Do you use non-regular pattern as PIN keys while pairing the device with Bluetooth technique? 3 points
By using non-regular patterns when pairing devices through Bluetooth, such as PIN keys, security is enhanced, therefore making it more difficult for attacker to predict or guess the PIN.
Do you keep the device in non-discoverable (hidden) mode where the Bluetooth port is open? 2 points
Keeping your device in non-discoverable mode prevents your device from being visible to other nearby Bluetooth devices, thus reducing the chances of potential attackers or unauthorized users detecting and attempting to connect to your device.
Do you delete the pair device history in Bluetooth in your PC/Mobile which contain sensitive information, every month? 2 points
Regularly deleting paired device history in Bluetooth on your PC or mobile device offers significant benefits, including enhanced privacy, reduced risk of unauthorized access, protection against vulnerabilities, secure data handling, controlled access, organized device management, compliance with best practices, and a proactive security approach.
Do you keep usually the Bluetooth of your device with sensitive information in the disable state? 1 point
Lowering the Bluetooth network range of a device to its minimum level enhances security by restricting its signal transmission to a short distance. This reduces the risk of unauthorized access, eavesdropping, and remote attacks, emphasizing physical proximity for connections.
Do you install Link Encryption software for all the Bluetooth connections? 2 points
Enabling screen locks on your Android phone with sensitive information is vital for preventing unauthorized access, safeguarding data, enhancing privacy, and ensuring secure app usage. It mitigates the risk of data breaches, loss, or theft, providing peace of mind and aligning with proactive security measures.
Do you set Bluetooth-Enabled device in the lowest network range to reduce the risk of accessing from the longest distance from un-authorized users? 3 points
Setting your Bluetooth-Enabled devices in the lowest network range limits the distance at which it can be discovered by other devices, therefore preventing unauthorized users from accessing the device or eavesdropping.
Do you enable screen locks for your Android phone which contains sensitive information? 3 points
Enabling screen locks for android phones which contain sensitive information is a crucial layer in preventing risks such as unauthorized access to private and sensitive information such as mobile payment information, photos, emails and text messages and identity theft where malicious actors can impersonate you and/or steal your identity.
Do you have policies that restrict employees to use the Android device as root? 4 points
In a corporate setting, the decision to root devices should be carefully evaluated due to the potential negative impact on security, compliance, stability, and operational efficiency. Allowing any employee to use Android devices as root increases risks such as data breaches, leaked information, unauthorized access, malware threats and more.
Do you train the staff to download applications ONLY from the official Android market? 3 points
Downloading apps from non-secure sources exposes you to various risks, including malware infections, data theft, unauthorized access, phishing scams, ransomware attacks, device instability, compatibility issues, lack of updates and support, loss of personal data, legal consequences, and potential reputation damage. It's crucial to only download apps from trusted and official sources in order to safeguard your device and personal information.
Do you allow users to download Android Package Files? 2 points
Allowing users to download Android Package Files should be carefully considered, since if it is not managed properly, it can pose security risks. If an organization has policies regarding downloading Android Package files, some factors which have to be considered are source of APK, security scanning of APKs for malware and vulnerability, implementation of strong access control and permissions, keeping applications up-to-date, ensure that user data is protected from the apps downloaded by users and training employees on safe app downloading practices.
Do you use free protector Android app like Android Protector where you can assign passwords to text messages, mail accounts etc.? 2 points
Using free protector Android app like Android Protector to assign passwords to text messages, mail accounts and other risks mitigates risks such as unauthorized access to sensitive information. This is a layer of security which ensures that in cases where the device is lost or stolen, malicious attackers will not be able to gain digital access to your information in order to view or manipulate it.
Do you use Find my device tool in your phone? 3 points
The “Find my Device” tool not only helps in locating the phone in case it is lost or stolen, but also remotely locks the phone and eases the device, preventing the permanent loss of the device, as well as preventing others from accessing any information that is in it, decreasing the chances of both data loss and unauthorized access.
Do you disable Java Script and add-ons from web browser when you navigate in iOS? 3 points
Not having Java Script and add-ons disabled when navigating in iOS, increases several risks associated with enhanced vulnerability to certain types of web-based threats, such as malware or phishing attacks. Malicious actors can exploit add-ons or extensions vulnerabilities, or exploit harmful code in JavaScript. By having JavaScript and add-ons disabled these risks are mitigated.
Do you change the default password of root in iOS from “alpine”? 4 points
Changing the default password of root in iOS from “alpine” is crucial in preventing unauthorized access (leaving the default password makes it easier for attackers to gain access through ssh or other means), protecting personal data (as iOS often contain personal and sensitive information), preventing jailbreak exploits and mitigating remote attacks (attackers are able to remotely access the device with the default password if it is connected to the internet).
Do you enable Jailbreak detection and also protect access to iTunes, Apple ID and Google Accounts which are tied to sensitive data? 2 points
Regarding security and privacy concerns, enabling Jailbreak detection and protecting access to iTunes Apple ID and Google Accounts is highly important as Jailbroken devices pose a wide range of security and privacy risks. From increased attack surface (allowing a more system-level access), malware bypass mechanisms (easier for threat actors to install malicious applications), susceptibility to data theft and legal liability (organizations are held legally liable for data breaches is measurements to secure user data are not taken into place).
Do you train your employees about the policy of Bring Your Own Device policies in your organization? 3 points
Training employees about BYOD (Bring Your Own Device) policies is a crucial layer of security in any organization. BYOD policies increase security, data protection and security in network access, as employees have better knowledge on how to handle sensitive data on their personal devices, how to use and maintain secure passwords, report lost or stolen devices efficiently, enable device encryption, how to use secure file-sharing methods and more.
Do you maintain a clear separation between the personal and business data in BYOD devices of your organization? 4 points
Failing to maintain a clear separation between personal and business data in BYOD devices introduces a wide range of risks, from sensitive data and business data mixing, violation of privacy regulations, increased difficulty in enforcing security measurements and increased chances of device compromission.
Do you register BYOD devices with remote locate to allow or block remotely features if they lost or useless? 3 points
Not registering BYOD devices with remote locate to allow or block remotely features if they are lost or useless, several security risks such as not being able to remotely locate, wipe or lock the device are introduced and risks such as unauthorized access, misuse, difficulty in responding to potential security incidents are enhanced, putting your organization at risk of increased attacks.
Do you allow downloading of too many applications in the BYOD devices of your organization? 1 point
Allowing unrestricted downloading on BYOD poses significant security risks, such as increased installation of harmful or malicious software, data leakage, compliance violations, bandwidth congestion and legal concerns such as downloading copyrighted material. In order to mitigate these risks, steps such as content filtering, access controls, staff training regarding BYOD policies should be followed.
Do you allow auto-upload of photos from BYOD devices of your organization toward the personal social networks? 2 points
Allowing auto-upload of photos from BYOD devices to personal social network poses significant privacy and security risks, since when photos are automatically uploaded to personal social media accounts there is potential for accidental sharing of sensitive and private information and/or data.
Do you allow sharing of information within GPS-enabled apps in your company? 1 point
Allowing sharing of information within GPS-enabled apps can be useful for certain business operations, however it does come with certain privacy and security concerns, such as sensitive location is accessed by unauthorized users or is accidentally shared to people who should not have access to that information, leading to data, privacy and security breaches.
Do you use in your mobile phone simultaneously Wi-Fi and Bluetooth? 1 point
Simultaneously using both Wi-Fi and Bluetooth increases the attack surface for potential security threats, as a vulnerability in one of the protocols can be used to gain unauthorized access or intercept data. Using both Wi-Fi and Bluetooth can be safe as long as security measures such as using VPN for public spaces, keeping software up-to-date, secure Wi-Fi networks are used, Bluetooth visibility is set to “Hidden” when other devices are not actively paired and devices are paired securely, as followed.
Do you filter e-mail forwarding barriers in your mobile? 2 points
Through filtering email forwarding barriers, individuals are able to add another layer of security in their mobiles. This layer helps in increasing protection against phishing and spam emails, privacy protection, efficient email management and clutter reduction.
Do you block the SSID broadcast in order to avoid detection of Access Points? 2 points
Blocking the SSID broadcast is a security measure used to prevent the casual detection of wireless network, by acting as a basic deterrent against unauthorized access. It is important to note that this security measure has its limitations and it is best used in conjunction with other security measurements.
Do you use MAC-Filter in Access Points for those users who want to connect with it? 2 points
Using MAC address filtering in access points is a security measure which only allows specific devices, which are identified by their MAC address, to connect to the network. This adds an extra layer of security, as it makes it harder for unknown and/or malicious devices to access the network, as well as increases device control.