FCC and Partners Launch Smartphone Security Checker

More than 20 million Americans will unwrap a new mobile device this holiday season, but most smartphone users admit they don’t know how to protect themselves from mobile security threats. With mobile cyber attacks increasing every year (threats increased 367% in 2011), it’s important that consumers stay protected against growing risks such as viruses, malicious apps, and mobile device theft.

To assist the more than 120 million American smartphone owners, today the FCC launched the Smartphone Security Checker, an online tool to arm consumers with security steps customized by mobile operating system. The tool is the result of a public-private partnership between government experts, smartphone developers, and private IT and security companies. Partners include DHS, NCSA, FTC, CTIA, Lookout, BlackBerry, Chertoff Group, Sophos, McAfee, Symantec, and others. The smartphone Security Checker is available at www.fcc.gov/smartphone-security.

FCC Chairman Julius Genachowski said, “With less than half of smartphone owners using passwords to protect their devices, this new tool will be of particular value to millions of Americans. The holiday gift-giving season is a perfect time to remind consumers to take simple steps, like setting a password, to protect themselves from mobile security threats.”

To use the tool, a consumer first selects their mobile-OS (Apple iOS, Android, BlackBerry, or Windows) and then follows 10 customized steps and tips to help protect their device. The Smartphone Security Checker features best practices on how to set pins and passwords, where to find security apps, how to enable remote locating and data wiping, and how to backup and secure your data in case your device is lost or stolen. There is also information on how to safely use public Wi-Fi networks and what steps to take if your phone is stolen (hint: report it stolen by calling your mobile carrier and by notifying the police).

As the processing power and amount of sensitive data stored on smartphones increases, it’s important for consumers to treat mobile devices with the same precautions as computers. The FCC, working with government and the private sector, is committed to furthering the message of the national cybersecurity awareness campaign across all computing platforms. When we go online, we must all: Stop. Think. Connect.

Blog Topic: 
Technology

Leave a Comment

Commenting Policy

Este es un blog moderado; revisamos todos los comentarios antes de publicarlos. Esperamos que los participantes se traten respetuosamente entre sí y que traten con respeto a los demás bloggers. No publicaremos los comentarios que no cumplan con nuestra política de comentarios. Si un comentario incluye un enlace a un sitio comercial, quitaremos el enlace y publicaremos el comentario. Sólo editaremos los comentarios para quitar los enlaces comerciales.

No publicaremos:

  • spam ni cometarios no relacionados con el tema del blog
  • comentarios que contengan lenguaje vulgar, ataques personales o términos ofensivos dirigidos contra grupos específicos
  • ofrecimientos de venta o promociones
  • comentarios que contengan información que sea obviamente engañosa o falsa
  • comentarios que contengan información personal, como por ejemplo, domicilios privados

Los comentarios enviados a este blog se convierten en material de dominio público. Para proteger su privacidad y la de las demás personas, por favor no incluya información personal. No use este blog para reportar el fraude. Si desea puede presentar una queja. Si tiene preguntas sobre la política aplicable a los comentarios, por favor contáctenos.

Read Our Privacy Act Statement

It is your choice whether to submit a comment. If you do, you must create a
user name, or we will not post your comment. The Federal Trade Commission Act
authorizes this information collection for purposes of managing online
comments. Comments and user names are part of the Federal Trade Commission’s
(FTC) public records system, and user names also are part of the FTC’s computer
user records system. We may routinely use these records as described in the
FTC’s Privacy Act system notices. For more information on how the FTC handles
information that we collect, please read our privacy policy.