Business and organizations needs to be alarmed …show more content…
Users should never download or accept programs and content from unidentified or un-trusted sources and be cautious when joining to publicly available Wi-Fi hotspots [2]. Do not install illegal or unauthorized applications or software on the mobile cell phone or any other device. Furthermore, backing up cell phones data such as; pictures, music, and other personal files should be considerate [3]. Completely remove all data and settings on one’s cell phone before disposal or handling to a different person such as; a family member or sending to the cell phone provider for repair or replacement.
Equipment loss or theft increases with portability. Cell phones and other devices, because of their portability, is a phone to loss and theft. It is commonly accessible for employees or other users to leave them in buses, planes, taxis and other locations, and it is easy for thieves to swipe them from unsuspecting employees. Portability and mobility increase threats to data protection, it’s easy enough to steal or lose a cell phone device and simply leave it lying around. To prevent and defend against casual data access, all users can implement device lock and pin-based …show more content…
One way to highlight this need is by preparing employees and providing education and training on cell phone security. It is critical that user and employees gain knowledge concerning mobile device security from global security issues, security threats and attacks, and security countermeasures. These folks would then be better able to address these issues when they become in contact with an issue that involved cell phone security, viruses, protection, and total care. When treated as a pervasive theme, mobile device security issues can be integrated into the entire education and training