Skip to content
Technology

Why You Should Be Cautious When Browsing With a Mobile Phone

BY Soko Directory Team · December 29, 2021 09:12 am

KEY POINTS

Any device within the network can serve as an illicit entry point of the entire network if not protected. Users should secure their network by using anti-spyware software as well as firewalls.

When browsing the internet using your phone, you should always ensure that you maintain the utmost security with the websites that gain access to your sensitive data. According to the Communications Authority of Kenya, there are various risks related to wireless networks.

Bluetooth

Bluetooth devices communicate through short-range wireless signals and operate on frequency within 2.4 GHz to 2.4835 GHz, achieving a speed of 1Mbps. It can be used to link mobile phones to headsets or to a computer.

Bluetooth technology has some security and privacy threats to users, these include,

  • Blue snarfing, which is the unauthorized access to personal data such as contact lists, text messages, and emails.
  • Blue bugging, allows an unauthorized person to listen to your conversations.
  • Blue jacking, involves sending of unsolicited messages via Bluetooth technology to other enabled devices.

To avoid such risks the communication authority of Kenya urges all Bluetooth users to make sure devices are turned off when not in use.

Data storage on mobile phones

 A lot of people use mobile phones to store a wide range of data, either on the phone’s memory or external memory. And so is the SIM card which is designed to store contacts and messages only. It is crucial to be able to master how to secure data on a mobile phone.

ALSO READ: Telkom’s Response To The CA Review Of Interconnection Rates

SIM lock and phone lock are essential so that whenever your device goes off you can always enter a password to access your personal information. This also means that when the phone is lost or stolen the data cannot be accessed.

Wireless Fidelity (WI-FI)

Wi-Fi areas are also known as hotspots and are deployed in public areas such as airports, universities, hotels, and even café’s.

Any device within the network can serve as an illicit entry point of the entire network if not protected. Users should secure their network by using anti-spyware software as well as firewalls.

Change the router pre-set password and only allow specific computers to access the network.

Another way to secure your mobile privacy is being aware of the IMEA (International Mobile Equipment Identity) number; the unique code can be used by server providers or the police to block the phone against future use in case of theft.

If the phone is recovered the network provider can also unblock to restore the phone to normal use. to access the number key in *#06# and note down the 15-digit number that appears on the screen.

Soko Directory is a Financial and Markets digital portal that tracks brands, listed firms on the NSE, SMEs and trend setters in the markets eco-system.Find us on Facebook: facebook.com/SokoDirectory and on Twitter: twitter.com/SokoDirectory

Trending Stories
Related Articles
Explore Soko Directory
Soko Directory Archives