FCC offers security advice to smartphone users
FCC publishes 10-step plan for securing mobile devices and their data
IDG News Service - The U.S. Federal Communications Commission is advising smartphone users on how to protect their mobile devices and data from mobile security threats.
The Commission released an online tool called the "Smartphone Security Checker" on Tuesday that outlines a 10-step action plan that mobile users can follow to prevent their personal data from being exposed in case their devices get infected with malware or are lost, stolen or resold.
The tool provides recommendations including: locking access to the phone with PINs or passwords; avoiding changing the phone's factory security settings or rooting/jailbreaking the phone; backing up the phone data regularly in the cloud, on a computer or on a removable memory card; installing apps only from trusted sources and after checking their user reviews; reviewing and understanding the permissions requested by applications before installing them; installing the firmware updates issued by the manufacturer; installing security apps that allow remote locking and wiping of the phone; avoiding connecting to the Internet from untrusted wireless hotspots; wiping data from the phones before reselling; donating or recycling devices; and reporting stolen devices to the authorities and the operator for inclusion in a national database of stolen smartphones.
The recommendations were drafted by the FCC in collaboration with the U.S. Department of Homeland Security; the Federal Trade Commission; the National Cyber Security Alliance; CTIA, a wireless industry trade association; and other public and private sector partners including antivirus vendors and cybersecurity organizations.
The tool allows smartphone owners to choose their device's OS. The available options are Android, Apple iOS, BlackBerry and Windows Phone. The steps are the same for all types of devices for the most part, but depending on the OS choice they might include links to OS-specific instructions for performing certain recommended actions.
The FCC checklist is one of the most comprehensive sets of rules for safeguarding smartphone devices and data published so far, said Bogdan Botezatu, a senior e-threat analyst at antivirus vendor Bitdefender.
"However, some provisions, although they make sense 'on paper,' are impossible to control by the user," he said. "For instance, most smartphones cannot be updated because vendors do not provide any security fixes past the maximum Android version supported by the respective hardware. Android versions from 2.3 to 2.3.3 are vulnerable to a number of known bugs -- some of them quite severe, such as USSD attacks -- but mobile phone vendors and carriers have stopped update delivery. In this context, the user is forced to either put up with an unsecured device that can be exploited at any time or to root their gadget and manually update its firmware."
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Review: Box beats Dropbox - and all the rest - for business Box trumps Dropbox, Engyte, Citrix ShareFile, EMC Syncplicity, and OwnCloud with rich mix of file sync, file sharing, user management, deep reporting and...
- Analyst Report-Mixed All Flash Arrays Delivers Safer Higher Performance What is the impact of an all-flash array with enterprise features and reliability on the mainstream data center? In the mainstream environment, storage...
- Embracing Flash Storage Exec Brief Flash storage can deliver impressive performance, especially for random I/O, by eliminating rotational and seek latencies that are common in all hard disk...
- Embracing Tiered Storage Exec Brief All data is not created equal and thus all data need not be treated the same by the storage system. IT executives must...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Four Myths of High-Productivity App Dev Debunked Debunk the main myths surrounding high-productivity application development and how both platforms have overcome them. All Privacy White Papers | Webcasts