r Configure your device to require a passcode to gain access if this feature is supported in your device.
r Treat your mobile device with the same level of care as you would a credit card. If it is lost or stolen and you have not protected it adequately, you may be at risk.
r Store your mobile device in a safe place.
r Do not send confidential information in email or text messages (e.g., account numbers). It is important to understand that text messages are not encrypted the same way your mobile device information is. If someone gains access to your phone, they will be able to view any text messages sent or received that have not yet been deleted.
r Avoid storing sensitive information. Mobile devices have a high likelihood of being lost or stolen so you should avoid using them to store sensitive information (e.g. passwords, bank account numbers, etc.). If sensitive data is stored then encryption should be used to secure it.
r Delete messages that contain account information, including account balances, and any alerts you receive on a regular basis.
r Only download information (photos, ring tones, video clips, etc.) from trusted sources.
r Follow the same rules you use on your computer with respect to opening email and attachments. Similar to phishing attacks on your computer, SMiShing attacks involve fraudsters using text messages with links in them on your mobile device. The fraudsters will use these text messages in an attempt to:
r Keep your mobile device's software up-to-date. These devices are small computers running software that needs to be updated just as you would update your PC. Use the automatic update option if one is available.
r Install antivirus software on your mobile device. Contact your carrier for specific information on available antivirus software for your device.
r If you are concerned about the sites you are accessing from your mobile device, turn on the "show URL" or "show address bar" option so that you can see the actual site addresses to ensure they start with "https." Check the information that came with your device for specific instructions.
r Disable features not actively in use such as Bluetooth, Wi-Fi, and infrared. Set Bluetooth-enabled devices to non-discoverable when Bluetooth is enabled.
r Delete all information stored on a device before the device changes ownership. Use a "hard factory reset" to permanently erase all content and settings stored on the device.
r "Sign out" or "Log off" when finished with an app rather than just closing it.