When using a public or unsecured wireless connection, avoid using apps and websites that require personal information, e.g., a username and password. Public Wi-Fi networks at places such as airports and coffee shops present an opportunity for attackers to intercept sensitive information.
Limit activities on public Wi-Fi networks.
What additional steps can you take to secure data on your mobile devices?
Alternatively, use your email address and a unique password to sign in. Ensure you are comfortable with this type of information sharing before you sign into an app via your social network account. Some apps are integrated with social network sites-in these cases, the app can collect information from your social network account and vice versa. Be cautious with signing into apps with social network accounts.To avoid unnecessary data collection, uninstall apps you no longer use. Protect your mobile device from malware by installing app updates as they are released.
Apps with out-of-date software may be at risk of exploitation of known vulnerabilities. For apps that require access to location data to function, consider limiting this access to when the app is in use only. Some apps have access to the mobile device’s location services and thus have access to the user’s approximate physical location. Pay special attention to apps that have access to your contact list, camera, storage, location, and microphone. Consider removing apps with excessive permissions. Ensure your installed apps only have access to the information they need, and remove unnecessary permissions from each app. Consider foregoing the app if the policy is vague regarding with whom it shares your data or if the permissions request seems excessive. Read the app’s privacy policy to see if, or how, your data will be shared. Read the permissions the app is requesting and determine whether the data it is asking to access is related to the purpose of the app. Before downloading an app, make sure you understand what information the app will access. Additionally-because malicious apps have been known to slip through the security of even reputable app stores-always read the reviews and research the developer before downloading and installing an app.
Do not download from unknown sources or install untrusted enterprise certificates. Reduce the risk of downloading PHAs by limiting your download sources to official app stores, such as your device’s manufacturer or operating system app store.