CINXE.COM

Phone cyber security: An introduction - Get Cyber Safe

<!DOCTYPE html><html class="no-js" lang="en" dir="ltr"><head> <meta charset="utf-8"> <title>Phone cyber security: An introduction - Get Cyber Safe</title> <base href="/"> <meta content="width=device-width,initial-scale=1" name="viewport"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="description" content="Our phones are a key source for, well, pretty much everything. Unfortunately, this reliance on our phones makes them prime targets for cyber criminals."> <meta name="dcterms.title" content="Phone cyber security: An introduction - Get Cyber Safe"> <meta name="dcterms.creator" content="Communications Security Establishment Canada"> <meta name="dcterms.issued" content="2020-10-02T13:08:33Z"> <meta name="dcterms.modified" content="2021-11-03"> <meta name="keywords" content="Internet Security, Cyber Security"> <meta name="dcterms.subject" content="Information Security"> <meta name="dcterms.language" title="ISO639-2" content="en"> <!-- Adobe Analytics data --> <meta name="gcaaterms.sitename" content="CSE-CST_GCS-PCS"> <meta name="dcterms.accessRights" content="2"> <meta name="robots" content="all"> <!-- Twitter Card data --> <meta name="twitter:card" content="summary_large_image"> <meta name="twitter:site" content="@GetCyberSafe"> <meta name="twitter:title" content="Phone cyber security: An introduction - Get Cyber Safe"> <meta name="twitter:description" content="Our phones are a key source for, well, pretty much everything. Unfortunately, this reliance on our phones makes them prime targets for cyber criminals."> <meta name="twitter:creator" content="@GetCyberSafe"> <meta name="twitter:image" content="https://www.getcybersafe.gc.ca/sites/default/files/images/GCS-web-avatar-1200x630.jpg"> <meta name="twitter:image:alt" content=""> <!-- Open Graph data --> <meta property="og:title" content="Phone cyber security: An introduction - Get Cyber Safe"> <meta property="og:type" content="article"> <meta property="og:image" content="https://www.getcybersafe.gc.ca/sites/default/files/images/GCS-web-avatar-1200x630.jpg"> <meta property="og:description" content="Our phones are a key source for, well, pretty much everything. Unfortunately, this reliance on our phones makes them prime targets for cyber criminals."> <meta property="og:site_name" content="Get Cyber Safe"> <meta property="og:image:alt" content=""> <link rel="icon" type="image/x-icon" href="./GCWeb/assets/favicon.ico"> <link rel="stylesheet" href="https://use.fontawesome.com/releases/v5.8.1/css/all.css" integrity="sha384-50oBUHEmvpQ+1lW4y57PTFmhCaXp0ML5d60M1M7uH2+nqUivzIebhndOJK28anvf" crossorigin="anonymous"> <link rel="stylesheet" href="./GCWeb/css/theme.min.css"> <link rel="stylesheet" href="./GCWeb/css/messages.min.css"> <noscript> <link rel="stylesheet" href="./wet-boew/css/noscript.min.css"> </noscript> <link rel="stylesheet" href="/invitation-manager/Overlay.css"> <link rel="stylesheet" href="styles.6b06dd04afaebb12.css"><meta name="dcterms.service" content="CSE-CST_GCS-PCS"><style ng-app-id="serverApp">.pddg-tp-sm[_ngcontent-serverApp-c32156002]{padding-top:5px}</style><style ng-app-id="serverApp">.bg-gcs-orange[_ngcontent-serverApp-c3592091850]{background-color:#de4b20;color:#fff}.bg-gcs-black[_ngcontent-serverApp-c3592091850]{background-color:#2d2929;color:#fff}.bg-gcs-black[_ngcontent-serverApp-c3592091850] a[_ngcontent-serverApp-c3592091850]{color:#fff;font-weight:700}</style></head> <body vocab="http://schema.org/" typeof="WebPage" class=""> <app-root _nghost-serverapp-c3233496809="" ng-version="16.2.12" ng-server-context="ssr"><wxt-header _ngcontent-serverapp-c3233496809="" _nghost-serverapp-c32156002=""><nav _ngcontent-serverapp-c32156002=""><ul _ngcontent-serverapp-c32156002="" id="wb-tphp"><li _ngcontent-serverapp-c32156002="" class="wb-slc"><a _ngcontent-serverapp-c32156002="" class="wb-sl" href="/en/blogs/phone-cyber-security-introduction#wb-cont">Skip to main content</a></li><li _ngcontent-serverapp-c32156002="" class="wb-slc"><a _ngcontent-serverapp-c32156002="" class="wb-sl" href="/en/blogs/phone-cyber-security-introduction#wb-info">Skip to "About government"</a></li></ul></nav><header _ngcontent-serverapp-c32156002=""><div _ngcontent-serverapp-c32156002="" id="wb-bnr" class="container"><div _ngcontent-serverapp-c32156002="" class="row"><section _ngcontent-serverapp-c32156002="" id="wb-lng" class="col-xs-3 col-sm-12 pull-right text-right"><h2 _ngcontent-serverapp-c32156002="" class="wb-inv">Language selection</h2><ul _ngcontent-serverapp-c32156002="" class="list-inline mrgn-bttm-0"><li _ngcontent-serverapp-c32156002=""><a _ngcontent-serverapp-c32156002="" id="langToggle" lang="fr" href="http://pensezcybersecurite.gc.ca/fr/blogues/telephones-et-cybersecurite-une-introduction"><span _ngcontent-serverapp-c32156002="" class="hidden-xs">Français</span><abbr _ngcontent-serverapp-c32156002="" class="visible-xs h3 mrgn-tp-sm mrgn-bttm-0 text-uppercase" title="Français">fr</abbr></a></li></ul></section><div _ngcontent-serverapp-c32156002="" property="publisher" resource="#wb-publisher" typeof="GovernmentOrganization" class="brand col-xs-9 col-sm-5 col-md-4"><a _ngcontent-serverapp-c32156002="" property="url" href="https://www.canada.ca/en.html"><img _ngcontent-serverapp-c32156002="" alt="" property="logo" src="./GCWeb/assets/sig-blk-en.svg"><span _ngcontent-serverapp-c32156002="" property="name" class="wb-inv"> Government of Canada / <span _ngcontent-serverapp-c32156002="" lang="fr">Gouvernement du Canada</span></span></a><meta _ngcontent-serverapp-c32156002="" property="areaServed" typeof="Country" content="Canada"><link _ngcontent-serverapp-c32156002="" property="logo" href="./GCWeb/assets/wmms-blk.svg"></div><section _ngcontent-serverapp-c32156002="" id="wb-srch" class="col-lg-offset-4 col-md-offset-4 col-sm-offset-2 col-xs-12 col-sm-5 col-md-4"><h2 _ngcontent-serverapp-c32156002="" aria-hidden="true">Search</h2><form _ngcontent-serverapp-c32156002="" method="get" name="cse-search-box" role="search" ngnoform="" action="https://www.canada.ca/en/communications-security/get-cyber-safe/search.html"><div _ngcontent-serverapp-c32156002="" class="form-group wb-srch-qry"><label _ngcontent-serverapp-c32156002="" for="wb-srch-q" class="wb-inv">Search</label><input _ngcontent-serverapp-c32156002="" id="wb-srch-q" name="q" type="search" value="" size="34" maxlength="170" class="wb-srch-q form-control" placeholder="Search"></div><div _ngcontent-serverapp-c32156002="" class="form-group submit"><button _ngcontent-serverapp-c32156002="" type="submit" id="wb-srch-sub" name="wb-srch-sub" class="btn btn-primary btn-small"><span _ngcontent-serverapp-c32156002="" class="glyphicon-search glyphicon pddg-tp-sm"></span><span _ngcontent-serverapp-c32156002="" class="wb-inv">Search</span></button></div></form></section><!----></div></div><nav _ngcontent-serverapp-c32156002="" typeof="SiteNavigationElement" class="gcweb-menu"><div _ngcontent-serverapp-c32156002="" class="container"><h2 _ngcontent-serverapp-c32156002="" class="wb-inv">Menu</h2><button _ngcontent-serverapp-c32156002="" type="button" aria-haspopup="true" aria-expanded="false"><span _ngcontent-serverapp-c32156002="" class="wb-inv">Main </span>Menu <span _ngcontent-serverapp-c32156002="" class="expicon glyphicon glyphicon-chevron-down"></span></button><ul _ngcontent-serverapp-c32156002="" role="menu" aria-orientation="vertical"><li _ngcontent-serverapp-c32156002="" role="presentation"><a _ngcontent-serverapp-c32156002="" role="menuitem" href="https://www.canada.ca/en/services/jobs.html">Jobs and the workplace</a></li><li _ngcontent-serverapp-c32156002="" role="presentation"><a _ngcontent-serverapp-c32156002="" role="menuitem" href="https://www.canada.ca/en/services/immigration-citizenship.html">Immigration and citizenship</a></li><li _ngcontent-serverapp-c32156002="" role="presentation"><a _ngcontent-serverapp-c32156002="" role="menuitem" href="https://travel.gc.ca/">Travel and tourism</a></li><li _ngcontent-serverapp-c32156002="" role="presentation"><a _ngcontent-serverapp-c32156002="" role="menuitem" href="https://www.canada.ca/en/services/business.html">Business and industry</a></li><li _ngcontent-serverapp-c32156002="" role="presentation"><a _ngcontent-serverapp-c32156002="" role="menuitem" href="https://www.canada.ca/en/services/benefits.html">Benefits</a></li><li _ngcontent-serverapp-c32156002="" role="presentation"><a _ngcontent-serverapp-c32156002="" role="menuitem" href="https://www.canada.ca/en/services/health.html">Health</a></li><li _ngcontent-serverapp-c32156002="" role="presentation"><a _ngcontent-serverapp-c32156002="" role="menuitem" href="https://www.canada.ca/en/services/taxes.html">Taxes</a></li><li _ngcontent-serverapp-c32156002="" role="presentation"><a _ngcontent-serverapp-c32156002="" role="menuitem" href="https://www.canada.ca/en/services/environment.html">Environment and natural resources</a></li><li _ngcontent-serverapp-c32156002="" role="presentation"><a _ngcontent-serverapp-c32156002="" role="menuitem" href="https://www.canada.ca/en/services/defence.html">National security and defence</a></li><li _ngcontent-serverapp-c32156002="" role="presentation"><a _ngcontent-serverapp-c32156002="" role="menuitem" href="https://www.canada.ca/en/services/culture.html">Culture, history and sport</a></li><li _ngcontent-serverapp-c32156002="" role="presentation"><a _ngcontent-serverapp-c32156002="" role="menuitem" href="https://www.canada.ca/en/services/policing.html">Policing, justice and emergencies</a></li><li _ngcontent-serverapp-c32156002="" role="presentation"><a _ngcontent-serverapp-c32156002="" role="menuitem" href="https://www.canada.ca/en/services/transport.html">Transport and infrastructure</a></li><li _ngcontent-serverapp-c32156002="" role="presentation"><a _ngcontent-serverapp-c32156002="" role="menuitem" href="https://international.gc.ca/world-monde/index.aspx?lang=eng">Canada and the world</a></li><li _ngcontent-serverapp-c32156002="" role="presentation"><a _ngcontent-serverapp-c32156002="" role="menuitem" href="https://www.canada.ca/en/services/finance.html">Money and finances</a></li><li _ngcontent-serverapp-c32156002="" role="presentation"><a _ngcontent-serverapp-c32156002="" role="menuitem" href="https://www.canada.ca/en/services/science.html">Science and innovation</a></li></ul></div></nav><!----><wxt-breadcrumb _ngcontent-serverapp-c32156002="" _nghost-serverapp-c1066340367=""><nav _ngcontent-serverapp-c1066340367="" id="wb-bc" property="breadcrumb" aria-label="Breadcrumb"><div _ngcontent-serverapp-c1066340367="" class="container"><ol _ngcontent-serverapp-c1066340367="" class="breadcrumb"><li _ngcontent-serverapp-c1066340367=""><a _ngcontent-serverapp-c1066340367="" href="https://canada.ca/en.html">Canada.ca</a></li><li _ngcontent-serverapp-c1066340367=""><a _ngcontent-serverapp-c1066340367="" href="/en">Get Cyber Safe</a></li><!----><li _ngcontent-serverapp-c1066340367=""><a _ngcontent-serverapp-c1066340367="" href="/en/blogs">Blogs</a></li><!----><!----><!----><!----></ol></div></nav></wxt-breadcrumb><!----></header></wxt-header><!----><router-outlet _ngcontent-serverapp-c3233496809=""></router-outlet><app-page _nghost-serverapp-c3072653200=""><main _ngcontent-serverapp-c3072653200="" property="mainContentOfPage" typeof="WebPageElement" class="container"><app-alert _ngcontent-serverapp-c3072653200="" _nghost-serverapp-c3592091850=""><!----><!----></app-alert><!----><h1 _ngcontent-serverapp-c3072653200="" id="wb-cont">Phone cyber security: An introduction</h1><div _ngcontent-serverapp-c3072653200="" id="main"><article data-history-node-id="164" role="article" about="/en/blogs/phone-cyber-security-introduction" class="page full clearfix"><div class="content"> <div class="row bs-1col-stacked"> <div class="col-sm-12 bs-region bs-region--top"> <div data-block-plugin-id="block_content:1af8f657-4625-4012-9414-da0913b6c1cf" class="block block-block-content block-block-content1af8f657-4625-4012-9414-da0913b6c1cf clearfix"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>From: <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="f5d5b0d3-8d56-471f-a159-d063768a8d3e" href="/en/homepage">Get Cyber Safe</a></strong></p> <section class="followus" nowrap="nowrap" style="padding-left: 0px; background-color: rgb(255, 255, 255);"><h2 class="h6" style="margin-left: 0">Follow:</h2> <ul><li><a class="facebook" href="https://www.facebook.com/GetCyberSafe" style="border: solid 2px #fff;" tabindex="-1"><span class="wb-inv">Facebook</span></a></li> <li><a class="linkedin" href="https://www.linkedin.com/showcase/get-cyber-safe" style="border: solid 2px #fff;" tabindex="-1"><span class="wb-inv">Linkedin</span></a></li> <li><a class="twitter" href="https://twitter.com/getcybersafe" style="border: solid 2px #fff;" tabindex="-1"><span class="wb-inv">Twitter</span></a></li> <li><a class="instagram" href="https://www.instagram.com/getcybersafe/" style="border: solid 2px #fff;" tabindex="-1"><span class="wb-inv">Instagram</span></a></li> <li><a class="youtube" href="https://www.youtube.com/playlist?list=PLEzYzSmu1IFQXghAzLrYBmf278UnRbVyo" style="border: 2px solid rgb(255, 255, 255); border-image: none;" tabindex="-1"><span class="wb-inv">YouTube</span></a></li> </ul></section></div> </div> </div> <div class="col-sm-12 bs-region bs-region--main"> <div data-block-plugin-id="field_block:node:page:body" class="block block-layout-builder block-field-blocknodepagebody clearfix"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>Our phones are a key source for, well, pretty much everything. We’re more connected to our smartphones now than ever before because they can help us out in almost any situation. Whether it’s catching a ride, connecting with your friends and family, ordering groceries or just looking at memes, your phone is there for you through it all. Your phone also contains lots of personal information, such as your photos and text message history. &nbsp;</p> <p>Unfortunately, our reliance on our phones, combined with the personal information stored on them, makes them prime targets for cyber criminals. That’s why it’s important to learn how to keep them safe.</p> <p>Here’s what you need to know about phone cyber security.</p> <h2>Common threats against your mobile device<img alt="a person looks at his phone, and a phone with a heart-eyes emoji on it" class="img-responsive align-right" data-entity-type="file" data-entity-uuid="578321ba-05bf-4c26-8428-2bd32d328822" src="/sites/default/files/inline-images/header-blog-CSAMwk2-1-580x330-E.jpg" style="margin:20px" width="580" height="331" loading="lazy"></h2> <p>Cyber security threats on your phone can be subtle. That means that we don’t necessarily know where we’re vulnerable, which leaves us even more exposed to attacks that can cost us our money, identities or time.</p> <h3>Phishing</h3> <p>One of the most common threats is <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="d2399766-19ab-46c2-827b-fa7a796e10ad" href="/en/blogs/three-common-types-phishing-scams">phishing</a> – fraudulent emails, texts, social media messages, and even phone calls.</p> <p>These messages often ask you to log in somewhere, verify an account with information only you know, or threaten you. They might even try to convince you to download <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="02e89315-a715-4d22-8ed4-f50375a42a24" href="/en/blogs/what-malware-how-protect-yourself">malware</a>. Cyber criminals will say anything to convince you that they are a legitimate company or person to get you to release your personal data to them or to download their malware.</p> <h3>Malicious Apps</h3> <p><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="ee787f87-c632-4086-9c8e-b3048137e422" href="/en/resources/malware-infographic-detected">Malicious apps</a> are another common cyber security threat.</p> <p>They may appear innocent, fun, or useful, but, in fact, are demanding access to an excessive number of permissions on your device.&nbsp; More permission means more access to personal information that you’d rather not give away.</p> <p>These malicious apps are often fake apps, but may look and even function like regular apps. The reality is that they can pose a number of cyber security risks – from corrupting your phone with malware to stealing your personal information.</p> <h3>Unsecured Wi-Fi</h3> <p>Another subtle tactic that cyber criminals use in targeting victims’ smartphones is tricking people into connecting to dangerous Wi-Fi networks.</p> <p>The <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="f8cfac01-eab6-448f-82c3-fedfb61308cc" href="/en/secure-your-connections/public-wi-fi">public Wi-Fi</a> at your local café may seem easy to use and helpful,, but beware: criminals will often create fake networks that appear legitimate on your Wi-Fi list. In reality, though, these are traps designed to steal your personal data.</p> <h2>How to protect your smartphone</h2> <h3>Use multi-factor authentication</h3> <p><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="d88b2fa9-315f-41be-aad0-5c19c637e3bf" href="/en/blogs/multi-factor-authentication-three-reasons-why-its-essential-cyber-security">Multi-factor authentication</a> is the practice of using multiple ways of verifying you are you, and that you are the person linked to the account or device you want to use. Multi-factor authentication works by using a password, pattern, or facial recognition at the same time.</p> <p>This makes it more difficult for cyber criminals to access the information on your device if it gets lost or stolen.</p> <p>If you can, you should set up multi factor authentication on your smartphone. Start with a strong passcode, passphrase, or pattern that only you know, and combine it with either facial recognition or a thumb print.</p> <h3>Enable a lock screen and password</h3> <p>Enabling a lock screen and password on your phone is one of the best ways of keeping your phone secure should it fall into the wrong hands. This means that, anytime you try to access your phone, you’ll need to enter a pin (or do something similar like scan your face or fingerprint) to access it.</p> <p>Another advantage to this feature is it allows you to enable your phone to lock automatically after a certain point. If you leave your phone on (say at a table at a coffee shop) cyber criminals won’t be able to easily access it – it will just lock automatically.</p> <p>It’s also important to be vigilant when using your phone in public places. Never leave your phone unattended. Cyber criminals could easily access it to gain whatever information they need about you.</p> <h3>Be wary of suspicious messages or phone calls</h3> <p>Never give up your personal information or log-in data if an email, text message or phone call seems suspicious, specially if you weren’t expecting to receive them.</p> <p>Cyber criminals can try to trick you into giving up personal information by pretending to be a representative from an organization or government agency, such as your bank or the CRA. If you’re not sure whether the message or phone call is real, you should hang up, and contact the company or government department through the contact details on their website. This way you are in control and can use the correct email or phone numbers to verify whether or not the inquiry is real. Don’t forget that <a href="https://www.canada.ca/en/revenue-agency/corporate/security/protect-yourself-against-fraud.html">the CRA and other government agencies</a> will never threaten you or use aggressive language when contacting you.</p> <p>Because our phones are connected to the internet and linked to our email accounts, we can receive phone calls, emails, and text messages at any hour of the day, no matter where we are. We might be distracted or tired or busy when we receive these calls or messages. We need to be vigilant about double-checking messages and thinking twice about requests for personal information to avoid falling for phishing scams.</p> <p>That makes it extra important to recognize what a phishing message might look or sound like.</p> <p>Look for <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="6df9b932-4a7f-4b8d-8bc3-35c8cfa6e3c6" href="/en/resources/7-red-flags-phishing">signs of phishing</a> messages, like spelling mistakes, pixelated logos, and suspicious email addresses.</p> <h3>Read the list of permissions before downloading apps</h3> <p>Time to get the app everyone is using? When you install a new app on your phone, you may be prompted with a permission request. By clicking “OK”, you consent to your phone sharing certain types of information with that app, or you‘re saying it’s OK for the app to access things like your location, camera, or microphone. For some phones, you may need to check your settings to verify permissions.</p> <p>When you download new apps, you might overlook the fine print like the terms and conditions or privacy statements for the app. They are important to pay attention to, because this is where the app lets you know what it will do with your information. You could be sharing data that you don’t want to part with. Always look closely at what permissions an app will need before you install it. If the permissions seem invasive or confusing, or don’t make sense for what the app is supposed to do, either don’t download the app or delete it if you’ve already done so.</p> <h3>Don’t be fooled by public Wi-Fi</h3> <p>No matter how appealing it is to connect to free Wi-Fi, make sure you’re accessing a network that is secured, verified and doesn’t demand any personal information for you to join. Cyber criminals can create networks that look harmless but are actually malicious. Sometimes they will create a fake network that uses the same name as the one you want to join in order to trick you.</p> <p>When in doubt, ask an employee which network to use so that you can ensure you aren’t putting yourself at risk of network spoofing.<br> Better yet, you can use a <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="102099c7-f37d-438d-bd56-48e30ed6ce59" href="/en/secure-your-connections/vpns">VPN </a>any time you connect to public a network to ensure your data is secure. (Just know that malware can still get through a VPN.)</p> <h2>Conclusion</h2> <p>Our smartphones are incredibly useful devices that never leave our sides. They’re one of our most dependable sidekicks and have undoubtedly earned their spot as our BFF.&nbsp; They help keep us connected with the world around us. Unfortunately, this kind of connection leaves our phones at high risk for hackers who see an opportunity in the amount of time we spend with them and the personal information they contain.</p> <p>By staying vigilant and educating yourself about smartphone security risks, you can keep your device safe from cyber attacks.</p> </div> </div> </div> <div class="col-sm-12 bs-region bs-region--bottom"> <div data-block-plugin-id="field_block:node:page:comment" class="block block-layout-builder block-field-blocknodepagecomment clearfix"> <section></section></div> <div data-block-plugin-id="field_block:node:page:field_related_links" class="block block-layout-builder block-field-blocknodepagefield-related-links clearfix"> <section class="panel panel-success" style="margin-top:10px;"><header class="panel-heading"><h3 class="panel-title">Related Links</h3> </header><div class="panel-body"> <div class="field--items"> <div class="field--item"><a data-rel="internal" href="/en/cyber-security-awareness-month">Cyber Security Awareness Month</a></div> <div class="field--item"><a data-rel="internal" href="/en/csam-themes">CSAM 2020 - Theme page</a></div> <div class="field--item"><a data-rel="internal" href="/en/resources/csam-resources">CSAM Resources </a></div> <div class="field--item"><a data-rel="internal" href="/en/resources/cyber-security-awareness-month-week-2-phone-week">Cyber Security Awareness Month Week 2: Phone Week</a></div> <div class="field--item"><a data-rel="internal" href="/en/blogs/how-you-can-stay-cyber-secure-when-downloading-and-using-apps">How you can stay cyber secure when downloading and using apps</a></div> </div> </div> </section></div> </div> </div> </div> </article></div><!----><!----><!----><!----><!----><!----><!----><!----><wxt-prefooter _ngcontent-serverapp-c3072653200="" _nghost-serverapp-c832015165=""><div _ngcontent-serverapp-c832015165="" class="pagedetails"><dl _ngcontent-serverapp-c832015165="" id="wb-dtmd"><dt _ngcontent-serverapp-c832015165="">Date modified: </dt><dd _ngcontent-serverapp-c832015165=""><time _ngcontent-serverapp-c832015165="" property="dateModified">2021-11-03</time></dd></dl></div></wxt-prefooter></main></app-page><!----><wxt-footer _ngcontent-serverapp-c3233496809="" _nghost-serverapp-c372692533=""><footer _ngcontent-serverapp-c372692533="" id="wb-info"><h2 _ngcontent-serverapp-c372692533="" class="wb-inv">About this site</h2><!----><div _ngcontent-serverapp-c372692533="" class="gc-main-footer"><div _ngcontent-serverapp-c372692533="" class="container"><nav _ngcontent-serverapp-c372692533=""><h3 _ngcontent-serverapp-c372692533="">Government of Canada</h3><ul _ngcontent-serverapp-c372692533="" class="list-col-xs-1 list-col-sm-2 list-col-md-3"><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/contact.html">All contacts</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/government/dept.html">Departments and agencies</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/government/system.html">About government</a></li><!----></ul><h4 _ngcontent-serverapp-c372692533=""><span _ngcontent-serverapp-c372692533="" class="wb-inv">Themes and topics</span></h4><ul _ngcontent-serverapp-c372692533="" class="list-unstyled colcount-sm-2 colcount-md-3"><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/services/jobs.html">Jobs</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/services/immigration-citizenship.html">Immigration and citizenship</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://travel.gc.ca/">Travel and tourism</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/services/business.html">Business</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/services/benefits.html">Benefits</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/services/health.html">Health</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/services/taxes.html">Taxes</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/services/environment.html">Environment and natural resources</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/services/defence.html">National security and defence</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/services/culture.html">Culture, history and sport</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/services/policing.html">Policing, justice and emergencies</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/services/transport.html">Transport and infrastructure</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://international.gc.ca/world-monde/index.aspx?lang=eng">Canada and the world</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/services/finance.html">Money and finance</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/services/science.html">Science and innovation</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/services/indigenous-peoples.html">Indigenous peoples</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/services/veterans.html">Veterans and military</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/services/youth.html">Youth</a></li><!----></ul></nav></div></div><!----><div _ngcontent-serverapp-c372692533="" class="gc-sub-footer"><div _ngcontent-serverapp-c372692533="" class="container d-flex align-items-center"><nav _ngcontent-serverapp-c372692533=""><h3 _ngcontent-serverapp-c372692533="" class="wb-inv">Government of Canada Corporate</h3><ul _ngcontent-serverapp-c372692533=""><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/social.html">Social media</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/mobile.html">Mobile applications</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/government/about.html">About Canada.ca</a></li><!----><!----><!----><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/transparency/terms.html"> Terms and conditions</a></li><li _ngcontent-serverapp-c372692533=""><a _ngcontent-serverapp-c372692533="" href="https://www.canada.ca/en/transparency/privacy.html"> Privacy</a></li></ul></nav><div _ngcontent-serverapp-c372692533="" class="wtrmrk align-self-end"><img _ngcontent-serverapp-c372692533="" src="./GCWeb/assets/wmms-blk.svg" loading="lazy" alt="Symbol of the Government of Canada"></div></div></div><!----><!----><!----></footer></wxt-footer><!----></app-root> <script src="https://www.google.com/recaptcha/api.js?render=6LftgyMjAAAAAE1u4HiHsXhl8F04DSmRIVSaGrzJ"></script> <script src="./wet-boew/js/jquery/3.5.1/jquery.min.js"></script> <script src="./wet-boew/js/wet-boew.min.js"></script> <script src="./GCWeb/js/theme.min.js"></script> <script src="assets/decision_tree/decision_tree.js"></script> <script src="/invitation-manager/Overlay.js"></script> <script src="/invitation-manager/InvitationManager.js"></script> <script src="runtime.d79aab1a75020b85.js" type="module"></script><script src="polyfills.2332cc039a4d4c23.js" type="module"></script><script src="main.768c2e042ce00bd0.js" type="module"></script> <script id="serverApp-state" type="application/json">{"G.json.https://www.getcybersafe.gc.ca/api/getcybersafe/alerts/v1/get?lang=en&sort=desc&type=global":{"body":{"ERROR":true,"response":null},"headers":{"date":["Wed, 18 Dec 2024 08:12:38 GMT"],"content-type":["application/json"],"transfer-encoding":["chunked"],"connection":["keep-alive"],"vary":["Accept-Encoding"],"access-control-allow-origin":["*"],"x-frame-options":["SAMEORIGIN"],"x-content-type-options":["nosniff"],"x-xss-protection":["1; mode=block"],"referrer-policy":["no-referrer-when-downgrade"],"strict-transport-security":["max-age=31536000; includeSubDomains"]},"status":200,"statusText":"OK","url":"https://www.getcybersafe.gc.ca/api/getcybersafe/alerts/v1/get?lang=en&type=global&sort=desc","responseType":"json"},"G.json.https://www.getcybersafe.gc.ca/api/getcybersafe/page/v1/get?lang=en&url=/en/blogs/phone-cyber-security-introduction":{"body":{"ERROR":false,"response":{"page":{"nid":164,"title":"Phone cyber security: An introduction","summary":"Our phones are a key source for, well, pretty much everything. Unfortunately, this reliance on our phones makes them prime targets for cyber criminals.","body":"\u003Carticle data-history-node-id=\"164\" role=\"article\" about=\"/en/blogs/phone-cyber-security-introduction\" class=\"page full clearfix\">\u003Cdiv class=\"content\">\n \u003Cdiv class=\"row bs-1col-stacked\">\n \n\n \u003Cdiv class=\"col-sm-12 bs-region bs-region--top\">\n \n\n\u003Cdiv data-block-plugin-id=\"block_content:1af8f657-4625-4012-9414-da0913b6c1cf\" class=\"block block-block-content block-block-content1af8f657-4625-4012-9414-da0913b6c1cf clearfix\">\n \n \n\n \n \u003Cdiv class=\"field field--name-body field--type-text-with-summary field--label-hidden field--item\">\u003Cp>\u003Cstrong>From: \u003Ca data-entity-substitution=\"canonical\" data-entity-type=\"node\" data-entity-uuid=\"f5d5b0d3-8d56-471f-a159-d063768a8d3e\" href=\"/en/homepage\">Get Cyber Safe\u003C/a>\u003C/strong>\u003C/p>\n\n\u003Csection class=\"followus\" nowrap=\"nowrap\" style=\"padding-left: 0px; background-color: rgb(255, 255, 255);\">\u003Ch2 class=\"h6\" style=\"margin-left: 0\">Follow:\u003C/h2>\n\n\u003Cul>\u003Cli>\u003Ca class=\"facebook\" href=\"https://www.facebook.com/GetCyberSafe\" style=\"border: solid 2px #fff;\" tabindex=\"-1\">\u003Cspan class=\"wb-inv\">Facebook\u003C/span>\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca class=\"linkedin\" href=\"https://www.linkedin.com/showcase/get-cyber-safe\" style=\"border: solid 2px #fff;\" tabindex=\"-1\">\u003Cspan class=\"wb-inv\">Linkedin\u003C/span>\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca class=\"twitter\" href=\"https://twitter.com/getcybersafe\" style=\"border: solid 2px #fff;\" tabindex=\"-1\">\u003Cspan class=\"wb-inv\">Twitter\u003C/span>\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca class=\"instagram\" href=\"https://www.instagram.com/getcybersafe/\" style=\"border: solid 2px #fff;\" tabindex=\"-1\">\u003Cspan class=\"wb-inv\">Instagram\u003C/span>\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca class=\"youtube\" href=\"https://www.youtube.com/playlist?list=PLEzYzSmu1IFQXghAzLrYBmf278UnRbVyo\" style=\"border: 2px solid rgb(255, 255, 255); border-image: none;\" tabindex=\"-1\">\u003Cspan class=\"wb-inv\">YouTube\u003C/span>\u003C/a>\u003C/li>\n\u003C/ul>\u003C/section>\u003C/div>\n \n \u003C/div>\n\n \u003C/div>\n \n \u003Cdiv class=\"col-sm-12 bs-region bs-region--main\">\n \n\u003Cdiv data-block-plugin-id=\"field_block:node:page:body\" class=\"block block-layout-builder block-field-blocknodepagebody clearfix\">\n \n \n\n \n \u003Cdiv class=\"field field--name-body field--type-text-with-summary field--label-hidden field--item\">\u003Cp>Our phones are a key source for, well, pretty much everything. We’re more connected to our smartphones now than ever before because they can help us out in almost any situation. Whether it’s catching a ride, connecting with your friends and family, ordering groceries or just looking at memes, your phone is there for you through it all. Your phone also contains lots of personal information, such as your photos and text message history.  \u003C/p>\n\n\u003Cp>Unfortunately, our reliance on our phones, combined with the personal information stored on them, makes them prime targets for cyber criminals. That’s why it’s important to learn how to keep them safe.\u003C/p>\n\n\u003Cp>Here’s what you need to know about phone cyber security.\u003C/p>\n\n\u003Ch2>Common threats against your mobile device\u003Cimg alt=\"a person looks at his phone, and a phone with a heart-eyes emoji on it\" class=\"img-responsive align-right\" data-entity-type=\"file\" data-entity-uuid=\"578321ba-05bf-4c26-8428-2bd32d328822\" src=\"/sites/default/files/inline-images/header-blog-CSAMwk2-1-580x330-E.jpg\" style=\"margin:20px\" width=\"580\" height=\"331\" loading=\"lazy\" />\u003C/h2>\n\n\u003Cp>Cyber security threats on your phone can be subtle. That means that we don’t necessarily know where we’re vulnerable, which leaves us even more exposed to attacks that can cost us our money, identities or time.\u003C/p>\n\n\u003Ch3>Phishing\u003C/h3>\n\n\u003Cp>One of the most common threats is \u003Ca data-entity-substitution=\"canonical\" data-entity-type=\"node\" data-entity-uuid=\"d2399766-19ab-46c2-827b-fa7a796e10ad\" href=\"/en/blogs/three-common-types-phishing-scams\">phishing\u003C/a> – fraudulent emails, texts, social media messages, and even phone calls.\u003C/p>\n\n\u003Cp>These messages often ask you to log in somewhere, verify an account with information only you know, or threaten you. They might even try to convince you to download \u003Ca data-entity-substitution=\"canonical\" data-entity-type=\"node\" data-entity-uuid=\"02e89315-a715-4d22-8ed4-f50375a42a24\" href=\"/en/blogs/what-malware-how-protect-yourself\">malware\u003C/a>. Cyber criminals will say anything to convince you that they are a legitimate company or person to get you to release your personal data to them or to download their malware.\u003C/p>\n\n\u003Ch3>Malicious Apps\u003C/h3>\n\n\u003Cp>\u003Ca data-entity-substitution=\"canonical\" data-entity-type=\"node\" data-entity-uuid=\"ee787f87-c632-4086-9c8e-b3048137e422\" href=\"/en/resources/malware-infographic-detected\">Malicious apps\u003C/a> are another common cyber security threat.\u003C/p>\n\n\u003Cp>They may appear innocent, fun, or useful, but, in fact, are demanding access to an excessive number of permissions on your device.  More permission means more access to personal information that you’d rather not give away.\u003C/p>\n\n\u003Cp>These malicious apps are often fake apps, but may look and even function like regular apps. The reality is that they can pose a number of cyber security risks – from corrupting your phone with malware to stealing your personal information.\u003C/p>\n\n\u003Ch3>Unsecured Wi-Fi\u003C/h3>\n\n\u003Cp>Another subtle tactic that cyber criminals use in targeting victims’ smartphones is tricking people into connecting to dangerous Wi-Fi networks.\u003C/p>\n\n\u003Cp>The \u003Ca data-entity-substitution=\"canonical\" data-entity-type=\"node\" data-entity-uuid=\"f8cfac01-eab6-448f-82c3-fedfb61308cc\" href=\"/en/secure-your-connections/public-wi-fi\">public Wi-Fi\u003C/a> at your local café may seem easy to use and helpful,, but beware: criminals will often create fake networks that appear legitimate on your Wi-Fi list. In reality, though, these are traps designed to steal your personal data.\u003C/p>\n\n\u003Ch2>How to protect your smartphone\u003C/h2>\n\n\u003Ch3>Use multi-factor authentication\u003C/h3>\n\n\u003Cp>\u003Ca data-entity-substitution=\"canonical\" data-entity-type=\"node\" data-entity-uuid=\"d88b2fa9-315f-41be-aad0-5c19c637e3bf\" href=\"/en/blogs/multi-factor-authentication-three-reasons-why-its-essential-cyber-security\">Multi-factor authentication\u003C/a> is the practice of using multiple ways of verifying you are you, and that you are the person linked to the account or device you want to use. Multi-factor authentication works by using a password, pattern, or facial recognition at the same time.\u003C/p>\n\n\u003Cp>This makes it more difficult for cyber criminals to access the information on your device if it gets lost or stolen.\u003C/p>\n\n\u003Cp>If you can, you should set up multi factor authentication on your smartphone. Start with a strong passcode, passphrase, or pattern that only you know, and combine it with either facial recognition or a thumb print.\u003C/p>\n\n\u003Ch3>Enable a lock screen and password\u003C/h3>\n\n\u003Cp>Enabling a lock screen and password on your phone is one of the best ways of keeping your phone secure should it fall into the wrong hands. This means that, anytime you try to access your phone, you’ll need to enter a pin (or do something similar like scan your face or fingerprint) to access it.\u003C/p>\n\n\u003Cp>Another advantage to this feature is it allows you to enable your phone to lock automatically after a certain point. If you leave your phone on (say at a table at a coffee shop) cyber criminals won’t be able to easily access it – it will just lock automatically.\u003C/p>\n\n\u003Cp>It’s also important to be vigilant when using your phone in public places. Never leave your phone unattended. Cyber criminals could easily access it to gain whatever information they need about you.\u003C/p>\n\n\u003Ch3>Be wary of suspicious messages or phone calls\u003C/h3>\n\n\u003Cp>Never give up your personal information or log-in data if an email, text message or phone call seems suspicious, specially if you weren’t expecting to receive them.\u003C/p>\n\n\u003Cp>Cyber criminals can try to trick you into giving up personal information by pretending to be a representative from an organization or government agency, such as your bank or the CRA. If you’re not sure whether the message or phone call is real, you should hang up, and contact the company or government department through the contact details on their website. This way you are in control and can use the correct email or phone numbers to verify whether or not the inquiry is real. Don’t forget that \u003Ca href=\"https://www.canada.ca/en/revenue-agency/corporate/security/protect-yourself-against-fraud.html\">the CRA and other government agencies\u003C/a> will never threaten you or use aggressive language when contacting you.\u003C/p>\n\n\u003Cp>Because our phones are connected to the internet and linked to our email accounts, we can receive phone calls, emails, and text messages at any hour of the day, no matter where we are. We might be distracted or tired or busy when we receive these calls or messages. We need to be vigilant about double-checking messages and thinking twice about requests for personal information to avoid falling for phishing scams.\u003C/p>\n\n\u003Cp>That makes it extra important to recognize what a phishing message might look or sound like.\u003C/p>\n\n\u003Cp>Look for \u003Ca data-entity-substitution=\"canonical\" data-entity-type=\"node\" data-entity-uuid=\"6df9b932-4a7f-4b8d-8bc3-35c8cfa6e3c6\" href=\"/en/resources/7-red-flags-phishing\">signs of phishing\u003C/a> messages, like spelling mistakes, pixelated logos, and suspicious email addresses.\u003C/p>\n\n\u003Ch3>Read the list of permissions before downloading apps\u003C/h3>\n\n\u003Cp>Time to get the app everyone is using? When you install a new app on your phone, you may be prompted with a permission request. By clicking “OK”, you consent to your phone sharing certain types of information with that app, or you‘re saying it’s OK for the app to access things like your location, camera, or microphone. For some phones, you may need to check your settings to verify permissions.\u003C/p>\n\n\u003Cp>When you download new apps, you might overlook the fine print like the terms and conditions or privacy statements for the app. They are important to pay attention to, because this is where the app lets you know what it will do with your information. You could be sharing data that you don’t want to part with. Always look closely at what permissions an app will need before you install it. If the permissions seem invasive or confusing, or don’t make sense for what the app is supposed to do, either don’t download the app or delete it if you’ve already done so.\u003C/p>\n\n\u003Ch3>Don’t be fooled by public Wi-Fi\u003C/h3>\n\n\u003Cp>No matter how appealing it is to connect to free Wi-Fi, make sure you’re accessing a network that is secured, verified and doesn’t demand any personal information for you to join. Cyber criminals can create networks that look harmless but are actually malicious. Sometimes they will create a fake network that uses the same name as the one you want to join in order to trick you.\u003C/p>\n\n\u003Cp>When in doubt, ask an employee which network to use so that you can ensure you aren’t putting yourself at risk of network spoofing.\u003Cbr />\nBetter yet, you can use a \u003Ca data-entity-substitution=\"canonical\" data-entity-type=\"node\" data-entity-uuid=\"102099c7-f37d-438d-bd56-48e30ed6ce59\" href=\"/en/secure-your-connections/vpns\">VPN \u003C/a>any time you connect to public a network to ensure your data is secure. (Just know that malware can still get through a VPN.)\u003C/p>\n\n\u003Ch2>Conclusion\u003C/h2>\n\n\u003Cp>Our smartphones are incredibly useful devices that never leave our sides. They’re one of our most dependable sidekicks and have undoubtedly earned their spot as our BFF.  They help keep us connected with the world around us. Unfortunately, this kind of connection leaves our phones at high risk for hackers who see an opportunity in the amount of time we spend with them and the personal information they contain.\u003C/p>\n\n\u003Cp>By staying vigilant and educating yourself about smartphone security risks, you can keep your device safe from cyber attacks.\u003C/p>\n\u003C/div>\n \n \u003C/div>\n\n \u003C/div>\n \n \u003Cdiv class=\"col-sm-12 bs-region bs-region--bottom\">\n \n\u003Cdiv data-block-plugin-id=\"field_block:node:page:comment\" class=\"block block-layout-builder block-field-blocknodepagecomment clearfix\">\n \n \n\n \u003Csection>\u003C/section>\u003C/div>\n\n\u003Cdiv data-block-plugin-id=\"field_block:node:page:field_related_links\" class=\"block block-layout-builder block-field-blocknodepagefield-related-links clearfix\">\n \n \n\n \n \u003Csection class=\"panel panel-success\" style=\"margin-top:10px;\">\u003Cheader class=\"panel-heading\">\u003Ch3 class=\"panel-title\">Related Links\u003C/h3>\n \u003C/header>\u003Cdiv class=\"panel-body\">\n \u003Cdiv class=\"field--items\">\n \u003Cdiv class=\"field--item\">\u003Ca data-rel=\"internal\" href=\"/en/cyber-security-awareness-month\">Cyber Security Awareness Month\u003C/a>\u003C/div>\n \u003Cdiv class=\"field--item\">\u003Ca data-rel=\"internal\" href=\"/en/csam-themes\">CSAM 2020 - Theme page\u003C/a>\u003C/div>\n \u003Cdiv class=\"field--item\">\u003Ca data-rel=\"internal\" href=\"/en/resources/csam-resources\">CSAM Resources \u003C/a>\u003C/div>\n \u003Cdiv class=\"field--item\">\u003Ca data-rel=\"internal\" href=\"/en/resources/cyber-security-awareness-month-week-2-phone-week\">Cyber Security Awareness Month Week 2: Phone Week\u003C/a>\u003C/div>\n \u003Cdiv class=\"field--item\">\u003Ca data-rel=\"internal\" href=\"/en/blogs/how-you-can-stay-cyber-secure-when-downloading-and-using-apps\">How you can stay cyber secure when downloading and using apps\u003C/a>\u003C/div>\n \u003C/div>\n \u003C/div>\n \u003C/section>\u003C/div>\n\n \u003C/div>\n \n\u003C/div>\n\n \u003C/div>\n\n\u003C/article>","uuid":"95fd76d9-cc72-4c7c-b781-9cce1ba3eb7c","content_type":"page","lang":"en","banner":"/sites/default/files/images/card-blog-CSAMwk2-1-1170x347-E.jpg","date_modified":"2021-11-03","date_created":"2020-10-02T13:08:33Z","url":"/en/blogs/phone-cyber-security-introduction","og_img":null,"og_img_alt":null,"twt_img":null,"twt_img_alt":null,"other_language_url":"/fr/blogues/telephones-et-cybersecurite-une-introduction","breadcrumb":[{"title":"Blogs","url":"/en/blogs"}],"topic":[302,306,317],"audience":[332],"category":[335],"isHomepage":false}}},"headers":{"date":["Wed, 18 Dec 2024 08:12:38 GMT"],"content-type":["application/json"],"transfer-encoding":["chunked"],"connection":["keep-alive"],"vary":["Accept-Encoding"],"access-control-allow-origin":["*"],"x-frame-options":["SAMEORIGIN"],"x-content-type-options":["nosniff"],"x-xss-protection":["1; mode=block"],"referrer-policy":["no-referrer-when-downgrade"],"strict-transport-security":["max-age=31536000; includeSubDomains"]},"status":200,"statusText":"OK","url":"https://www.getcybersafe.gc.ca/api/getcybersafe/page/v1/get?lang=en&url=/en/blogs/phone-cyber-security-introduction","responseType":"json"}}</script></body></html>

Pages: 1 2 3 4 5 6 7 8 9 10