Mobile Life - Tips and Tricks

Without a dedicated workstation, we rely on mobile devices (e.g. smart phones, laptops, tablets).  What should you be aware of?


Today mobile device use is only increasing versus a dedicated workstation. We have come to rely on mobile smart phones, laptops, and tablets when working remotely.  Did you know that research has shown that the average American spends more than 5 hours a day on their phone for personal and professional use and checks it on an average of 58x per day.  Sometimes upwards of 80x per day or every 12 minutes.  That’s over 35 hours a week devoted to staring at and using that tiny screen.  That’s not including time spent in front of a laptop or TV. 

No other invention or device in history has influenced our current behavior patterns than the mobile device.  No wonder threat actors are constantly working hard to tap into our mobile device use habits.

Now more than ever we need to be cyber aware and safe!  Especially given the amount of time we use our mobile devices and especially if those devices are used in a professional manner.

We check our mobile devices up to 80x per day or every 12 minutes.  We spend more than 5hrs a day using our devices for personal and professional purposes.  

What are some things you can do to be mobile smart?  Here are some tips:
  • Use multi-factor authentication. You can add an additional layer of security to your devices by changing your settings to require two different factors to unlock it. For example, use a password or PIN AND a biometric, such as your fingerprint.
  • Keep your devices in sight. Don’t leave them unattended when you’re working in a public location and report a lost or stolen device immediately to your IT help desk.
  • Check your surroundings. Be aware of anyone who might be listening to your phone call or looking over your shoulder as you enter your password.
  • Run updates and patches on your devices. Updates and patches address and fix security vulnerabilities, ensuring that your device is protected against threat actors.
  • Enable firewalls and anti-virus software. Firewalls block malicious traffic and anti-virus software scans files for malware.