2.1.4 Physical Security

The loss, misplacement or theft of electronic devices such as mobile phones, tablets or laptops is increasing exponentially.

Airports, train stations, restaurants, hotels and public areas are risky places where we have to take special precaution. Not only because of the loss of the device itself, but also because of the enormous cost created by thieves or third parties obtaining our professional, financial, personal data or passwords to access Internet services.

Lesson goals and objectives

In this lesson you will learn:

  • Identify the factors that compromise cyber security
  • Understand the legislation that relates to online security and data management
  • Evaluate the most effective ways to plan for and respond to breaches in online security and data management

Given the potential risk of theft or loss, we can take protective measures to protect our equipment or at least minimize damage.

● Save the purchase invoice as proof for a probable claim.
● Write down the device data, for example, serial number or MAC address
● Make a discreet mark on the equipment and keep a photograph of it to unequivocally demonstrate that it is your property. You can also include a sticker with your name and mobile phone. Not all losses of mobile equipment are due to theft and in case of loss they can contact you.
● Do not leave the device in view in public places if it is not being used. These sites are where most cases of loss and theft occur.
● Make backup copies of the data in case of travel or if you are a mobile business user.
● Keep your most valuable files in encrypted folders
● Activate the integrated security systems of your device, such as the unlock password, the fingerprint reader or the biometric authentication systems that include the equipment.

And how do I know if they are spying on me on my smartphone? The following signs can give us a clue:

● Does your mobile download very fast even if you don’t have any active applications?
● Are you spending more data than usual?

We propose the following activity:

Charge the mobile to 100% before going to sleep and deactivate all the applications that are running. If the next morning the battery level has dropped more than usual and there has been significant data consumption, they may be spying on you.

To clear up any doubts you can do the following:

1. In the Settings option and within it in the battery section you can see the percentage of the remaining battery and a list of all the applications that consume the most battery. If there is one that is running all the time to spy on you, it should be here even if it does not appear in the list of applications.

You can also check the consumption or use of data from the applications. If you find a stranger among them, you can be suspicious.

It is also important to pay attention to the sound quality of phone calls. If there is an application that records them, it could also affect it and cause some strange noise to be heard.