1 00:00:00,600 --> 00:00:06,600 In this lesson, I will share some of the important mobile security guidelines with you, and the guidelines 2 00:00:06,600 --> 00:00:09,570 are the same for both Android and iOS devices. 3 00:00:09,690 --> 00:00:15,330 So let's start with our first mobile security guideline, which is use a password for mobile device 4 00:00:15,330 --> 00:00:15,990 security. 5 00:00:16,030 --> 00:00:22,350 OK, so setting a password for your mobile device or for any of your device is very important. 6 00:00:22,750 --> 00:00:26,940 OK, so Conficker, a strong password with maximum length. 7 00:00:26,940 --> 00:00:32,520 Suppose your mobile device allow you to set a password with minimum length of six characters and the 8 00:00:32,520 --> 00:00:34,220 maximum length with 14 characters. 9 00:00:34,350 --> 00:00:39,330 So always go with the maximum length, OK, and always create a complex password. 10 00:00:39,840 --> 00:00:42,030 Now what is a complex password? 11 00:00:42,270 --> 00:00:48,810 A complex password is a combination of a capital letter and a small letter and a numbers and special 12 00:00:48,810 --> 00:00:49,380 characters. 13 00:00:49,560 --> 00:00:57,280 OK, because it is very easy for the attacker to crack a password with six characters. 14 00:00:57,300 --> 00:00:58,500 OK, but. 15 00:00:59,340 --> 00:01:06,120 It is very hard and time consuming process if an attacker tried to break a password with 14 characters. 16 00:01:06,330 --> 00:01:12,120 OK, so to increase security, I always use a complex password and always go with the maximum length. 17 00:01:13,170 --> 00:01:18,000 Now always set ideal time out for automatic locking of the phone. 18 00:01:18,180 --> 00:01:24,240 OK, so suppose you are not using your phone, then you must enable a timer, let's say 10 seconds off 19 00:01:24,240 --> 00:01:24,680 of basic. 20 00:01:24,690 --> 00:01:28,990 And so after 15 seconds your phone will automatically lock out. 21 00:01:29,040 --> 00:01:29,460 OK. 22 00:01:31,110 --> 00:01:34,770 Now, logout future to be named after a certain number of Philabundance. 23 00:01:34,830 --> 00:01:37,570 OK, so always enable this option. 24 00:01:37,590 --> 00:01:41,320 OK, let's say you have this option to three. 25 00:01:41,340 --> 00:01:46,710 So after three failed attempts, your phone will automatically get logged. 26 00:01:47,040 --> 00:01:47,430 OK. 27 00:01:49,120 --> 00:01:49,510 Now. 28 00:01:51,120 --> 00:01:58,380 The next important mobile security guideline is always update the operating system and apps regularly, 29 00:01:58,520 --> 00:02:06,570 OK, because your system and the apps which you are using will definitely release updates from time 30 00:02:06,570 --> 00:02:06,990 to time. 31 00:02:07,360 --> 00:02:11,820 OK, so always remember to update your OS and apps regularly. 32 00:02:12,600 --> 00:02:17,730 Also turn on the player protect feature in your Google Play store. 33 00:02:17,760 --> 00:02:23,040 OK, that would help you in scanning for the security of apps. 34 00:02:23,310 --> 00:02:29,640 OK, and we'll help you to detect which is genuine and which is not right now always enable the remote 35 00:02:29,640 --> 00:02:30,210 management. 36 00:02:30,330 --> 00:02:36,300 Use mobile device management software for supporting, managing, monitoring and securing the mobile 37 00:02:36,300 --> 00:02:43,350 devices deployed in the organization for do not allow rooting or jailbreaking. 38 00:02:43,480 --> 00:02:49,290 OK, because routine will grant access beyond authorized limits. 39 00:02:49,500 --> 00:02:49,890 Right. 40 00:02:50,100 --> 00:02:53,070 And jailbreaking is the same as it being a phone. 41 00:02:53,080 --> 00:02:57,510 OK, but rooting for iPhone is called jailbreaking right now. 42 00:02:57,510 --> 00:03:06,510 The 50s use remote VoIP services, for example, the remotivate or find my iPhone or find my phone for 43 00:03:06,510 --> 00:03:09,420 locating the device when it is stolen or lost. 44 00:03:11,150 --> 00:03:16,790 All of us configure the mobile device for encryption storage with the heart of it, encryption if possible. 45 00:03:17,720 --> 00:03:21,530 Next, periodic backup and synchronization should be done. 46 00:03:22,180 --> 00:03:30,980 OK, so use the secured over the air backup and restore tool because this tool will help you to synchronize 47 00:03:31,340 --> 00:03:32,860 apps in the background. 48 00:03:34,980 --> 00:03:42,300 Again, never download any file from Anonymous, OK, or from any anonymous websites or from any anonymous 49 00:03:42,300 --> 00:03:42,860 sources. 50 00:03:43,020 --> 00:03:43,410 Right. 51 00:03:43,980 --> 00:03:46,700 And always use premium version of antivirus. 52 00:03:46,740 --> 00:03:52,080 OK, because in the free version of the dread, you are not able to completely use all of the security 53 00:03:52,080 --> 00:03:54,150 features, often antivirus program. 54 00:03:55,410 --> 00:03:57,180 Always use updated browser. 55 00:03:58,400 --> 00:04:05,960 Again, use mobile and spyware, OK, and the spyware would help you to detect spyware in your mobile 56 00:04:05,960 --> 00:04:08,030 phone and would remove the right. 57 00:04:08,920 --> 00:04:15,530 Now, you may use Boulard now what is Boulard, OK, now what is Bulgar? 58 00:04:16,300 --> 00:04:22,050 It's the mobile phone antivirus which can track a lost or stolen phone using inbuilt GPS. 59 00:04:22,450 --> 00:04:22,780 Right. 60 00:04:23,530 --> 00:04:29,740 And it will log the stolen phone and wipe the data in order to protect your financial and personal information. 61 00:04:30,340 --> 00:04:30,670 Right. 62 00:04:32,270 --> 00:04:37,970 So these are some of the very common but most important mobile security guidelines.