Phones and tablets

Our mobile devices contain a lot of information about us. If we’re not careful, a cyber criminal can steal this information. Learn how to keep your device — and your data — safe.

 

Secure the data on your mobile devices

Mobile devices are today’s multi-tools. We use them as cameras, maps, credit cards, watches and more. And sometimes, we even use them to make phone calls.

All of these new functionalities are great, but they also require us to share more personal, financial and location-based data. If a cyber criminal gets access to that information, the results could be disastrous. Securing your devices can help prevent that from happening.


Risks to you

Phishing and smishing

Phishing PhishingAn attempt by a third party to solicit confidential information from an individual, group, or organization by mimicking or spoofing, a specific, usually well-known brand, usually for financial gain.  messages are emails designed to trick you into giving up information by pretending to be from a trusted source.

Phishing messages can also come in the form of phone calls. Smishing SmishingFraudulent SMS messages designed to induce users to reveal personal or financial information via the mobile phone (see phishing). messages are sent through SMS texts.

The best way to avoid falling for a phishing scam is to be vigilant: never respond to unexpected messages from unknown numbers, avoid sending sensitive information by SMS or email, and think twice before clicking links or opening attachments. Learn more about phishing.

Malware

Malware MalwareMalicious software ("malware") designed to infiltrate or damage a computer system, without the owner's consent. Common forms of malware include computer viruses, worms, Trojans, spyware, and adware. It can: • Intimidate you with scareware, which is usually a pop-up message that tells you your computer has a security problem or other false information. • Reformat the hard drive of your computer causing you to lose all your information. • Alter or delete files. • Steal sensitive information. • Send emails on your behalf. • Take control of your computer and all the software running on it. is malicious software SoftwareA computer program that provides instructions which enable the computer hardware to work. System software, such as Windows, Linux or MacOS, operate the machine itself, and applications software, such as spreadsheet or word processing programs, provide specific functionality. designed to infiltrate your devices.

Malware, like viruses or worms, can spread to your phone through internet downloads, text attachments, or Bluetooth BluetoothAn industry standard for short-range wireless connections between devices like mobile phones, headsets, computers and PDAs. transfers. It can cause all sorts of problems on your mobile devices, like sending spam SpamAny unsolicited commercial electronic message. It is often a source of scams, computer viruses and offensive content that takes up valuable time and increases costs for consumers, business and governments. Canada's anti-spam legislation applies to all commercial electronic messages. A commercial electronic message is any electronic message that encourages participation in a commercial activity, regardless of whether there is an expectation of profit. to your contacts or shutting down the device entirely. Learn more about malware.

Use your mobile device safely

"a tablet and a phone with update circles and cursor"

Keep your phone and tablet up to date

Mobile operating system Operating systemThe main program that runs on a computer. An operating system ("OS") allows other software to run and prevents unauthorized users from accessing the system. Major operating systems include UNIX, Windows, MacOS, and Linux. (OS) updates can include anything from a completely new version, to a patch PatchA small piece of software designed to update or fix problems with a computer program. This includes fixing bugs, reducing vulnerabilities, replacing graphics and improving the usability or performance. or fix to strengthen security, remove bugs, or improve functionality.

Always update UpdateUpdates to software and devices add new features, fix bugs, and often contain new security features to protect against attacks. your device when prompted or turn on automatic updates if available. Learn more about software updates.

"four colourful Bluetooth symbols"

Be careful with Bluetooth

Bluetooth technology links nearby devices, like wireless headphones, printers, and keyboards, to your mobile device or computer. And since your devices carry sensitive data, you'll want to take extra care when pairing anything through Bluetooth. Remember to always turn off Bluetooth when you’re not using it so that hackers cannot detect your device and attempt to pair with it. Learn more about Bluetooth.

"a person holding a phone and looking puzzled, with dialogue bubbles"

Think before you text

SMS messages or texts are a convenient way to keep in touch with friends, but they can also make you vulnerable to malware, privacy breaches, and other criminal activities. Take a few precautions when texting:

  • Don't use text messages to send personal or sensitive information.
  • Never open attachments from unknown or untrusted sources.
  • Never click the links or call phone numbers in suspicious messages — even if they say they’re from your bank or mobile provider.
"yellow triangular signs with exclamation marks"

Watch out for untrustworthy apps

Avoid downloading apps developed by companies that provide little to no information about their organization. A reputable company should provide contact details, a website address, or email information. Only download DownloadTransmission of data from a remote computer system onto a local computer system. apps from trusted sources, like the App Store or Google Play. But remember, even trusted sources may host apps with less than stellar security features. When in doubt, do an internet search to learn more about an app’s security features or read published reviews to see what other users have to say.

Before installing an app, make sure to review the permissions. Use your common sense to check if its functionality lines up with the permissions it’s requesting. When possible, only enable the permissions you’re comfortable with.

"pointing fingers and Wi-Fi symbols"

Connect carefully

Using Wi-Fi Wi-FiWi-Fi refers to a set of wireless communication protocols that can transmit traffic to Wi-Fi enabled devices within a local area. A Wi-Fi enabled device such as a laptop or tablet can connect to the internet when within range of a wireless network connected to the internet. An area covered by one or more Wi-Fi access points is commonly called a hotspot. to save on your monthly data is a good idea — if you’re careful. Public and unsecured private Wi-Fi networks can be a perfect opportunity for hackers to access your mobile device.

If you have to use public Wi-Fi, make sure it’s a network NetworkSeveral computers that are connected to one another. you know and trust, and never use it to do banking or to access sensitive information. Learn more about safe public Wi-Fi use.

"a tablet wrapped in a chain with a padlock, hand-shaped cursors touching the lock and update circles"

Lock your devices

The more we use our mobile devices, the more data we store on them. These days, losing your phone can result in identity theft Identity theftThe crime of impersonating someone and using their private information, usually for financial gain. or financial disaster. Threat actors can also use your device to infect the devices of everyone in your contact list.

Using a lock screen password PasswordCombination of letters and numbers you select to secure an account or device. and enabling biometric security features, like a fingerprint scan, if they’re available can prevent criminals from accessing anything stored on your device if you lose it. Enable auto-lock so it always locks after a short period of time.

"a person shielding a phone with her hand, surrounded by eyeball emojis"

Keep an eye on your devices

Never leave your mobile devices in a vehicle or unattended in public. Keep a record of their makes and models. If your device ever goes missing, follow these steps to retrieve it safely:

  • Contact your service provider. They’ll help you de-activate your device and restore it to its factory settings. They can also place your phone on a national blacklist, preventing it from working on any Canadian wireless network.
  • Report it to local law enforcement. Should you be able to determine the device’s coordinates, provide this information to authorities. Never attempt to recover stolen property by yourself.

Resources

Reporting spam text messages to 7726

Reporting spam text messages to 7726

Spam text messages are common and can be tough to manage. Find out how you can help block spam and unwanted messages from your phone.

New device checklist

New device checklist

Before you start using it, take these steps to customize it and keep it cyber safe.

Video: Device Appreciation Time - Full Season

Video: Device Appreciation Time - Full Season

Watch all your favourite episodes of Device Appreciation Time, the hit series of Cyber Security Awareness Month 2020.

Blogs

Blogs

Read up on the latest cyber threats and tips for keeping yourself, your family and your business cyber safe.

Resources

Resources

Visual learner? Check these out for tips and tricks to keep yourself, your family and your business secure from cyber threats.

Become a champion

Become a champion

Become a Get Cyber Safe champion to help improve internet security for yourself, your organization, and all Canadians.

Date modified: