Ciber seguridad & Soluciones IT | ESED

11 tips to protect your smartphone against cyber attacks

Written by Eduard Bardají | Dec 1, 2022 9:39:00 AM

Currently, 94% of users use mobile phones to connect to the Internet, according to the AIMC. A very relevant but worrying figure at the same time. Those of us who work in computer security are aware that mobile security is not usually the same as computer security.

I would like to point out that the majority of users who do not use any kind of lock often claim that it is "because I have nothing to hide". But in reality, taking security measures is useful because if your phone is stolen, for example, you would lose everything, and I mean EVERYTHING instantly: bank details, files, photos, phone numbers and all the data you have stored there. They could even know your address and break into your house. 

It is crucial that you take some security measures to avoid situations like the one described above. Here are a few tips on what you can do to protect your mobile phone from cyber attacks. 

11 tips to protect your smartphone against cyber attacks

1. Use your fingerprint instead of a alphanumeric password


En caso de que tu dispositivo tenga la opción de bloquear y desbloquear con un sistema de identificación biométrico como la huella dactilar, utilízala.

If your device has the option to lock and unlock with a biometric identification system such as a fingerprint, use it. It is a much more secure system than a password that can be easily hacked, especially if your security level is low or you opt for the typical 1234. In case you don't have this option, find a strong password such as:

50mf#dTvt8IWr7PN8z6OEIyAEI910hVBvgn

In addition, I also recommend that if you manage sensitive information and data, such as government applications, banking, etc., it is best to use one fingerprint for this and a different fingerprint for other services - remember that each finger on your hand has a different fingerprint.

2. Data encryption: A foolproof shield to outwit cybercriminals


Using the native encryption features of your phone will help you to encrypt all your data stored on the device. This will prevent unauthorised third parties from accessing it in case of theft or loss.

3. Don't postpone software updates


It is absolutely essential that you update your system and applications when you are prompted to do so. This way you will have a higher level of security every time you use your device or enter one of these applications. 

4. Don't plug anything into your devices that you don't fully trust.


Remember what your mother said about not talking to strangers? Same thing here. I would also like to point out that it is also not recommended to connect the device to unknown USB ports. And if you are not an app developer, you should disable the developer/debug options.

5. We have a tendency to have everything on even if we don't use it. Why?


Not using Wi-Fi? Turn it off. Bluetooth? Turn it off. Location services? Turn it off... And so on with anything you're not using all the time or never use at all. Disabling all wireless communication interfaces on your device will prevent third parties from hacking you and gaining access to your information. 

6. Open public Wi-Fi networks - not a good idea! 


Try to connect to open public Wi-Fi networks as little as possible. They are a favourite meeting point for cybercriminals. You can disable the option to connect automatically and you can also use a VPN (at ESED we have VPNs in place).

7. Careful with the apps you download


Do not install apps that do not come from trusted sources. Yes, it seems obvious, but not everyone does it. More often than not, many of the trendy apps or the ones everyone is raving about are not on the Play Store or the App Store, making them a breeding ground for malware.

8. Hi, in order to use this app you must accept this, and this, and this, and this, this, this, this, this... aaah!


That's enough to drive anyone nuts. I think that if an app asks you for absurd permissions that have nothing to do with the app, that's reason enough to delete it and look for an alternative. Without a doubt, it is highly suspicious. 

9.Having your files in the cloud is not a backup


Many users confuse uploading their files to the cloud with having a parallel backup, but in fact this is not the case. If you receive the message "your cloud is full", from that moment on the information is no longer uploaded, so it is only on your device. We strongly recommend that you move your data to an external hard drive, to your computer or make a good online backup. Having backup copies will allow you to recover your information in the event of any attack. 

10.Avoid ROOT (/jailbreak) and custom ROMs. If it sounds like gibberish, forget it


Custom ROMs or (Custom Operating System) are made by third parties without any kind of warranty. They are usually closed source and therefore we don't know what the OS actually does.

On the other hand, jailbreaking (iphone) or rooting (android) breaks all manufacturer warranties and also the security measures of the OS. It is EXTREMELY DANGEROUS and should only be used by expert users.

11.Block spies next to you with an on-screen privacy filter


There are privacy filters that you put on your screen and they work like a shield that filters the light so that it is only visible from the front and not from the sides. 

By putting any or all of these tips into practice, you will avoid a lot of unnecessary worries. The most common problem with mobile devices is data theft. This usually happens when you install third-party apps, whether they are signed by the Play Store, the Apple shop or unsigned (downloaded from external sites). These apps make you accept all the permissions and if you don't accept them, they won't let you use them.


"Do not install shady apps or apps outside the official app store. Examples: Apps for downloading videos from youtube, watching movies online, hacks/tricks for phone games.

Do you have malware issues on your device and don't know how to fix it? You can contact us and we will help you find a solution.