9 Tips on Securing Your Devices

In the rather wacky 1993 film Benny & Joon,  Mary Stuart Masterson portrays the role of Joon who, apart from using the laundry iron to toast bread, insists on wearing a motorbike helmet whilst driving in the car. Similarly, cyber security can sometimes get a bit out of hand – security should not get in the way of productivity; it should be pragmatic and relatively easy to use.


Be balanced about security – most companies at present seem to be erring on the side of economising, for which they pay heavily in the long run when things go wrong.

Additionally, the approach to security should be balanced. On the one hand, there is fear mongering, which breeds paranoia, and on the other hand, there is head-in-the-sand ignoring of the problem, which leads to that inevitable moment when the person goes: “If only I had…”

Here are 3 steps for 3 different devices you can take to be more secure right now, without having to wear a tinfoil hat.

Mobile Phone

iPhone, Android or Windows, you do need to be careful how and when you use your phone.

Free Wi-Fi in public places? Think again.
  1. Avoid public Wi-Fi wherever possible. Consider upgrading your mobile Internet bundle instead. Have a look at my other article on public Wi-Fi.
  2. When downloading new apps, thoroughly read the permissions that the app requires. Alarm bells should ring when something like a game asks to access your phone dialer, messaging service, emails and address book
  3. Use the lock-screen function. Whether you swipe a pattern, smile at the camers, use your fingerprint or type in a code, make sure that you and only you can access your phone.

Laptop/ tablet

A stolen laptop represents more than just the loss of the device…

Laptops and tablets are carried around and used outside the office. This makes them quite vulnerable. On average, a laptop is stolen somewhere in the UK every minute, most of these being in pubs and on public transport.

What happens if the device gets lost or stolen?

  1. Be careful not to leave your laptop or tablet unattended. This is an open invitation not only for the theft of the device itself, but also for someone to tamper with it/ upload malware/ steal data.
  2. Be careful when using a laptop on e.g. a train, at a coffee shop or any public area – someone might be “shoulder surfing” and seeing all your data. I recently heard of a sales deal going south because the sales person was working on a proposal on the train and, unbeknownst to him, a sales rep from a competing firm happened to be on that same train, saw the proposal, and put in a better offer. Use a privacy filter screen overlay such as this one whenever using your laptop in public places.
  3. To protect your data, consider encrypting the drive or switching to a cloud-hosted virtual desktop. Encrypting the drive is fairly secure, but could slow down your computer quite significantly. If you are thinking about using a cloud-hosted desktop, make sure that the cloud service provider is ISO 27001 certified. One downside of cloud-hosted desktops is that they rely very heavily on internet connection. There are offline options available, but these usually cost a few Pounds extra. Read my other article about making the switch to Cloud.

Desktop

For most people, this would be the one at work, but even there you should take personal responsibility for your cyber security.

  1. Don’t write down your user names and passwords. If you absolutely must, then write them down and put them in a place far away from the computer, preferably under lock and key. Write them down in such a way as to make it less obvious that they are login credentials. See this article on good password policy.
  2. Make sure your machine is up to date with the latest security patches, the firewall is active, anti-malware is running and all up to date. Perform regular malware scans.
  3. Remember to lock your work station whenever you leave your desk. The Windows button + L is a shortcut to instantly lock your machine.
  4. Bonus tip: Beware of email attachments from unknown sources. As a general rule, if you don’t know the sender, don’t open the attachment.

Millions of devices are lost, stolen or compromised each day, so please pay attention to securing your devices!

If you have any questions about cyber security, please feel free to reach out. Also, please download the Venom IT booklet on Basics of Cyber Security.

All pictures: Shutterstock