1 00:00:00,600 --> 00:00:06,600 In this lesson, I will share some of the important mobile security guidelines with you, and the guidelines 2 00:00:06,600 --> 00:00:09,550 are the same for both Android and iOS devices. 3 00:00:09,690 --> 00:00:15,330 So let's start with our first mobile security guideline, which is use a password for mobile device 4 00:00:15,330 --> 00:00:15,990 security. 5 00:00:16,030 --> 00:00:22,350 OK, so setting a password for your mobile device or for any of your device is very important. 6 00:00:22,750 --> 00:00:26,940 OK, so Conficker, a strong password with maximum length. 7 00:00:26,940 --> 00:00:32,520 Suppose your mobile device allow you to set a password with minimum length of six characters and the 8 00:00:32,520 --> 00:00:34,220 maximum length with 14 characters. 9 00:00:34,350 --> 00:00:39,330 So always go with the maximum length, OK, and always create a complex password. 10 00:00:39,840 --> 00:00:42,030 Now what is a complex password? 11 00:00:42,250 --> 00:00:48,810 A complex password is a combination of a capital letter and a small letter and a numbers and special 12 00:00:48,810 --> 00:00:49,380 characters. 13 00:00:49,560 --> 00:00:57,280 OK, because it is very easy for the attacker to crack a password with six characters. 14 00:00:57,300 --> 00:00:58,500 OK, but. 15 00:00:59,340 --> 00:01:06,120 It is very hard and time consuming process if an attacker tried to break a password with 14 characters. 16 00:01:06,330 --> 00:01:12,120 OK, so to increase security, I always use a complex password and always go with the maximum length. 17 00:01:13,170 --> 00:01:18,000 Now always set ideal time out for automatic locking of the phone. 18 00:01:18,190 --> 00:01:24,230 OK, so suppose you are not using your phone, then you must enable a timer, let's say 10 seconds off 19 00:01:24,240 --> 00:01:24,690 of basic. 20 00:01:24,690 --> 00:01:28,970 And so after 15 seconds your phone will automatically lock out. 21 00:01:29,070 --> 00:01:29,460 OK. 22 00:01:31,110 --> 00:01:34,750 Now, logout future must be Niebuhrian after a certain number of Philabundance. 23 00:01:34,820 --> 00:01:37,570 OK, so always enable this option. 24 00:01:37,590 --> 00:01:41,320 OK, let's say you have said this option to three. 25 00:01:41,340 --> 00:01:46,710 So after three failed attempts, your phone will automatically get logged. 26 00:01:47,040 --> 00:01:47,430 OK. 27 00:01:51,120 --> 00:01:58,380 The next important mobile security guideline is always update the operating system and apps regularly, 28 00:01:58,520 --> 00:02:06,570 OK, because your system and the apps which you are using will definitely release updates from time 29 00:02:06,570 --> 00:02:06,990 to time. 30 00:02:07,360 --> 00:02:11,820 OK, so always remember to update your OS and apps regularly. 31 00:02:12,600 --> 00:02:17,730 Also turn on the player protect feature in your Google Play store. 32 00:02:17,760 --> 00:02:23,040 OK, that would help you in scanning for the security of apps. 33 00:02:23,320 --> 00:02:23,600 OK. 34 00:02:23,610 --> 00:02:30,210 And will help you to detect which is genuine and which is not right now always enable the remote management. 35 00:02:30,330 --> 00:02:36,300 Use mobile device management software for supporting, managing, monitoring and securing the mobile 36 00:02:36,300 --> 00:02:43,350 devices deployed in the organization for do not allow rooting or jailbreaking. 37 00:02:43,480 --> 00:02:49,320 OK, because routine will grant access beyond authorized limits. 38 00:02:49,500 --> 00:02:49,890 Right. 39 00:02:50,100 --> 00:02:53,070 And jailbreaking is the same as being a phone. 40 00:02:53,080 --> 00:02:57,510 OK, but rooting for iPhone is called jailbreaking right now. 41 00:02:57,510 --> 00:03:06,510 The 50s use remote VoIP services, for example, the remote WI or find my iPhone or find my phone for 42 00:03:06,510 --> 00:03:09,420 locating the device when it is stolen or lost. 43 00:03:11,150 --> 00:03:16,790 All of us configure the mobile device for encryption storage with the heart of it, encryption if possible. 44 00:03:17,720 --> 00:03:21,510 Next, periodic backup and synchronization should be done. 45 00:03:22,140 --> 00:03:30,980 OK, so use the secured over the air backup and restore tool because this tool will help you to synchronize 46 00:03:31,340 --> 00:03:32,860 apps in the background. 47 00:03:34,980 --> 00:03:42,300 Again, never download any file from Anonymous, OK, or from any anonymous websites or from any anonymous 48 00:03:42,300 --> 00:03:42,860 sources. 49 00:03:43,020 --> 00:03:43,390 Right. 50 00:03:43,980 --> 00:03:46,700 And always use premium version of antivirus. 51 00:03:46,740 --> 00:03:52,080 OK, because in the free version of the the where you are not able to completely use all of the security 52 00:03:52,080 --> 00:03:54,150 features, often antivirus program. 53 00:03:55,410 --> 00:03:57,180 Always use updated browser. 54 00:03:58,400 --> 00:04:01,200 Again, use mobile and spyware. 55 00:04:01,630 --> 00:04:07,890 OK, and the spyware would help you to detect spyware in your mobile phone and would remove the right. 56 00:04:08,920 --> 00:04:15,530 Now, you may use Boulard now what is Boulard, OK, now what is Bulgar? 57 00:04:16,300 --> 00:04:22,030 It's the mobile phone enteritis which can track a lost or stolen phone using inbuilt GPS. 58 00:04:22,450 --> 00:04:22,780 Right. 59 00:04:23,540 --> 00:04:28,960 And it will log the stolen phone and write the data in order to protect your financial and personal 60 00:04:28,960 --> 00:04:29,740 information. 61 00:04:30,340 --> 00:04:30,660 Right. 62 00:04:32,270 --> 00:04:37,970 So these are some of the very common but most important mobile security guidelines.