Guarding Your Devices Against Cyber Threats
Many of us believe we’re doing a good job securing our phones and other devices against data theft. However, truly preventing identity fraud requires more than just updated passwords and caution with suspicious links. Criminals are becoming increasingly adept at accessing personal devices, whether at home, at work, or in public spaces. Even without physical access to your phone, tablet, or laptop, they can intercept your Bluetooth signals and Wi-Fi network to “mirror” your device on their own, gaining access to your saved information and, ultimately, exploiting it for scams and identity fraud. But you’re not helpless against evolving tactics. Here’s how to safeguard your devices and what steps to take if you become a victim.
Essential Steps for Device Security
“The first line of defense with respect to devices is to implement a passcode or biometrics that are needed every time you log in,” advises Octavia Howell, vice-president and chief information security officer at Equifax Canada. Leaving an unlocked phone unattended for even a moment opens the door for potential access. “In the cyber community, something is not hacked or breached if the door is left wide open,” Howell notes. “So be sure to close those doors and lock and secure your devices at all times.”
Just as laptops require anti-virus software, mobile devices need similar layers of protection. It’s essential to install a reputable anti-virus application on your phone and keep it updated regularly. Furthermore, always download apps only from verified sources like Google, Apple, or Microsoft.
Be Mindful of Public Wi-Fi
Where and how you access the internet matters. Though home and workplace networks are typically configured as private and secure, public Wi-Fi networks, such as those found in coffee shops or airport lounges, can leave you more vulnerable to information interception. Conducting a simple Google search is generally safe, but refrain from logging into your bank account or making financial transactions over a public network. “In fact, don’t use email or anything that requires a password login,” Howell advises. “If you find yourself having to use public Wi-Fi—for example, using it to access email with a laptop while travelling—use a reputable virtual private network (VPN).”
Navigating Next-Generation Threats
Generative artificial intelligence (AI) is also enhancing the capabilities of threat actors. Reports include fake phone messages and videos of loved ones claiming to be in trouble and requesting money. “To verify such calls, hang up or put the caller on hold and try to contact the person directly,” Howell suggests. “Increasingly, families are adopting safe words and hand signals, known only to their family, to ensure a contact is genuine.”