Virtualization Technology News and Information
Article
RSS
4 Easy Steps to Create a Secure Mobile Network

 Mobile Security

Cybersecurity is now big business. With constant breaches of both small businesses and major corporations, we’re more aware of cyber attacks than ever before. But as productivity shifts from desktops and laptops to mobile devices, the priority of security is changing focus to the smartphones in our pockets.

If you want to carry a safer device, whether it’s for business or everyday life, follow these four steps to create a full-proof network on your smartphone.

Step 1: Install a VPN

A VPN, or Virtual Private Network, should be the first step in better mobile security because it creates a barrier between your phone and would-be cyber attackers who want your data. A VPN uses a third-party IP address to hide your connection from the public and encrypts your activity—so well, in fact, that even the VPN company can’t see what you’re up to.

VPNs have been popular on desktop and laptop devices for years, but due to growing productivity on smartphones, mobile devices are now prime for secure networks. Both iOS and Android are optimized for VPNs and a reputable company costs less than $50 per year. Companies like Private Internet Access are well reviewed and have connections all over the world — so you don’t have to connect to an IP in California if you’re working in New York.

Step 2: Don’t Skip the Updates

It happens every time—Apple or Google release a brand new update for iOS or Android, loaded with cool new features and a slick interface, but in the update is a hidden bug. Most of the time these flaws are so obscure that few devices are compromised, but it does happen and sometimes the vulnerabilities go unanswered for months, or even years.

You can’t call up Tim Cook on the phone and ask him to fix your iOS flaw, but you can stay on top of your updates, which typically address 99 percent of security vulnerabilities in the last release. Do this, and you’re letting do Apple and Google do most of the security for you.

Step 3: Study Security Trends

There is no one security tool or trick to rule them all. Think of mobile security like investing for retirement. No advisor would recommend you put all your eggs in one basket, and the same applies to keeping your device safe. Security is all about diversity and watching trends from leading companies in the industry is the best way to keep up to date with the latest tips and tricks to fend off cyber attacks.

LifeLock, an identity theft protection service, is consistently updating its Facebook page with articles and tips to keep your data safe and what’s going on in the world of cybersecurity. Following accounts like these is an easy way to ensure you aren’t missing out on important news.

Step 4: Stop Using Dumb Passwords

What is a dumb password? It’s a code that’s difficult for people to remember but easy for a computer to guess. Let’s say your password is something like Pa$$w0rD. We have eight characters, capital letters, numerals and symbols. Secure, right?

Wrong. Not only is this password hard to remember, it’s actually very easy for a computer to guess. Despite conventional wisdom, short passwords will always be a cinch for computers no matter how many numbers, symbols or capital letters they have. Secure passwords actually look more like this: correcthorsebatterystaple. Easy for a person to remember (like four random words placed together) and difficult for a computer to break.

Published Thursday, March 03, 2016 7:56 AM by David Marshall
Filed under: ,
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<March 2016>
SuMoTuWeThFrSa
282912345
6789101112
13141516171819
20212223242526
272829303112
3456789