Mobile Device Security

Protecting your smartphones and tablets.

Why Mobile Security Matters

Your phone likely contains more sensitive information than any other device you own:

Data on Your PhoneRisk if Accessed
EmailAccess to password resets
Banking appsFinancial theft
Authenticator appsBypass 2FA on all accounts
PhotosPrivacy invasion, blackmail
MessagesPrivate conversations exposed
Location historyStalking, burglary timing
ContactsSocial engineering material
Health dataInsurance discrimination

Lock Screen Security

Your lock screen is the first defense against physical access.

Lock Methods Comparison

MethodSecurityConvenienceRecommended
No lockNoneMaximumNever
SwipeNoneMaximumNever
PatternLowHighNo
4-digit PINLowHighMinimum
6-digit PINModerateModerateGood
PasswordHighLowerBest for sensitive needs
Fingerprint + PINHighHighRecommended
Face + PINHighHighestRecommended

Lock Screen Best Practices

SettingRecommendation
Auto-lock timeout30 seconds to 1 minute
Lock after failed attemptsEnable after 5-10 failures
Wipe after failuresConsider for very sensitive data
Lock screen notificationsHide sensitive content
Emergency infoAdd emergency contact

Biometric Considerations

Biometric TypeStrengthsConcerns
FingerprintConvenient, hard to spoofCan be compelled by authorities
Face ID (advanced)Very convenient, secureSame legal concerns
Face unlock (basic)ConvenientCan be fooled by photos
Iris scanVery secureLimited device support

Legal note: In many jurisdictions, you can be compelled to provide biometrics but not passwords. Consider this for border crossings or high-risk situations.

iOS Security

iOS Security Advantages

FeatureWhat It Does
App sandboxingApps can't access each other's data
App Store reviewApps checked before publication
Secure enclaveHardware protection for sensitive data
Regular updatesLong support window
Restricted sideloadingApps must come from App Store

Essential iOS Security Settings

SettingLocationRecommendation
PasscodeSettings > Face ID/Touch ID6-digit or alphanumeric
Auto-lockSettings > Display & Brightness30 seconds to 1 minute
Find My iPhoneSettings > [Your Name] > Find MyEnable
Erase after attemptsSettings > Face ID/Touch IDEnable (10 attempts)
Lock screen previewSettings > NotificationsShow When Unlocked
USB AccessoriesSettings > Face ID/Touch IDOff (requires unlock)

iOS Privacy Settings

SettingLocationRecommendation
Location ServicesSettings > PrivacyApp-by-app basis
TrackingSettings > Privacy > TrackingAllow Apps to Request: Off
App Privacy ReportSettings > PrivacyReview regularly
Significant LocationsSettings > Privacy > LocationDisable or clear
AnalyticsSettings > Privacy > AnalyticsDisable sharing

Android Security

Android Security Considerations

FeatureWhat It Does
Google Play ProtectScans apps for malware
Monthly security patchesFix vulnerabilities
App permissionsGranular control
Work profileSeparate work and personal
Sideloading possibleMore flexibility but risk

Essential Android Security Settings

SettingLocationRecommendation
Screen lockSettings > Security > Screen lockPIN, password, or pattern + biometric
Auto-lockSettings > Security30 seconds to 1 minute
Find My DeviceSettings > Security > Find My DeviceEnable
Google Play ProtectPlay Store > Profile > Play ProtectKeep enabled
Install unknown appsSettings > Apps > Special accessDisable for all
Lockdown modePower menuKnow how to use it

Android Privacy Settings

SettingLocationRecommendation
App permissionsSettings > Privacy > Permission managerReview and restrict
AdsSettings > Privacy > AdsReset ID regularly
LocationSettings > LocationApp-by-app basis
Usage and diagnosticsSettings > PrivacyConsider disabling
Autofill serviceSettings > PrivacyUse trusted manager

App Security

App Installation Safety

DoDon't
Use official app storesInstall from random websites
Check developer nameInstall knockoff apps
Read recent reviewsIgnore warning signs
Check permissions requestedGrant all permissions
Keep apps updatedUse outdated apps

App Permission Best Practices

PermissionWhen to Grant
CameraPhoto apps, video calling, QR scanning
MicrophoneVoice calls, voice recording apps
LocationMaps, weather (when using)
ContactsCommunication apps you trust
PhoneOnly if calling features needed
StorageFile managers, photo apps
Background locationAlmost never

Evaluating App Safety

CheckRed Flag
Developer nameUnknown or misspelled
Review countVery few reviews
Recent reviewsReports of malware or scams
PermissionsExcessive for app function
Update frequencyNot updated in years
Download countVery low for established app

Mobile Malware

Types of Mobile Malware

TypeWhat It Does
SpywareMonitors your activity
Banking trojansSteals financial credentials
RansomwareLocks device, demands payment
AdwareDisplays intrusive ads
SMS fraudSends premium SMS messages
CryptominersUses phone for cryptocurrency

Signs of Mobile Infection

SymptomPossible Cause
Rapid battery drainMalware running constantly
Excessive data usageData being exfiltrated
Pop-up ads outside appsAdware infection
Unknown apps appearingMalware installing more malware
Phone overheatingCryptominer running
Strange text messagesSMS malware
Slow performanceMalicious background activity

Mobile Malware Protection

ActionBenefit
Keep OS updatedPatches vulnerabilities
Only use official app storesVetted apps
Check app permissionsLimit access
Don't jailbreak/rootMaintains security model
Use built-in security featuresPlay Protect, iOS security
Be cautious with linksMobile phishing is common

Lost or Stolen Device

Before It Happens

PreparationPurpose
Enable device trackingLocate if lost
Enable remote wipeProtect data if stolen
Record serial/IMEIFor police reports
Enable encryptionProtect data at rest
Use strong lockPrevent unauthorized access
Set up backupRecover data on new device

If Device Is Lost

StepAction
1Try to locate with Find My iPhone/Device
2Play sound if nearby
3Enable lost mode (shows contact info)
4If definitely stolen, remote wipe
5Report to carrier to disable SIM
6Change passwords for sensitive accounts
7File police report if stolen
8Remove device from trusted devices

Finding Your Device

PlatformService
iPhoneicloud.com/find or Find My app
Androidgoogle.com/android/find or Find My Device app
Samsungfindmymobile.samsung.com

SIM Security

SIM Swap Attacks

Attackers convince your carrier to transfer your number to their SIM:

Attack StepWhat Happens
Information gatheringAttacker collects your personal info
Contact carrierPretends to be you
Transfer numberYour SIM stops working
Receive 2FA codesAttacker gets your SMS
Account takeoverAccess accounts using SMS 2FA

Protecting Against SIM Swap

ActionHow It Helps
Add carrier PINRequired to make changes
Ask about port freezePrevent number transfers
Use authenticator appsDon't rely on SMS 2FA
Minimize public personal infoLess for attacker to use
Act quickly if SIM failsSign of attack in progress

Carrier Security Features

CarrierSecurity Options
Most carriersAccount PIN required for changes
T-MobileSIM Protection feature
AT&TExtra security passcode
VerizonNumber Lock feature

Mobile Payment Security

Digital Wallet Security

WalletSecurity Features
Apple PayTokenization, Face/Touch ID required
Google PayTokenization, screen lock required
Samsung PayTokenization, fingerprint required

Mobile Payment Best Practices

DoDon't
Enable biometric authenticationStore card photos in gallery
Keep phone OS updatedUse on jailbroken/rooted devices
Only add trusted cardsShare phone with others
Lock phone when payingLeave phone unlocked
Review transaction notificationsIgnore suspicious charges

Mobile Backup

Backup Importance

ReasonBenefit
Device lossRestore data on new device
Device failureDon't lose photos and data
RansomwareRecover without paying
UpgradeSmooth transition

Backup Options

PlatformBuilt-inFrequency
iOSiCloud BackupAutomatic daily
AndroidGoogle BackupAutomatic
BothComputer backupManual, periodic
BothThird-party cloudVaries

What Gets Backed Up

Typically IncludedOften Not Included
App dataSome app-specific data
Photos (if enabled)Downloaded files
SettingsApps themselves (redownloaded)
MessagesSome authentication tokens
ContactsWhatsApp (needs separate backup)

Traveling with Mobile Devices

Before Travel

TaskPurpose
Back up deviceProtect data before trip
Enable Find MyLocate if lost
Update everythingLatest security patches
Consider travel modeLock down sensitive apps
Note emergency contactsAccessible even if phone lost

At Borders

RiskConsideration
Device searchAuthorities may request access
Data seizureContents may be copied
Forced biometric unlockMay be compelled
Encrypted dataMay be held until unlocked

Options for high-risk travel:

OptionTrade-off
Travel with clean deviceInconvenient but safe
Remove sensitive appsBalance of access and risk
Use strong password onlyCan't be compelled like biometrics
Cloud storage (not on device)Access after passing border

Using Phones Abroad

IssueSolution
Public WiFi risksUse VPN or cellular data
Charging stationsUse own charger or data blocker
Lost phone in foreign countryHave backup contact method
Local SIMSecure your regular SIM

Key Takeaways

  1. Lock your phone - Use 6-digit PIN minimum with biometrics
  2. Enable Find My - Essential for lost or stolen devices
  3. Update regularly - Security patches matter
  4. Official app stores only - Side loading increases risk
  5. Review permissions - Don't give apps more access than needed
  6. Protect against SIM swap - Set carrier PIN, use authenticator apps
  7. Back up regularly - Automatic cloud backup preferred
  8. Prepare for loss - Know your remote wipe and locate options
  9. Mobile payments are safe - Tokenization protects card numbers
  10. Consider border crossing risks - Travel mode or clean device for sensitive situations