Last updated on April 19, 2014 at 18:42 EDT

Attevo Offers a 13-Point Security Checklist for Smartphone Users

March 20, 2012

CLEVELAND, March 20, 2012 /PRNewswire/ — The rapid and widespread adoption of smartphones has profoundly transformed how we communicate, learn, solve problems, shop, travel, work, pay bills and entertain ourselves. Ease of use, convenience, instantaneous information access and an endless number of helpful or amusing applications (apps) have made the smartphone a device that a majority of owners keep within arm’s reach 24 x 7. For many, the smartphone has become an indispensable tool for streamlining, enriching and organizing one’s life. With over 1 billion smartphones worldwide and 94.1 million in use domestically, the smartphone is arguably the most feature-rich, multifunctional device ever created. The smartphone is a thinking person’s Swiss army knife.

While smartphones can make a significant and positive impact on those who embrace the technology, conversely the technology can wreak havoc on its users if they are complacent, careless or re-active to the ever expanding number of security threats. Inattention to potential security threats can result in the invasion of privacy, identity theft, inconvenience, the loss of intellectual property and the actual loss of money. The more dependent a smartphone user is on the technology, the more they have at risk.

Attevo, Inc. is a business and information technology consultancy that has participated in the implementation of mobile banking applications within 8 of the 10 largest financial institutions in North America. While banks and their technology partners like Attevo invest considerable attention and resources to provide highly-secure mobile banking transactions, consumers can unwittingly undermine their bank’s robust security efforts with an indifferent or relaxed attitude about the security necessities of their own smartphones.

According to John Frankovich, COO and Managing Partner of Attevo’s Mobile Interaction Practice, “Mobile security must become second nature to users; these consumers need to be ever vigilant and proactive in managing the security of their smartphones.” To help with this task, Frankovich offers the following Attevo 13-Point Checklist of security habits and usage suggestions for all smartphone owners:

  1. Always maintain physical control over your smartphone to prevent outright theft, unauthorized usage or the installation of malware (apps with malicious code) by seemingly mild-mannered co-workers or by ruthless digital predators; treat a smartphone like a wallet, never leave it unattended in public spaces.
  2. Enable the smartphone’s password/passcode protection setting; a recent study reveals that only 38% of smartphone users enable this basic security feature.
  3. Install operating system updates whenever they become available to reduce the number of system vulnerabilities; a 2011 report indicated that 90% of Android users were running outdated operating system versions with serious security vulnerabilities.
  4. Install an anti-malware protection app (if available for the device) to thwart infection from malicious apps and websites; all major platforms have been hacked and are susceptible.
  5. When using the smartphone’s web browser, avoid suspicious/questionable websites that can be the source of malicious code.
  6. Be selective when buying or installing apps; wait for app reviews, download only from trusted sources (known app stores) and be cautious/suspicious of free apps, because they are free for a reason (the reason could be access to your data).
  7. Understand and control each downloaded apps “access” to smartphone data and personal information; game apps do not need access to phonebook contacts, photos, e-mails, location, browsing history, texting history and other phone features (avoid allowing automatic app updates).
  8. Do not save passwords, PINs or other account information as Contacts or in Notes.
  9. Avoid using open WIFIs, especially for shopping and banking activities; WIFI sniffing is a common occurrence that can have significant consequences like lost credit card numbers.
  10. Avoid opening suspicious e-mail or SMS text messages, especially from unknown sources; unwary readers may be unwillingly tricked into phishing by entering sensitive information from online prompts.
  11. Turn the Bluetooth access feature off when not needed and avoid Bluetooth use in busy public areas.
  12. Utilize a PIN to access voice-mail and avoid using the carrier’s default PIN setting.
  13. Insure that smartphone e-mail account access is through either a SSL or HTTPS connection so that transmitted data is encrypted.

Cleveland-based Attevo, Inc. delivers business and information consulting services to large, enterprise-class organizations that need assistance with program management, master data management, business intelligence, data loss prevention & risk, mobile interaction and strategic information planning. Working nationwide, Attevo has developed a reputation for execution according to plan, while keeping budgets and delivery timelines in check. The Attevo team of consultants is skilled with and certified in many of today’s leading technology toolsets. In addition to financial sector experience, Attevo serves clients in the manufacturing, insurance, healthcare, public sector, logistics, consumer goods, retail and software industries.

John Frankovich
1375 E. 9th Street, Suite 2500
Cleveland, OH 44114


SOURCE Attevo, Inc.

Source: PR Newswire