Securing your devices
Never leave your devices unattended. If you need to leave your computer, phone, or tablet for any length of time, no matter how short—lock it up so no one can use it while you’re gone. If you keep sensitive information on a flash drive or external hard drive, make sure to lock it up as well (and make sure it is encrypted).
Securing Your Mobile Device
As your device could be used for work purposes it's important you protect it in case it was lost or stolen and the data on there got into the wrong hands.
- Protecting access to the device is a must. Methods to control this includes pin code, password or fingerprint. Also, it may be possible to set up your device to automatically lock if it's not used for a few minutes in case you forget to do it
- Encrypting your device protects it further, and some new models do this automatically. The data on there would be scrambled if someone malicious tried to gain access to it without the correct login details
- Consider remote wipe facility if your device is lost or stolen. Some devices also automatically wipe if someone enters the wrong login details after a certain amount of times
How to decide what permissions to give you mobile applications
Think before you install. When you want to download an app ask yourself some basic questions:
- What exactly is the application meant to do
- What will it need to do that? For example, a mapping tool will require your location data
- Has it got good reviews? Do the reviews look like they are from genuine users
- Do I trust the people who developed it
These questions will help you decide whether to download the app and what permissions to grant it.
Applications requiring location information
Many apps ask for your location information. Some apps will require it for legal or practical reasons but the majority will use it to serve advertisements to you based on your area. Only give this data to apps you think need to have it in order to function correctly.
- How do they store this information about your location?
- Do you know how long they may keep it for?
- Will it be sold on to third parties?
If in doubt, don’t grant the permission or don’t install the app.
Location information can be used to track you and identify where you live and your place of work... Read the privacy policies for apps that use location information so you can make an informed decision.
Applications that request your contacts and social media accounts
Some applications will request access to your contacts and social media accounts, this can be to send messages or to authorise your account.
It can also be used to post things on your behalf using you as an advertising tool or as a way of harvesting contact details which malicious apps will then sell on.
Make sure you trust the company as you're giving them yours and all your friends’ details. If you have any concerns, don’t grant the permission or don’t install the app.
Applications that request control of your camera or microphone
Applications regularly ask for access to the camera and microphone. Do you know if they can record your microphone constantly or when you take a video/make a call?
If you have any concerns, don’t grant the permission (or remove them afterwards) or don’t install the app.