Skip to main content Skip to footer

Mobile technology is now an essential part of modern life, with increasing amounts of data being stored on tablets and smartphones. These mobile devices are as powerful as traditional computers, and because they can be used outside the workplace, require a greater level of protection.

If you use mobile technology devices in your daily practice, you must ensure that any information stored on them is kept secure. An obvious way of doing this is switching on password protection and/or any fingerprint or facial recognition capabilities. The majority of smartphones and tablets also have options for locating or tracking lost or stolen devices and for locking access and remotely erasing data.

As with more traditional IT devices, it is important that mobile devices are kept up to date, with security updates to operating systems installed as soon as the manufacturer releases them. Similarly, all installed apps should be updated (known as patching), as recommended by the app developers. 

You should be wary of public Wi-Fi hotspots, as there is no way to confirm that these are not being used for dishonest purposes. It is more secure to use your mobile network, which will have built-in security, to connect to the internet. 

Ensure that password protection and other security features that the mobile device has, such as fingerprint or facial recognition, are switched on.
•    A suitably complex PIN or password should prevent unauthorised users from accessing the mobile device. 

Ensure that lost or stolen devices can be tracked, locked or wiped.
•    These tools generally have to be ‘switched on’ by the user.
•    Mobile device management software will enable you set up your devices to a standard configuration with a single click.

Keep mobile devices’ operating systems up to date.
•    Enable automatic updates, where possible. 
•    When the device reaches the end of its supported life, consider replacing it with a up to date alternative.

Only install apps from manufacturer-approved stores, such as Google Play or the Apple App Store.
•    Apps from these sources are checked to provide a certain level of protection from malware.

Keep any installed apps up-to-date.
•    Updates will add new features, and patch any security holes that have been discovered.

Do not connect to unknown Wi-Fi Hotspots.
•    Use your mobile network or a wireless 'dongle' provided by your mobile network to securely connect to the internet.

Sources of information

  1. Keeping your smartphones ( and tablets) safe (2017) National Cyber Security Centre
  2. Bring your own device (BYOD) (2021) (reviewed 2022) National Cyber Security Centre