Tip #3: Question Your Connections
The same tools you use to connect with people, sites, and applications are the same tools cybercriminals use to connect with you. Don’t let connectivity be your kryptonite. Keep these tips in mind:
- Brush up on your WiFi security skills. Open/free networks are dangerous networks.
- Limit use of GPS tracking. Only enable this with trusted apps since GPS tags can expose personal residences and reveal schedules and habits.
- Turn off Bluetooth when not in use and choose connections carefully. Ill-advised Bluetooth pairings can leave your devices vulnerable — and can leave data behind.
- Be cautious of unsolicited text messages and unknown links. Phishing attacks aren't limited to computers and laptops; you can receive email on smartphones and tablets as well. Also be on the lookout for smishing (i.e., SMS/text phishing) attacks, as these malicious text messages can compromise your device and your data.
- Research apps before downloading them. With virtually every app, you grant a certain degree of access to your device and data. Malicious developers use permissions to get into your device and to get data out. Sites like PrivacyGrade.org can help you make better decisions.
Subscribe to the Proofpoint Blog