Sometimes our gadgets know more about us than the closest people. Even if you think that you have nothing to hide, insignificant-looking information can be useful for an attacker, and fatal for you. Together with Samsung, we suggest finding a solution to security problems and minimizing adverse effects.
Fort Knox in your pocket
How to turn a smartphone into a digital fortress? Samsung has a lot of hardware and software protection tools integrated with the KNOX platform. It all starts at the production stage - the company strictly monitors the manufacture of microcircuits. Data encryption and isolation are carried out through the so-called “Protected Folder” - a space for storing information that you will only have access to.
In addition to the files in the Protected Folder, Samsung Knox protects data from applications such as Samsung Pay, Samsung Health and Samsung Pass.
In 2014, the company launched the Samsung Security Update, an automatic monthly software update program, to quickly respond to zero-day vulnerabilities. So, usually, shortcomings are corrected before the media makes them public. For example, in September 2019, researchers at Check Point Research discovered a vulnerability through which attackers could access the victim’s personal data via SMS. Later it turned out that Samsung corrected everything back in May. We have already described this situation in more detail.
What are the safety rules?
Now let's talk about what depends only on us, and not on the manufacturer.
Rule number 1 - You need to install applications only from official stores because it is not in vain that Google and Apple constantly clean digital counters from programs of unscrupulous developers. It’s even better to turn on auto-update or keep track of the relevance of the versions yourself because each new build can carry security patches.
Rule number 2 - Pay attention to the permissions that you give applications during installation. Often, they require access to the camera and calls, although, in fact, they do not need it. Such requests must be stopped, and not push buttons at random.
Rule number 3 - Firmware updates not only add features, but also close system vulnerabilities, including critical ones. Therefore, you should not ignore OS offers about updates. For example, Google has introduced monthly Android updates specifically for sending security patches.
Rule number 4 - The password must be strong: contain both uppercase and lowercase letters, numbers and various characters. And the longer it is, the better. Try to create different passwords everywhere and change them regularly. If you come up with complex combinations is not your thing, generators will help. Is it difficult to remember the suggested combinations? It doesn’t matter, because there are special password storages with encryption, of course, for example, “Protected Folder”.
Rule number 5 - Use public access points less often. When you connect to them, you can be stolen by logins, passwords, email addresses, and other data by analyzing the transmitted traffic. In addition, it will be easier to send you to phishing sites or pages with trojans. And if you cannot do without public Wi-Fi, we recommend using a connection to a virtual private network (VPN). Then the traffic will go along a secure route and in encrypted form. And most importantly: in the settings, cancel the automatic connection to open access points.
Rule number 6 - The physical protection of a smartphone is equally important. Entering a login and password, viewing SMS with codes from banks and documents with corporate secrets in a metro car filled with people is definitely not welcome. After all, anyone can drop by and see everything on the screen of your smartphone.
Rule number 7 - Use two-factor authentication - where without it. This is an additional measure that provides access to a device or service in two steps. The first way to apply it is an SMS message with a set of numbers to confirm your identity. The second is an email. And the third and most reliable is time codes from applications like Google Authenticator, where a six-digit key is updated every 25 seconds.
Rule number 8 - Just be careful. Do not follow suspicious links or download unknown files. Carefully read the address of the site where you are - is this a duplicate? After all, often what they wanted to hide is in the most prominent place.
Today, information security is as important as, for example, issues of politics and economics. Because the data stolen from the gadget can negatively affect both an individual person and an entire corporation - it all depends on what information the user has. Samsung is trying to protect the owners of their smartphones from threats, helping them avoid adverse effects. But we consumers should not forget about the basic rules of digital hygiene.