Cellphone Security

Cellphone Security

Our cellphones are always close by, rarely turned off, and can hold huge amounts data. But, Did You Know: cellphones have become top targets for hackers looking to steal messages, contacts, and pictures, as well as physically tracking the owners. Hackers can even turn on a phone’s camera and microphone to see and listen to your private conversations!

How can you stop this?

Well, it turns out that the oldest and simplest computer fix may help stop hackers too!

Simple Trick:
Step One:
Turn off Phone.
Step Two: Turn it back on. That is it! 

Restarting phones will not stop an army of digital criminals. But it can make the hackers work harder and be more costly to them. Most hackers are looking for the easiest target...if you can make it just a little bit harder for them…then they may just move on.

If you’re like me, you never think about turning your phone off until there is a problem. Then “rebooting” your phone becomes the first step in troubleshooting the problem. However, turning your phone off and on weekly is an easy way to help thwart hackers that might try and gain access.

There are many things to keep in mind and you may not do all of the steps consistently...BUT, a small amount of prevention could prevent a major catastrophe for your company. Follow these steps:

1. Disable Bluetooth when you are not using it. Airplane mode does not always disable Bluetooth.
2. DO NOT connect to public Wi-Fi networks. Disable Wi-Fi when unneeded. Delete unused Wi-Fi networks.
3. Maintain physical control of your device and avoid connecting to unknown removable media.
4. Consider using a protective case that drowns the microphone and cover the camera
5. Install a minimal number of Apps and only ones from official App stores. Be cautious of entering personal data and close applications when not using.
6. Update the device software and applications as soon as possible.
7. Consider using Biometrics (e.g., fingerprint, face) authentication for convenience and to protect.
8. DO NOT have sensitive conversations on or around personal devices.
9. DO NOT open unknown email attachments and links. Even legitimate senders can pass on malicious content accidentally or as a result of being compromised or impersonated by a malicious actor.
10. Disable location services when not needed. DO NOT bring the device with you to sensitive locations.
11. Unexpected Pop-ups are usually malicious. If one appears, forcibly close all.
12. Power the device off and on weekly

If you are the victim of a cyber crime, you could face financial consequences like extortion demands, expenses to restore your stolen identity, legal fees for lawsuits, and even temporary living expenses due to cyberbullying.

At Heritage, we offer cyber insurance to help cover some of these risks.

To learn more about cyber liability insurance, contact us today.  
Greg Marcyniuk
Agency owner
Heritage Insurance
100A Fairford Street, Moose Jaw