Protecting data on mobile devices

Photo credit: Tero Vesalainen Photo courtesy: istock.com

Date: October 31, 2022

Augusta University

October is Cybersecurity Awareness Month and being aware of all your devices is as important as ever before. Most people are online every day, which opens themselves up to a threat of being hacked. Whether it be a mobile device, laptop, or personal computer, everyone needs to have cyber awareness.

Steven Weldon, the director of the Cyber Institute at Augusta University’s School of Computer and Cyber Sciences said in a news release from Augusta University that there are many straightforward things that can be done to protect devices, such as having lock screens, making sure operating systems are up to date and simply recognizing how, when and where devices are being used.

“Smart phones today are probably the most capable computing device that we have, and we have it on us all the time,” said Weldon. “The data that can be extracted from these devices can be put together to build a pattern of life on us: where we go, what we do and when we do it. All of this data is potentially at risk if we’re not being careful about who gets access to our smart phones. That’s a great reason to lock the screen and require at least a password or pin to unlock the phone.”

Gokila Dorai, an assistant professor in the School of Computer and Cyber Sciences, suggests using biometrics to enhance security.

“I would strongly recommend for women, young adults even teenagers, if it’s possible for you to have biometrics as a way to unlock your device, then go for that. These unique ways of unlocking a device would add a layer of protection,” said Dorai.

When out in the public, it’s easy to connect a mobile device to an unprotected Wi-Fi network. Doing so could open up sites you visit to a hacker. Weldon suggests people should be careful of what apps are used when on public Wi-Fi, since they may expose a lot of personally identifiable information. His suggestion is to use a virtual private network to help protect data that’s being transmitted and received.

“We should recognize the data on our smart phones and protect them accordingly,” added Weldon. “Recognizing the value and sensitivity of the data on our smart phones can guide us in how we protect these devices.”

What to Read Next

The Author

Comment Policy

The Augusta Press encourages and welcomes reader comments; however, we request this be done in a respectful manner, and we retain the discretion to determine which comments violate our comment policy. We also reserve the right to hide, remove and/or not allow your comments to be posted.

The types of comments not allowed on our site include:

  • Threats of harm or violence
  • Profanity, obscenity, or vulgarity, including images of or links to such material
  • Racist comments
  • Victim shaming and/or blaming
  • Name calling and/or personal attacks;
  • Comments whose main purpose are to sell a product or promote commercial websites or services;
  • Comments that infringe on copyrights;
  • Spam comments, such as the same comment posted repeatedly on a profile.