Book Image

Mobile Security: How to Secure, Privatize, and Recover Your Devices

Book Image

Mobile Security: How to Secure, Privatize, and Recover Your Devices

Overview of this book

The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be compromised if you don't manage your phone or mobile device correctly. Gain the power to manage all your mobile devices safely. With the help of this guide you can ensure that your data and that of your family is safe. The threat to your mobile security is growing on a daily basis and this guide may just be the help you need. Mobile Security: How to Secure, Privatize, and Recover Your Devices will teach you how to recognize, protect against, and recover from hacking attempts and outline the clear and present threats to your online identity posed by the use of a mobile device. In this guide you will discover just how vulnerable unsecured devices can be, and explore effective methods of mobile device management and identity protection to ensure your data's security. There will be special sections detailing extra precautions to ensure the safety of family members and how to secure your device for use at work.
Table of Contents (21 chapters)
Mobile Security: How to Secure, Privatize, and Recover Your Devices
Credits
Foreword
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Tips to Help You Protect Your Mobile Device
The History of Social Networking, the Internet, and Smartphones
Index

Preface

Welcome to the world of mobile devices. Very soon there will be more smart devices than there are people on the planet Earth. Today, nearly every individual uses some kind of mobile device. This is a wonderful time and devices are today's future now. This book, Mobile Security: How to Secure, Privatize, and Recover Your Devices, will not only introduce you to this wonderful mobile world, but also help you manage the basic risk that comes with these devices. This book also covers the topic of the day, privacy. This book will provide you with a step-by-step template on what you need to do to protect yourself, and will also give you instructions on what to do if you have an issue with your device.

What this book covers

Chapter 1, Living in a Mobile World, starts by taking you down the road of mobile devices. We cover how mobile devices are used, definitions like BYOD, and a bit of history. All of this information is to get you ready to understand how to best use your device.

Chapter 2, Users and Mobile Device Management, talks about MDM, which may be a new concept to many device users. MDM is used by many companies in order to keep a firewall between the device and the corporate network. MDM is also used to manage devices and make sure that your device does not adversely impact the corporate network.

Chapter 3, Privacy – Small Word, Big Consequences, talks about privacy, which is a very important consideration in the world of "instant" data. You can Google yourself and find all types of information about you. This chapter will help you understand your Internet identity as well as understanding the type of data that can be found about you.

Chapter 4, Mobile and Social – the Threats You Should Know About, will help you to understand the various scams and social engineering that can impact you. We all live in a social world of Facebook, LinkedIn, or even IBM Connections. These very cool tools can also be used against you. Let's not forget the cloud, another great feature of the social world, but it also has its risks. We will show you how to safely navigate this social world.

Chapter 5, Protecting Your Mobile Devices, shows you the various features smart devices provide that can help you keep your device safe. This can include how to create "good" passwords, using encryption, and whom to contact if you have a problem.

Chapter 6, Support and Warranty Insurance, talks about insurance and support, which can be very confusing. You may get your device from one vendor, your phone service from another, and your e-mail from another. This chapter will show you what you need to do if you have an issue. Also discussed in this chapter is the extended warranty.

Chapter 7, Baby Boomers, Teens, and Tweens – Sorry, we don't have next week's lottery numbers, but we can tell you that the growth of smart mobile devices is significant. Mobile-based solutions using small handheld devices are becoming the standard for personal and business use. In the future, more and more computing will be conducted via these small devices. This chapter will show you what is upcoming and its impact.

Chapter 8, Getting Your Life Back After You've Been Hacked, is not only a summary of what has been reviewed in this book, but most importantly this is a checklist of steps that the end user can use in order to get their life back if they are hacked or if their device is lost.

Appendix A, IBM Notes Traveler, explains the IBM Notes Traveler software, which is a mobile device product that provides access to IBM Lotus e-mails. This product, along with IBM Domino, provides an end-to-end solution for mobile access to corporate e-mail via a mobile solution.

Appendix B, Mobile Device Management, is an advanced chapter that shows the management side of MDM, while Chapter 2, Users and Mobile Device Management, shows the end user impact. This appendix shows the solutions and choices for a corporate environment.

Appendix C, Tips to Help You Protect Your Mobile Device, is a supporting appendix for Chapter 3, Privacy – Small Word, Big Consequences.

Appendix D, Mobile Acceptable Use Policy Template, discusses the Mobile Acceptable Use Policy (MAUP) document that many companies ask end users to sign. This "sample" template is provided as part of this book in order to show you, the end user, what you may need to sign. Also, the MAUP template may be used by a company as a starting point to create a corporate Mobile Acceptable Use Policy for enterprise rollout.

Appendix E, The History of Social Networking, the Internet, and Smartphones, provides additional information about the history of the Internet and mobile technologies.

What you need for this book

In order to use this book you need:

  • A desire to learn about how to keep yourself safe using your mobile device.

  • A mobile device.

  • Time – take time to follow the steps and ask for information. Chapter 8, Getting Your Life Back After You've Been Hacked, is not only a great summary chapter, but also provides a table that you should fill out (keep it safe and don't post it on a social site).

Who this book is for

This book is primarily for you, the person that has a smart device. The appendices have a few sections that include more advanced information on Traveler and MDM. But overall, this book is for anyone that would like to stay safe using their mobile device.

This book provides details on the threats that are manifested daily in our Internet world. Also, this book provides a special list of actions you can take to protect yourself.

Conventions

In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.

Code words in text are shown as follows: "In this case, we've used example.com to test the QR codes."

New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "Enter the information you wish to encode into the QR box, and click on the Submit or Generate button."

Note

Warnings or important notes appear in a box like this.

Tip

Tips and tricks appear like this.

Reader feedback

Feedback from our readers is always welcome. Let us know what you think about this book—what you liked or may have disliked. Reader feedback is important for us to develop titles that you really get the most out of.

To send us general feedback, simply send an e-mail to , and mention the book title via the subject of your message.

If there is a topic that you have expertise in and you are interested in either writing or contributing to a book, see our author guide on www.packtpub.com/authors.

Customer support

Now that you are the proud owner of a Packt book, we have a number of things to help you to get the most from your purchase.

Errata

Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you find a mistake in one of our books—maybe a mistake in the text or the code—we would be grateful if you would report this to us. By doing so, you can save other readers from frustration and help us improve subsequent versions of this book. If you find any errata, please report them by visiting http://www.packtpub.com/submit-errata, selecting your book, clicking on the errata submission form link, and entering the details of your errata. Once your errata are verified, your submission will be accepted and the errata will be uploaded on our website, or added to any list of existing errata, under the Errata section of that title. Any existing errata can be viewed by selecting your title from http://www.packtpub.com/support.

Piracy

Piracy of copyright material on the Internet is an ongoing problem across all media. At Packt, we take the protection of our copyright and licenses very seriously. If you come across any illegal copies of our works, in any form, on the Internet, please provide us with the location address or website name immediately so that we can pursue a remedy.

Please contact us at with a link to the suspected pirated material.

We appreciate your help in protecting our authors, and our ability to bring you valuable content.

Questions

You can contact us at if you are having a problem with any aspect of the book, and we will do our best to address it.