Are You Having A Technology Emergency?

Aspire Technical Blog

Aspire Technical has been serving the Phoenix Metro area area since 2000, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Let’s Face It: If Anyone Knows Security, It’s the National Security Agency

Let’s Face It: If Anyone Knows Security, It’s the National Security Agency

The NSA—the National Security Agency of the United States of America—are pretty well-known for their digital prowess. Therefore, when they provide a list of practices to help keep our increasingly crucial mobile devices secure, it only makes sense for us to listen. 

Let’s talk about some of the takeaways that we can glean from what the NSA has shared.

Examining the NSA’s Mobile Device Best Practices

The NSA's advice is available as a free download of a useful reference sheet that addresses many features that can be used to undermine security. It covers many safeguards and practices that most people might not consider, as well as the usual suspects.

Let’s consider some of each group, starting with the basics:

Common Mobile Device Security Practices

  • Passwords/PINs - We will repeatedly state how important it is to use secure passwords and PINs, and the NSA agrees. They say that devices should be set to lock themselves after five minutes of inactivity and automatically wipe themselves after 10 incorrect attempts to provide the code… which they establish as the minimum requirement for having a six-digit access number.
  • Application selectivity - According to the NSA, one should always be careful of the data one puts into any application. There should always be a minimal number of applications installed, exclusively from official platform app stores. All applications should also be fully closed when not in use.
  • Location services - The NSA recommends disabling these capabilities whenever they are not actively in use, as you should with BluetoothⓇ connectivity.
  • Software updates - The National Security Agency recommends updating mobile device software and applications “as soon as possible.”

More Specific Mobile Device Security Practices

  • Pick a protective case - The NSA recommends seeking out a case for your mobile device that covers the camera when not in use and blocks ambient audio from elsewhere in the room.
  • Speak softly - It is also recommended that you refrain from having conversations about sensitive topics on or even around mobile devices, at least those that aren’t encrypted via secure voice capabilities.
  • Be specific about accessories - The NSA establishes that only trusted accessories—and never public ones—should be connected to a mobile device. Avoid charging the device in public charging stations.
  • Leave the device alone - Some more advanced users (or those who Google things) may be tempted to jailbreak or root their mobile devices. This means that they could install otherwise unapproved applications or access the OS' subsystems, respectively. Since this also means the device is more vulnerable to threats, it should not be attempted.

It’s Important to Recognize How Simple it Is to Be Vulnerable

The long and the short of it is that cyberattacks are always improving, seeking out untapped opportunities to spread more threats and steal more data, which means that your business’ technology needs to be secured… regardless of its form factor.

That’s where Aspire Technical comes in. We help businesses maintain their IT for both productivity and security, and we could help yours, too. Give us a call at (480) 212-5153 to learn more.

Does Your Team Know How Responsible They Are for Y...
The Five Largest Data Breaches of 2024 (So Far)
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Wednesday, 20 November 2024

Captcha Image

Contact Us

Learn more about what Aspire Technical can do for your business.

Call Us Today
Call us today
(480) 212-5153

1273 W. Morelos St.
Chandler, Arizona 85224

Latest Blog

Picture this: you or a team member encounters a technology issue in the middle of the workday. Simple, you might think… just call your in-house IT department. However, the members of your IT team are visibly overworked, scurrying around the...
TOP