Jlhoffman Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 18 December 2012

Let's Review Some Basic Tablet Security Tips

Posted on 15:03 by Unknown
Here's a quick checklist of security tips for your tablet:
Don’t jailbreak ** your tablet – this might expose the device to greater security risks.   What's Jailbreaking?  See Below **

Be wary of any apps you download – Always check the author.  Don’t download any paid-for apps which are suddenly are available for free, and be wary of any changes in any permission changes it may seek for accessing data. 

Always use a strong password in case your tablet is stolen, and download the Find my iPhone app (also works for iPads) – or download some similar security software for Android – which will locate the device in the event it's lost or stolen.  Remember, 1 in 10 portable computers are stolen!

Be wary of public Wi-Fi !  You may be "snooped on" so avoid logging into web accounts unless you use SSL encryption. Never try to do anything on public Wi-Fi that you’re not comfortable with a bunch of strangers seeing.

Don't trust the "native" security features of your tablet no matter how secure you think they are.  Download a third party mobile security software which will block malicious apps, scan for malware, prevent data loss and locate, lock or wipe a missing device. Recent security reports show that many native O/S across all platforms stop less than 50% of known malware.

** The act of 'jailbreaking' is changing the technical settings of a device so that users can download applications that are not approved by the tablet or smartphone maker.  It is illegal to tamper with the settings of a tablet but, ironically, it's not illegal to jailbreak a smartphone.  Go Figure!
Thanks to Tony Larks, Vice President, Global Consumer Marketing, Trend Micro for sharing these tips.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Ransomeware Now #1 MalwareThreat - Learn More Here
    I just read an outstanding white paper from a couple of researchers at Sophos Security outlining how Ransomware is passing up FakeAlert malw...
  • Computer Support Rates - When Cheap Really Isn't
    What's in a labor rate?  Why are some IT companies more expensive than others?  Our company is neither the most expensive in our market ...
  • Server Configuration - Heaven Save Us From Well-Meaning Amateurs!
    How do I tell the client what their old tech did to them?  They've got to spend a bunch of money to correct the mess he made and I'm...
  • When It's Time To Fire A Customer
    What?  Isn't that backwards?  Isn't it the customer that usually does the firing? Usually, as business people, we work so hard to fi...
  • Using Personal Computers In the Workplace
    At ACT, we support a great many organizations that allow employees to use their own computers at work.  Sadly, I've noticed that some of...
  • What to do with Windows XP
    Well, it had a good long run.  Windows XP is now 13 years old.  In less than 10 months Microsoft is pulling the plug on our old friend XP.  ...
  • Wireless Networking Is Due For A Big Jump In Performance
    Just when we were getting comfortable with the 802.11n wireless standard, here comes a newer and better wireless solution - 802.11ac.  It wi...
  • Documentation - The Key To Client Support Success
    Recently, we won the trust of a new client that was unhappy with the service provided by their previous IT company.  After the client notifi...
  • Going to the Cloud is easy, getting out is a lot tougher!
    Everyone is pushing you to take your business to the cloud, right?  It's easy, right?  The sales rep used all the right words in his pit...
  • Support for Windows XP and Office 2003 stops on April 8th.
    All Microsoft support for Windows XP and Office 2003 stops on April 8th. What are the risks to your business if you don't upgrade? Let...

Blog Archive

  • ►  2013 (39)
    • ►  November (3)
    • ►  October (4)
    • ►  September (2)
    • ►  August (4)
    • ►  July (3)
    • ►  June (9)
    • ►  May (3)
    • ►  April (3)
    • ►  March (6)
    • ►  January (2)
  • ▼  2012 (12)
    • ▼  December (2)
      • Let's Review Some Basic Tablet Security Tips
      • Paying the Price for BYOD and Social Media
    • ►  November (8)
    • ►  October (2)
Powered by Blogger.

About Me

Unknown
View my complete profile