Smartphones are used for all activities that range from ordering food, hailing a cab or even making payments from your bank account. We have reiterated multiple times about the need to keep your devices up-to-date and secure from possible intrusions. And now, one of the biggest security agencies in the world has sound advice for all Android and iPhone users across the globe. We are talking about the National Security Agency or the NSA of the US government which feels that people can follow some basic steps to keep their devices secure from these dangerous attacks.
Just Turn It Off
The NSA is aware and cautious about the advancements and sophistication of attacks on smartphone users. But the most vital part of its suggestion is that people should turn off their phones and let it clear up the possible zero-day threats by rebooting again. It is interesting to hear the NSA talk about these steps which aren’t going to help you in all cases, and the security agency is clearly aware of that reality.
But in its note, the NSA feels that doing something is better than nothing, especially if it can stop people from spying into your phone via the mic or even the camera.
That’s Not All
The NSA also advises people to keep the Bluetooth disabled on their phone when they are not using the feature or not using an app that needs its support. It also mentions that keeping the GPS/Location turned on leaves you vulnerable to possible remote attacks.
And yes, the security agency has also talked about the need to avoid using public Wi-Fi networks and public charging stations that have become a popular source of these cyber attacks.
Most of us reboot our phones only when an app requests such action or you are installing a software patch/update. However, the NSA guidelines clearly point to a more obvious need to switch off and turn on the phone, which could go a long way in keeping you and your digital assets protected.
Having said that, if you by any chance fall into the trap of a malware or a spyware, these tips might not help that much and you’ll need to follow a more stringent set of practices to regain access to the device without being spied on.