The Trusted Network of Private Investigators
 
Find an Investigator
Find an Investigator

How to Keep Your Smartphone Secure

Editor's note: This article was written by an industry professional and guest contributor. The views and opinions in this article are of the author and do not reflect the views of PInow. Any recommendations and tips should not be construed as legal or professional advice.


In today’s technology landscape, people are becoming increasingly aware of security issues. It has almost become second nature for people to understand the importance of keeping their computers and laptops safe from unauthorized access and malicious attacks. In recent years, the advent of the smartphone has taken center stage as people have been enticed by the convenience of having all the power of a desktop computer in their pocket. According to Plateau, a telecomm provider, an estimated 96% of the US population currently uses cell phones.

Every year, 1 in 4 Americans will lose their cell phone
Source: Intuit, 2012

how-to-keep-your-smartphone-secure


Some smartphones can cost an upward of $500 and yet are quite an easy little item to steal. The information that you keep on your device can be worth more than money.  Therefore, it is increasingly important for people to educate themselves on the safe use of smartphones and how to secure their personal data kept therein.

Active Measures You Can Take to Protect Your Smartphone

The following are tips and hints to help you keep your smartphone protected from physical theft, data theft, access, and more.

Password Protection:

A good password will have at least 8 characters or many more, contain both capital and lower case letters, a number and a special character (ex: # or !).

Password protect your voicemail and general entry into your phone. And, do not use your date of birth or dog’s name as these are the first passwords someone who knows even a little bit about you, (or find out about you on social media), will try. A good password will have at least 8 characters or many more, contain both capital and lower case letters, a number and a special character (ex: # or !).

If you use a pattern password on your touch-screen phone, be sure to change it often. Drawing a pattern on your phone’s screen over and over again will create small scratches which will eventually show the pattern.

Antivirus Programs & Backup:

Be sure to utilize a reputable smartphone antivirus such as Avast® (www.avast.com) or Lookout™ (www.lookout.com). Kapersky™ (www.kaspersky.com) is also an excellent provider. You wouldn’t imagine using your laptop without an antivirus so why would you neglect to put one on your smartphone which is essentially a tiny computer?

Many smartphones and their carriers include a tracking solution. Several of the smartphone antivirus programs also offer a tracking option for lost and stolen phones. Double check that your phone is covered by one of these programs and TEST IT!

Backup your phone data regularly (personal information, bank and medical information which could be on your phone, contact information, photos, etc.). Make the backup automated and store it in a secure cloud which is encrypted. Test the restoration process.

In the United States, approximately 113 cell phones are lost or stolen every minute.
Source: Plateau, 2012

smartphone-security-for-investigators

Application “App” Security:

You will want to be cautious with which applications you install on your smartphone. Some are malicious and many ask that you approve a list of permissions.  Read the entire list of permissions and use common sense as to whether they are logical.  Why would a flashlight application need access to your email contacts?  Some apps ask permission to be able to write or delete information on your SIM card. Stick to the iPhone App Store and Android Market for trusted and screened applications.

Use protective apps with encryption that also give remote access. Some of the smartphone antivirus programs include remote wipe capability software which can be used clear the phone’s data if the phone is lost or stolen. If only we could do this to the contents of a stolen wallet!

Physical Security:

When walking down the street and talking on your phone, be aware of your surroundings. It’s quite easy for a thief to see you distracted and just nab it out of your hand and run. Having a wrist strap on your phone and using it can also help make this method of theft more difficult.

Be aware of your surroundings when using public transit. Cell phone users are a great target and thieves have an easy getaway when the subway or bus stops. Don’t even take out your phone as this would advertise how nice the phone is to any potential thief.

1 in 5 school-aged children have had their mobile phone stolen
Source: Plateau, 2012

smartphone-security-statistics

Don’t leave your phone lying around. Don’t leave it in plain sight in your car or home near a window.

Turn off the geo-tagging feature which usually is automatically setup on the cell phone at the time of purchase. Any photos taken with the geo-tagging feature turned on can disclose the location in which the photo was taken; your office, home or even specific room in the house. Anyone searching your social media page can likely find more about your than you suspected by using photos taken by your cell phone.

Daily Loss:

$7 Million worth of smartphones are lost daily
Source: Plateau, 2012


Yearly Loss:

$30 Billion worth of smartphones are lost each year in the United States alone
Source: Intuit, 2012

Miscellaneous:

If your phone is lost, make it easier for it to be returned. You can add contact information to the lock-screen. Just don’t list the number to the phone itself! Perhaps you can include a work number or non-primary email address.

Document your phone’s serial number and IMEI (International Mobile Equipment Identity) and store it in a safe place. That information will be imperative to have for an insurance claim or police report.

Turn off the feature on your cell phone which automatically connects it to a wireless network. Having that feature on allows anyone to be able to nab your logins and passwords right off of your phone as you walk by-phone in use or not. With the auto-connect WiFi feature, your phone will continue to search for a local connection and allow authToken information on your phone (which stores your login details for frequently used sites such as social media sites, online banking, etc.) vulnerable for hackers.


What to do if your smartphone has been stolen:

  1. Use the tracking software to locate the device
  2. If necessary, use your phone program to wipe the data off of the SIM card remotely
  3. File a police report
  4. Notify your cell phone carrier who can shut off the phone’s service and document your account that you reported your phone stolen

How Investigators Use Smartphones

For private investigators, smartphones may be their primary and most valued business tool. A smartphone will allow the investigator to make calls, check email, use GPS and maps, locate a business or office, record audio statements, obtain photographs or video documentation and research information using the Internet. There are numerous applications, “Apps,” which can be downloaded onto the smartphone that help make an investigator’s device an even more of a powerful professional tool. Just as an investigator accesses confidential and restricted information and databases on their laptops, they are increasingly going to their smartphone as a research device while in the field. Therefore, it is essential that private investigators, or anyone with a smartphone, take measures to safeguard their device.


About the Author

Kelly Cory is a licensed professional investigator who specializes in customized litigation support and complex investigations. Cory has been sought out for her expertise in background and cyber investigations, interviewed on the topic of database research and educates on the importance of information security. Learn more about Cory’s company, Keystone Investigative Services, Inc. at www.keystoneis.com.

Become a guest contributor

This article was written by an industry guest contributor. If you are interested in submitting a guest post or have an article suggestion, please contact us.


More Information on Electronic Data Discovery Investigations:


Tell us what you think:

Search Articles


The Lawgical Promise

The Lawgical Promise guarantees our members are pre-screened to verify their qualifications.


Find an Investigator


Frequently Asked Questions