8 ways to feel and be safe on the go
Click below if you prefer to listen.
All of us move around all the time. Life has become so busy that we interact and communicate in so many ways both online and offline. That connectivity comes with great opportunities. From an international market place to personal and professional success and growth opportunities but it comes with some dangers we can minimize our exposure too as much as we can so that we can enjoy the benefits.
Our phones are one of those tools that are travelling with us everywhere we go. They are one of those things that are around us 24/7 and that is great because they enable us to connect with anyone anytime.
However mobile phones remain the most common cyber-attack surface and that is due to one property they have. The environment they are in changes all the time meaning; once you are at home sleeping and taking a shower, next you are commuting, working, drinking a coffee with a friend and even exercising. Not all those environments are in your control meaning that the threat space is increasing and that is because you cannot anticipate and prepare for the dangers that may arise.
Even though you cannot prepare for all that might come your way while you are on the go here are things you can apply immediately in order to minimize and control as much as you can your exposure to dangers that can arise.
As you know I am all about actionable security so before we dive in, I have prepared a freebie for you, a security action plan sheet which will help you implement what you are currently learning in this episode immediately so click in the image below
#1 Switch off your Wi-Fi before leaving home
That is right. Attacks to the Wi-Fi using the same name as your house are a smart and cheap way for cyber-criminal to compromise your device. That is why it is important to keep your device safe while on the go as you are out of range anyway and not able to use it.
#2 Make sure your apps do not broadcast your location
We use so many applications to make every aspect of our lives easier and that is great, but have you ever noticed how much information every app is giving away about you? Take a step back and ask do I really need this app and if yes does it really need access to my location, my camera, my microphone, my contact list, my photos? Take the time to amend those privileges because they are the opening to your habits and behaviors and eventually to your protection.
#3 Avoid Bluetooth enabled on public places
Bluetooth is one of the most dangerous technologies and that is because it wasn’t designed with security in mind. So, while you are on the go avoid talking through a headphone which is connected with a Bluetooth to your device. Not only do you enable a cyber-criminal to eavesdrop your conversations, but you allow him to connect to your device from a close proximity and once he/she has access to it can control both your device and eventually manipulate your life.
#4 Do not enter passwords under cameras and with people around you
Most of the times we are not aware of our surroundings but recently those have changed so much. We are so drawn to our phones that we move around unconsciously and that can be a great danger both for our physical and virtual security. One of the most obvious ways is the Blue Whale game that children move around looking for clues using their phone completely ignoring the physical world with result hitting to physical barriers or hit by a car because they cross the road without checking. However, there are less obvious things we do. In fact, surveillance through cameras is applied everywhere. From the local shop in the corner to street cameras which are in place to avoid crime. Have you noticed how many times you are typing passwords and write and read text messages or talking to your phone while you are underneath that camera? You never know about the ethical background of the person monitoring nor you can be aware of their motives so next time just be more careful.
You cannot control the attacker & the systems. You can control the human factor & your data.
Can you see how the question “What is in your control?” can change your protection mode from reacting to anticipation? Anticipation stage is the most powerful place you can be with the attacks threatening the survival of your business. Asking the right question is the way to solve a problem according to Keith Cunninghton. Most problems remain unresolved not because of a bad answer, but because they answered a wrong question.
#5 Do not mention personal details while on bank or over the phone with people around you
One of the most dangerous habits you have is replying to people around you, giving personal details which can be used in order to orchestrate an attack against you. Unfortunately, many providers for services we use on our daily lives like phone and electricity company or your bank have been using still a very dangerous approach to identify us and that is our full-name, id number, home address and date of birth. Be cautious when people ask you to provide those details when there are other people around you and inform those providers that you want them to be more cautious with your information. After all, GDPR is on your side.
#6 Do not leave your devices unattended
One of the greatest misconceptions your mind can get you to is that of familiarity. What do I mean by that? By visiting or working on an area for a long period of time it does not make it a safe environment and that is because each moment is completely different from another. So, do not leave your phone unattended while going to the rest room or grapping a glass of water. You never know who has malicious goals and what is their purpose.
#7 Make sure your phone is not recording and mostly broadcasting your habits and behaviors
Your phones are always and go everywhere with you and using all those apps allow them to hold a great amount of information about you. Make sure you do not rely to them as much as possible, disable apps you do not need, shut them down while sleeping and beware what you post online and when. In these modern times we live the most exposure to danger comes from visibility to your behaviors and habits. Do not give them away with ease.
#8 Avoid saying everything over the phone or play with them
Unfortunately, tapping someone’s phone unofficially is a trend. From phone cloning to actual carrier console what really matters is that it is possible. So, avoid saying everything about your life over the phone and make sure that your devices are not left alone and are well-secured with antivirus and anti-malware protection software at all times. In case you worry if your phone is tapped then check this article and this one for tools to check your phones for spyware.
There you go. Eight ways to feel and be safe on the go.
Now it’s your turn. Which tip are you going to apply immediately?
If you like what you learn then leverage the free material and resources by joining Security Inner Circle. You will receive notifications for every new episode of Your Security Boost, be the first to know about new online courses and seminars I have available plus some additional bonuses that are only available to my community.
Now is your turn:
If you found this episode valuable click the link below and become an insider and do not forget to download the Free Security Action Sheet that I have prepared for you in order to get the full benefits of this episode. Just click the image below.
If you liked this episode then like and share it with others.
Have a great day and remember is all about actionable security and actionable security is all about building protective habits and behaviors.
8 ways to feel and be safe on the go Click below if you prefer to listen. Free Security Action Sheet: Ways to be safe at home #1 Change your default Wi-Fi password When you purchase a Wi-Fi subscription you receive a router which allows you to connect to the internet...
What chance do I have to protect my valuable assets when the hacker is smarter than me? Click below if you prefer to listen. Free Security Action Sheet: Two components for Protection I get to hear this question all the time at the Security Awareness” seminars I...
Prominent changes in the trajectory of the Cyber-security space Part 2 Click below if you prefer to listen. Free Quick start guide: Master your business Protection In the previous episode we have covered six of the twelve prominent changes in the trajectory of the...
and get the latest updates