{"id":30047,"date":"2021-04-01T08:29:32","date_gmt":"2021-03-31T22:29:32","guid":{"rendered":"https:\/\/www.geeks2u.com.au\/?p=30047"},"modified":"2022-09-21T15:37:02","modified_gmt":"2022-09-21T05:37:02","slug":"how-mobile-security-works-and-do-you-need-it","status":"publish","type":"post","link":"https:\/\/www.geeks2u.com.au\/geekspeak\/how-mobile-security-works-and-do-you-need-it\/","title":{"rendered":"How mobile security works and do you need it"},"content":{"rendered":"\n<p>As our lives become increasingly more remote and location independent, the need for mobile devices is on the rise. Many Australians enjoy using multiple mobile devices \u2013 such as a smartphone, tablet and computer \u2013 to live their lives. Whether it\u2019s responding to work emails, transferring money to a friend or tracking your steps on a fitness app, we\u2019ve become reliant on our portable devices to get the job done. <\/p>\n\n\n\n<p>Phone security is quickly becoming a hot topic as more and more people adopt remote working and choose not to solely use a desktop computer. Let\u2019s take a look at mobile security, why it\u2019s important and what you can do to stay safe online.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why mobile security?<\/h2>\n\n\n\n<p><br>Mobile security is what protects you online when you\u2019re doing things like sending emails, shopping and using social media. And if you happen to lose your device, mobile security is what you can use to lock it down so no one can access your sensitive data.<\/p>\n\n\n\n<p>There are a few different types of mobile security options, such as anti-theft protection, antivirus and anti-phishing, with options for Android and Apple devices, too.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"439\" src=\"https:\/\/www.geeks2u.com.au\/wp-content\/uploads\/2022\/09\/Mobile-security-new-body-1024x439.jpg\" alt=\"\" class=\"wp-image-42027\" srcset=\"https:\/\/www.geeks2u.com.au\/wp-content\/uploads\/2022\/09\/Mobile-security-new-body-1024x439.jpg 1024w, https:\/\/www.geeks2u.com.au\/wp-content\/uploads\/2022\/09\/Mobile-security-new-body-300x129.jpg 300w, https:\/\/www.geeks2u.com.au\/wp-content\/uploads\/2022\/09\/Mobile-security-new-body-150x64.jpg 150w, https:\/\/www.geeks2u.com.au\/wp-content\/uploads\/2022\/09\/Mobile-security-new-body-600x258.jpg 600w, https:\/\/www.geeks2u.com.au\/wp-content\/uploads\/2022\/09\/Mobile-security-new-body-900x386.jpg 900w, https:\/\/www.geeks2u.com.au\/wp-content\/uploads\/2022\/09\/Mobile-security-new-body-1100x472.jpg 1100w, https:\/\/www.geeks2u.com.au\/wp-content\/uploads\/2022\/09\/Mobile-security-new-body.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What kind of mobile security risks are out there?<\/h2>\n\n\n\n<p><br>The risks to mobile devices and wireless security evolve and get more complex each and every year as technology continues to improve. To help you understand the dangers and keep an eye out for the warning signs, let\u2019s take a look at some of the main risks:<\/p>\n\n\n\n<p><strong>Unsecured Wi-Fi networks<\/strong><\/p>\n\n\n\n<p>Mobile network security is a big deal. Wi-Fi networks that aren\u2019t secure \u2013 they aren\u2019t password protected and are publicly available \u2013 are more risky than those you use at home with encryption. When you connect to a public Wi-Fi network in a cafe or airport, any personal details stored on your phone or tablet can be at risk if the network is compromised.<\/p>\n\n\n\n<p><strong>Outdated operating systems<\/strong><\/p>\n\n\n\n<p>It\u2019s important to keep your phone or tablet\u2019s operating system up-to-date to prevent cyberattacks. To increase your phone security, make sure you\u2019ve got the latest version of your operating system and apps.<\/p>\n\n\n\n<p><strong>Malware<\/strong><\/p>\n\n\n\n<p>Malware is a type of software designed to cause harm to a device. When a mobile phone, tablet or laptop is connected to the internet via Bluetooth, USB or Wi-Fi, it\u2019s susceptible to malware transfers. You can use security software to help manage this risk and protect your devices from this kind of threat.<\/p>\n\n\n\n<p><strong>Lost or stolen phones<\/strong><\/p>\n\n\n\n<p>If you lose your phone, lend it to a friend to use or it\u2019s stolen, it\u2019s at risk of a security breach. Make sure you know where your devices are at all times and take steps to protect your personal data, like using additional password protection.<\/p>\n\n\n\n<p><strong>Anti-theft solutions<\/strong><\/p>\n\n\n\n<p>If the unthinkable happens and you can\u2019t find your device, there are some actions you can take (both before it goes missing and after) to keep your personal information safe.<\/p>\n\n\n\n<p><strong>Location tracking<\/strong><\/p>\n\n\n\n<p>Depending on what device you have, you can track a phone or device marked as missing using GPS. This is handy if you\u2019ve lost your phone or believe it may have been stolen.<\/p>\n\n\n\n<p><strong>Automatic camera snapshots<\/strong><\/p>\n\n\n\n<p>Many devices have the security option to take photos from either the front or back camera and send them to your email. If you suspect someone has taken your phone, you\u2019ll be able to use the photos to identify who has it and where they are.<\/p>\n\n\n\n<p><strong>Be proactive<\/strong><\/p>\n\n\n\n<p>Make sure you set up passcodes on your devices and activate multi-factor authentication where possible. Planning ahead and layering on these mobile security features set you and your devices up for success in the long run!<\/p>\n\n\n\n<p><strong>Personalised on-screen message<\/strong><\/p>\n\n\n\n<p>You can set up your device so that it displays a custom on-screen message if you mark it as missing. This message should include a way to contact you, like an alternative phone number or email address.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Do you need Antivirus on your phone?<\/h2>\n\n\n\n<p><br>Installing Antivirus software can help improve your phone security and give you peace of mind when you\u2019re online and using the Internet. Antivirus software is often quite affordable and can perform the following tasks and more:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Real-time scanning:<\/strong> Your antivirus software can scan incoming emails, websites and messages to make sure they\u2019re safe.<\/li><li><strong>On-demand scanning:<\/strong> If your phone starts acting strangely, you can use Antivirus software to do a quick scan to see what\u2019s happening on your device.<\/li><li><strong>Anti-Phishing:<\/strong> This feature can help you avoid any scam websites as your Antivirus software will flag websites if they seem unsafe or may steal your personal information.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Stay safe on-the-go with the Geeks!<\/h2>\n\n\n\n<p><br>We can set up your <a href=\"https:\/\/www.geeks2u.com.au\/computer-repairs\/network-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">computer and network security<\/a>, as well as your <a href=\"https:\/\/www.geeks2u.com.au\/computer-repairs\/tablet-repairs\/\" target=\"_blank\" rel=\"noopener noreferrer\">iPhone and tablets<\/a>, so you stay safe online and make the most of your devices. <\/p>\n\n\n\n<div class=\"cta flex no-wrap align-center\">\n  <a href=\"tel:1300 769 448\" aria-label=\"Call Geeks2U\" class=\"button is-call tellink \">\n  <div class=\"icon phone\">\n    <svg width=\"2rem\" height=\"2rem\" viewBox=\"0 0 32 32\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" preserveAspectRatio=\"xMinYMin\">\n      <path fill=\"currentColor\" d=\"M11.8,29.9c-0.1,0-0.1,0-0.2,0c-2.3-0.6-4.3-1.7-6-3.3c-1.7-1.6-2.8-3.6-3.5-5.8c-0.1-0.5,0.1-1,0.6-1.1\n      c0.5-0.1,1,0.1,1.1,0.6c0.5,1.9,1.5,3.6,3,5c1.5,1.4,3.2,2.4,5.2,2.9c0.5,0.1,0.8,0.6,0.7,1.1C12.6,29.6,12.2,29.9,11.8,29.9z\n      M12,26.4c-0.1,0-0.2,0-0.2,0c-1.4-0.4-2.7-1.1-3.7-2.1c-1-0.9-1.7-2.1-2.1-3.3c-0.2-0.5,0.1-1,0.6-1.1c0.5-0.2,1,0.1,1.1,0.6\n      c0.3,1,0.9,1.8,1.6,2.6c0.8,0.8,1.8,1.4,2.9,1.7c0.5,0.1,0.8,0.6,0.6,1.1C12.7,26.1,12.4,26.4,12,26.4z M25.2,13.6\n      c-0.4,0-0.7-0.3-0.9-0.6c-0.3-1.1-0.9-2-1.7-2.8c-0.8-0.7-1.7-1.3-2.7-1.6c-0.5-0.1-0.7-0.7-0.6-1.1c0.1-0.5,0.6-0.7,1.1-0.6\n      c1.3,0.4,2.4,1.1,3.4,2c1,1,1.8,2.2,2.2,3.6c0.1,0.5-0.1,1-0.6,1.1C25.3,13.6,25.3,13.6,25.2,13.6z M28.8,13.4\n      c-0.4,0-0.8-0.3-0.9-0.7c-0.5-1.9-1.5-3.6-3-5c-1.5-1.4-3.2-2.4-5.2-2.9c-0.5-0.1-0.8-0.6-0.6-1.1c0.1-0.5,0.6-0.8,1.1-0.6\n      c2.3,0.6,4.3,1.7,6,3.3c1.7,1.7,2.9,3.6,3.5,5.8c0.1,0.5-0.2,1-0.6,1.1C29,13.4,28.9,13.4,28.8,13.4z\"\/>\n      <path fill=\"#fff\" d=\"M23.3,25.5c-3.4,0-7.1-1.8-10.5-5.1c-2.6-2.5-5.6-6.5-5.2-11.1C7.7,8,9.2,6.1,10.9,5.7c1.9-0.5,3,0.8,3.4,1.3\n      c0.5,0.6,1.8,2.3,2.3,3.2c0.6,1.1,0.3,2.6-0.6,3.4c-0.2,0.2-0.3,0.5-0.3,0.8c0,0.3,0.1,0.5,0.3,0.7c0.8,0.7,1.1,1,1.2,1.1l1.1,1.1\n      c0.6,0.6,1.4,0.2,1.6,0c0.9-0.9,2.3-1.2,3.5-0.6c0.9,0.4,2.7,1.7,3.3,2.2c1.2,1,1.7,2.1,1.3,3.3c-0.5,1.6-2.5,3.2-3.8,3.3\n      C23.9,25.5,23.6,25.5,23.3,25.5z M11.7,7.4c-0.1,0-0.2,0-0.3,0c-0.9,0.2-2,1.6-2,2.1c-0.4,3.9,2.3,7.4,4.7,9.6\n      C16,21,19.8,24,24,23.7c0.5,0,1.9-1,2.2-2c0.1-0.4,0-0.8-0.7-1.4c-0.6-0.5-2.2-1.6-3-2c-0.5-0.2-1.1-0.1-1.4,0.2\n      c-1,1-2.9,1.3-4.2,0.1l-1.1-1.1c0,0,0,0,0,0c0,0-0.2-0.2-1.1-1c-0.6-0.5-0.9-1.2-0.9-2c0-0.8,0.3-1.6,0.9-2.1\n      c0.4-0.3,0.5-0.9,0.2-1.3c-0.3-0.7-1.5-2.2-2.1-2.9C12.5,7.6,12.1,7.4,11.7,7.4z\"\/>\n    <\/svg>\n  <\/div>\n  <span>1300 769 448<\/span><\/a><p> or complete our <button aria-label=\"Request a Callback\" class=\"bold red open-modal\">online enquiry<\/button> form today to set up an appointment with a computer repair technician<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>As our lives become increasingly more remote and location independent, the need for mobile devices is on the rise. Many Australians enjoy using multiple mobile&#8230;<\/p>\n","protected":false},"author":9,"featured_media":42026,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16,348,245],"tags":[245],"class_list":["post-30047","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-phones","category-quick-tips","category-security","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/posts\/30047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/comments?post=30047"}],"version-history":[{"count":6,"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/posts\/30047\/revisions"}],"predecessor-version":[{"id":42030,"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/posts\/30047\/revisions\/42030"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/media\/42026"}],"wp:attachment":[{"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/media?parent=30047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/categories?post=30047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/tags?post=30047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}