a portable computing device such as a smartphone or tablet computer
The convenience of being able to access information from any internet-connected device is great. We now have a culture where people can access their work, school, medical and personal information at any time using a smartphone or tablet. Vulnerabilities in the apps, software and operating systems we use every day on these devices could make us more susceptible to cyber threats. However, practicing safe computing habits and securing your device with passwords, two-factor authentication, and through other methods, can help keep your information safe from exposure.
- Secure your devices. Use strong passwords or touch ID features to lock your devices. These security measures can help protect your information if your devices are lost or stolen and keep prying eyes out.
- Think before you app. Information about you, such as the games you like to play, your contacts list, where you shop and your location, has value – just like money. Be thoughtful about who gets that information and how it’s collected through apps.
- Now you see me, now you don’t. Some stores and other locations look for devices with WiFi or Bluetooth turned on to track your movements while you are within range. Disable WiFi and Bluetooth when not in use.
- Get savvy about WiFi hotspots. Public wireless networks and hotspots are not secure, which means that anyone could potentially see what you are doing on your mobile device while you are connected. Limit what you do on public WiFi and avoid logging in to key accounts like email and financial services on these networks. Consider using a virtual private network (VPN) or a personal/mobile hotspot if you need a more secure connection on the go.
There are no forms related to this service.