Our Continuously Connected Lives
Learn how you can operate securely in a world where there is an app for just about everything.
What’s Your ‘App’-titude?
The Internet is evolving from a network individuals connect into, to a network that connects everything to the individual. We are quickly advancing into a world where there is an app for everything. More is still to come as smart cars and smart homes are fast becoming our new reality. As these technologies continue to advance it is important that users understand how to protect themselves from the new risks that they pose. Below are some tips for individuals to operate securely in a digital society.
Keep your apps & operating system updated
Keeping your software up to date ensures that all the latest security patches have been applied and reduces the risk of potential security vulnerabilities being exploited on your device. Only download apps from trusted sources such as the Apple App StoreSM or Google PlayTM Store to ensure the integrity of the application.
Utilize the lock feature on your smart device
Most smart devices today provide the option of locking your device via a password, pin, or swipe combination. If your device has this feature, take advantage of it and select a unique password, pin, or swipe combination.
Ensure your device locks itself automatically
Most smartphones also allow you to configure them to automatically lock after a period of inactivity. Make sure you choose the shortest timeout you are comfortable with to protect your device from unauthorized use.
Turn off Wi-Fi and Bluetooth® when not in use
You think of them as ways to connect to something, but thieves can also use them to connect to your device and access files. Never use public Wi-Fi networks to perform financial or other sensitive transactions.
Be aware of location services
Disable location services for apps on your phone that do not need your location to function. This prevents fraudsters from targeting apps utilizing location services to perform targeted malware attacks or tracking your location patterns to perform social engineering tactics against you.