As mobile devices and smartphones have become more common, new possibilities and new challenges have arisen. One of the greatest challenges is information security, the importance of which is emphasised as the amount of data and ways of using the systems are expanding. Although the importance of technical information security must not be underestimated, a large part of information security consists of the user’s own actions. These instructions include the best practices concerning the security of smartphones. This list is not designed to be a comprehensive set of information security instructions, but more as an easy-to-read checklist of things to remember.
When you receive your new smartphone, nearly all of its information security settings are off (except for the PIN code of the SIM card).
- Actions to be taken when you receive your new smartphone
- Secure use of smartphones Instructions concerning mobile devices