Ads 468x60px

Search Engine

Loading

Thursday 1 December 2011

How to Protect Your PDAs and Mobile Phone in Other Ways


There are plenty of things besides antivirus programs that you can do to help protect your PDA and its data. Get ready for several digital hygiene tips — PDA style! As with your PC, the motto “trust no one” will keep your PDA and your information safe.
Turning off wireless auto-connect
Many PDAs are configured to automatically accept any incoming connection request, whether it’s
from someone you know or not. If you leave your PDA configured like this, sooner or later you’re bound to have someone you don’t know connect to your PDA. Is that something you want?
If your PDA communicates using more than one wireless technology (let’s see, there’s 802.11, Bluetooth, and Infrared, as well as GPRS and 1XRTT if you connect your PDA to the Internet using a digital cellular service such as Cingular or T-Mobile), you probably need to check the configuration for each.
Avoiding ad-hoc wireless network connections
This applies primarily to 802.11 (Wi-Fi) connectivity. You can make two different kinds of connections with Wi-Fi:
Infrastructure connection: This is a wireless connection between your PDA or laptop and an access point — a designated place built into the network and used for connecting individual devices to a larger network (including the Internet). Such connections can be set up with encryption and other safeguards that protect your communication against eavesdroppers. These are the “good” connections for that reason.
Ad-hoc connection: This is a connection between one PDA or laptop and another similar device — used for communicating between the two devices. These connections are often simple and convenient but they have a Couple of problems:
  1. Encryption of ad-hoc connections is not always available — and an unencrypted wireless connection is a recipe for vulnerability. 
  2. Some PDAs are set up to automatically accept incoming ad-hoc connection requests which amount to opening the door to anybody. A word to the wise: Unless you rely on ad-hoc Wi-Fi connections (and if you do, you may want to rethink that), turn them off. Doing so saves your battery and keeps your information safe.
Disabling inbound file transfers
Your PDA may be set up to automatically permit someone on the other end of a wireless connection to transmit files to your PDA. Maybe it’s me, but I suggest you turn this capability off or change it to a “prompt” setting where each incoming file transfer requires your permission. Otherwise, who knows what someone might try to load onto your PDA.
Configuring passwords
PDAs are small and disappear easily into a pocket or bag and not always those of their owners. The last thing you want is for some total stranger to get hold of your PDA and have access to your sensitive data. A number of different protective
Options are available:
·        You can configure your PDA to require a password whenever it’s turned on even if you turned it off only seconds ago.
·        You can configure your PDA to automatically turn off and lock after a short period of time — no more than five minutes.
·        If you routinely use sensitive information on your PDA, you can configure it to periodically require a password even while you’re using it — and in this case, I advise you to use this option.
·        Some PDAs require a password to be entered on a PC if you try to synchronize files between the PDA and the PC.
You need to enable this feature unless you don’t care if someone steals your PDA and can get to your data by connecting it to their own PC.
Your PDA may have other password-protection capabilities seriously consider each one in order to protect your data. People I have spoken with about security often tell me they would rather have convenience than security (sheesh). With PDAs (and also laptops and anything else that is easily lost or stolen), the person who took your PDA will appreciate the convenience you configured for yourself.
Using secure synchronization settings
Synchronization is the process of transferring information between a PDA and a laptop or desktop computer. You either connect the PDA and the computer with a cable, or connect them using an infrared or wireless connection. Synchronization is usually initiated at the push of a button on either the PDA or the computer, or synchronization can automatically take place at regular intervals. Here are a couple of quick security improvements:
Check whether you’re PDA can synchronize with any PC, or only with your PC. For maximum security, set your PDA to synchronize only with your PC.
Set up your PC so that only your PDA can synchronize with it. You don’t want your computer getting friendly with someone else’s PDA. That would make it way too easy to snatch data out of your PC, or attempt to infect your PC via a PDA.

No comments:

Post a Comment