Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

How can you know if your phone has been compromised?

Parvinder Walia, Sales & Marketing Director, ESET APAC | Feb. 5, 2016
Without proper security measures, users risk losing both their personal data and confidential data from work once their mobile device is compromised. In light of this, Parvinder Walia, Sales and Marketing Director at ESET, Asia Pacific, shares 5 things to look out for in order to find out if your phone has been compromised.

You also need to take into account the fact that a lot of malware tries to pass through official app stores to steal your credit card data. For this reason, if you regularly make such payments through your mobile device - or any other platform - you should also check the transactions through such services to ensure there are no unwarranted charges.

What steps should you take if your phone has been compromised or infected?

If for any of the reasons mentioned above you believe you may have been infected by malware, you can install a trustworthy security solution to scan your device in order to identify the threat. You can also contact the official customer services provided by the seller so they can look into the problem.

If you have the technical know-how, you can try to remove the threat yourself through a command console.

Furthermore, if you suspect that sensitive information stored on your device may have been stolen, you can change your credentials for accessing any services you have used on your device.

However, remember that prevention is always better than cure.

To avoid any unpleasant experiences when using your device, you should take a proactive and preventive approach to keep the data on your mobile device secure:

  • Always keep your device's operating system and apps updated with the latest available versions.
  • Make a backup copy of all data on the device, or at least the most important data.
  • Use security solutions provided by a highly reputable company and keep them up to date.
  • Be sure to use only official stores for downloading apps, where the likelihood of becoming infected by malware is lower-although still not zero.
  • Use a screen lock, and remember that the pattern may be easy to guess and less secure than a PIN, and that a password is your best option.
  • Encrypt the content on your device.
  • Try to avoid running rooting or jailbreaking processes on the device.

By following these simple tips listed above, you can confidently make full use of the internet and available technology safely and with no stress.

 

Previous Page  1  2  3 

Sign up for CIO Asia eNewsletters.