Norton UK Blog
Got a new PC or mobile device? Here’s how to use it safely online
When you invest in a new PC, mobile or tablet it can be a pretty exciting time. From engaging in online experiences to getting lost in toying with its advanced technical capabilities, a new device opens up a world of possibilities to be ever more connected online. But, with these new experiences, come new challenges to protect your identity and personal data. We’ve put together a handy guide to new device safety to help you get the most from your new tech.
How many Apps does the average app user have installed on theirsmartphone? - 36*
*GSMA Intelligence, Google/Ipsos Survey, Symantec Internet Security Threat Report
Believe it or not the average smartphone user has 36 apps installed on their smartphones. That’s a lot of open doors to your privacy which many of us are not protecting and this gives cybercriminals cause to celebrate. They choose easy targets to gather information such as passwords, bank account numbers or other personally identifying information with which to use or sell.
Imagine getting a call from the bank to inform you your credit card details had been stolen. The stress and inconvenience of dealing with such an occurrence is something that none of us want to think of, so why not be proactive and take steps to ensure all of your personal information stays yours?
Did you know that your credit card details are worth as much as £13 on the black market?*
Internet Security Threat Report, Volume 20,” Symantec (April 2015).
The threats we face every day from online sources has grown over time. There’s apps, social networks, Wi-Fi, email, SMS messaging – the points at which crafty criminals can access your data gets bigger as time goes by but rather than wait for the moment you learn of a data breach in your mobile world, isn’t now the time to be proactive and secure that new technology investment.
Despite our love affair with and reliance on our tablets and smartphones, we are reckless when it comes to protecting them. According to the 2014 Symantec ISTR, 52 per cent of us store sensitive information online, yet only half of us take basic precautions like using passwords, installing security software or backing up our mobile devices.
Have you ever heard about Smishing?
SmiShing is a variation on an old favorite - email phishing. It uses text messaging (SMS) and other mobile messaging technologies to deliver all kinds of scam campaigns. Smishing is particularly scary because you’re more inclined to trust a text message than an email. Most people are aware of the security risks involved with clicking on links in emails. This is less true when it comes to text messages.
Mobiles are central to your ever-connected lives on the go, so it’s important to recognize security risks and take action to prevent them. Threats to mobile users will only increase as we put more and more data on our devices that cybercriminals aim to exploit. Rather than being blasé about keeping our new phones and tablets safe, blend work and play mobile activity, and get click-happy on email and social media, you can make it harder for them by taking some simple and easy steps.
* Dark Web Monitoring defaults to monitoring your email address and begins immediately. Please sign in to your account to enter additional information for monitoring purposes.
** Does not include monitoring of chats or direct messages. May not identify cyberbullying, explicit or illigal content or hate speech. Social Media Monitoring only available on Facebook, Instagram, LinkedIn, Twitter and YouTube. On Facebook, Instagram and LinkedIn only account takeover feature is available.
No one can prevent all cybercrime or identity theft.
The Norton brand is part of NortonLifeLock Inc.
Copyright © 2022 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.