stored data; this will protect against anyone simply stealing the card itself and bypassing phone-based security features.

2. Enable two-factor authentication (2FA) for all online accounts

Especially for core services like personal banking, peer-to-peer payments, social-media, and your Google account and Apple-ID, make sure you are using the extra-layer of security provided by two-factor authentication.  Here’s a helpful rundown of online services offering 2FA to protect people’s accounts, and here is a list of financial services providers and their 2FA offerings

Use two factor authentication to improve Mobile Device Security

3. Encrypt your data

Some new phones current encrypt data by default, but many devices in use still only make this available via options in settings.  Here are step-by-step guides to confirm data-encryption for both Android and iPhone users.

4. Avoid apps from unknown vendors

While iOS apps are generally safe because of Apple pre-screening, Android apps are provided directly by a range of independent, unverified 3rd-party vendors.  Google has recently made efforts to mitigate risks by developing Google Play Protect – an app-screening service that scans for any risky features or malware included with downloaded apps.

But even when a 3rd party app may not have any malicious intent, they can create security vulnerabilities via a combination of unneeded permissions and non-essential network communication (often to deliver targeted ads).

Spend some time researching applications and their vendors before installing them on your phone.  Additionally: delete any legacy applications you don’t find yourself using anymore.

5. Keep your phone up-to-date

One of the biggest mistakes some people make is disabling automatic software updates in order to prevent unplanned large downloads from hitting their monthly data usage.  Make sure to regularly check for OS updates and do so as soon as possible after they become available. Most updates include fixes for specific security-risks.

6. Be leery of any file-sharing via text messaging

While sharing photos with friends and family is routine daily behavior, attachments via SMS are almost entirely without any sort of security-protections, and should never be used for any sensitive information.  In general delete any unsolicited SMS attachments without reading, and routinely clear your own text-messaging history.

SHARE THIS ARTICLE
Will Simonds runs Senior Marketing Operations at DeleteMe, and is a steadfast privacy advocate who has a resolute dedication to online privacy solutions and helping people regain their privacy. …
Will Simonds runs Senior Marketing Operations at DeleteMe, and is a steadfast privacy advocate who has a resolute dedication to online privacy solutions and helping people regain their privacy. …
Hundreds of companies collect and sell your private data online. DeleteMe removes it for you.

Our privacy advisors: 

  • Continuously find and remove your sensitive data online
  • Stop companies from selling your data – all year long
  • Have removed 35M+ records
    of personal data from the web
Special Offer

Save 10% on any individual and
family privacy plan
with code: BLOG10

Want more privacy
news?
Join Incognito, our monthly newsletter from DeleteMe that keeps you posted on all things privacy and security.

Don’t have the time?

DeleteMe is our premium privacy service that removes you from more than 750 data brokers like Whitepages, Spokeo, BeenVerified, plus many more.

Save 10% on DeleteMe when you use the code BLOG10.

Related Posts

How to Remove Ads from Google Search Results

After getting bombarded by personalized ads, I made it my mission to learn how to remove ads from Google Search results. Read on to find out what I…
Laura Martisiute
May 7, 2024

How to Remove Address from Google Business

If you’d like to find out how to remove an address from Google Business – whether it’s your business or your personal address – y…
Laura Martisiute
May 7, 2024

Make America Great Again Mailing List Removal 

This guide will walk you through the Make America Great Again mailing list removal process.  MAGA is an American super political action commit…
Laura Martisiute
April 2, 2024