{"id":7676,"date":"2017-11-19T14:16:35","date_gmt":"2017-11-19T20:16:35","guid":{"rendered":"https:\/\/hml.iticollege.edu\/?p=7676"},"modified":"2017-11-19T14:16:35","modified_gmt":"2017-11-19T20:16:35","slug":"information-security-for-mobile-devices","status":"publish","type":"post","link":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/","title":{"rendered":"Information Security for Mobile Devices"},"content":{"rendered":"<p>An <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/information-security-training\/\">information security degree<\/a> is an incredibly important one to obtain, but when people think of information security their immediate thought is PC security \u2013 but what about mobile devices? Computer &amp; Information security technology training for mobile devices is just as important, especially in a world where so many people are using mobile devices. Phones, tablets, smartwatches, and all manner of other mobile devices are out there right now, and with that being the case, the risk has never been higher. In today\u2019s article, we\u2019re going to discuss the importance of mobile device security and what needs to be done.<\/p>\n<h2>The Risk of Viruses<\/h2>\n<p class=\"alignnone\" title=\"information security training\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright wp-image-1247\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2014\/08\/facility-ss1-1.jpg\" alt=\"ITI Technical College Facility\" width=\"520\" height=\"260\" \/>In <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/prepare-your-career-with-information-security-training\/\">information security training<\/a> you are going to learn all about viruses which are much more than just malicious software designed to ruin your day. Viruses are used by attackers who exploit software vulnerabilities, and they can easily disable the device or steal the data that is stored on it.<\/p>\n<h2>Security Loopholes<\/h2>\n<p>These days many people tend to use their phones as PDAs, meaning they\u2019re going to be more than happy to store all of their personal information on them. The problem is that information stored on your phone could be stored on the provider\u2019s server, for example, in the case of Apple which has a cloud backup option. Some users are aware of this and some are not but in the end, it all comes down to whether or not the cloud server can be trusted to store such critical information. This is where good information technology security comes in \u2013 user data needs to be protected at all costs.<\/p>\n<h2>Privacy Issues<\/h2>\n<p>Mobile devices have brought us to a problem that we never thought we\u2019d be seeing again: physical privacy issues. We\u2019re not talking about someone hacking into your phone, we\u2019re walking about someone looking over a shoulder and seeing what\u2019s on the screen or even overhearing a conversation. It sounds a bit ridiculous but yes, it\u2019s a problem, and it\u2019s turning into a major issue for information security.<\/p>\n<h2>Issues With Bluetooth<\/h2>\n<p>Bluetooth settings on any device need to be properly configured or you\u2019re going to end up with a major security problem. An improper configuration can allow an attacker to retrieve a trove of information from a phone including:<\/p>\n<ul>\n<li>Address Book<\/li>\n<li>Call History<\/li>\n<li>Photos<\/li>\n<li>Documents<\/li>\n<li>And more<\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-120\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2014\/03\/footer-logo-1.png\" alt=\"ITI Technical College Logo\" width=\"144\" height=\"150\" \/>It is strongly recommended that novice users disable the Bluetooth functionality until it is absolutely needed but an IT professional will be able to configure the unit properly so that it cannot be \u2018hacked\u2019 or exploited by a malicious individual. This is a small part of information security but it is becoming more prevalent thanks to the number of devices on the market that make use of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Bluetooth\" target=\"_blank\" rel=\"noopener\">Bluetooth technology<\/a>.<\/p>\n<p>Your information security degree is going to prepare you for a number of different eventualities and scenarios, and ultimately, it will be an outstanding career choice. Now would be a great time for you to start looking into your options and most importantly, give us a call to discuss financial aid. <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/financial-aid\/\">Financial aid<\/a> is available for those who qualify. If you have the drive, then we have the willingness to help you to join the next generation of cybersecurity specialists. As technology changes and new products are released every single year, new minds and new points of view are a necessity. Your future is waiting, and it\u2019s bright!<\/p>\n<p>&nbsp;<\/p>\n<p><strong>For more information about graduation rates, the median debt of students who completed the program, and other important information, please visit our website:\u00a0<\/strong><a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An information security degree is an incredibly important one to obtain, but when people think of information security their immediate [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[21],"tags":[92,93,94,97,99,100],"class_list":["post-7676","post","type-post","status-publish","format-standard","hentry","category-news","tag-computer-information-security-technology-training","tag-define-information-technology-security","tag-information-security-degree","tag-information-technology-homeland-security","tag-information-technology-security-certification","tag-information-technology-security-officer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security for Mobile Devices<\/title>\n<meta name=\"description\" content=\"When you\u2019re obtaining your information security degree you\u2019re going to learn all about the different threats posed to mobile devices. Take a look today\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security for Mobile Devices\" \/>\n<meta property=\"og:description\" content=\"When you\u2019re obtaining your information security degree you\u2019re going to learn all about the different threats posed to mobile devices. Take a look today\" \/>\n<meta property=\"og:url\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"ITI College\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-19T20:16:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2014\/08\/facility-ss1-1.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"headline\":\"Information Security for Mobile Devices\",\"datePublished\":\"2017-11-19T20:16:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/\"},\"wordCount\":606,\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2014\/08\/facility-ss1-1.jpg\",\"keywords\":[\"Computer &amp; Information security Technology Training\",\"define information technology security\",\"information security degree\",\"information technology homeland security\",\"information technology security certification\",\"information technology security officer\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/\",\"name\":\"Information Security for Mobile Devices\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2014\/08\/facility-ss1-1.jpg\",\"datePublished\":\"2017-11-19T20:16:35+00:00\",\"author\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"description\":\"When you\u2019re obtaining your information security degree you\u2019re going to learn all about the different threats posed to mobile devices. Take a look today\",\"breadcrumb\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security for Mobile Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\",\"name\":\"ITI College\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\"],\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security for Mobile Devices","description":"When you\u2019re obtaining your information security degree you\u2019re going to learn all about the different threats posed to mobile devices. Take a look today","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/","og_locale":"en_US","og_type":"article","og_title":"Information Security for Mobile Devices","og_description":"When you\u2019re obtaining your information security degree you\u2019re going to learn all about the different threats posed to mobile devices. Take a look today","og_url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/","og_site_name":"ITI College","article_published_time":"2017-11-19T20:16:35+00:00","og_image":[{"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2014\/08\/facility-ss1-1.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/#article","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/"},"author":{"name":"admin","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"headline":"Information Security for Mobile Devices","datePublished":"2017-11-19T20:16:35+00:00","mainEntityOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/"},"wordCount":606,"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2014\/08\/facility-ss1-1.jpg","keywords":["Computer &amp; Information security Technology Training","define information technology security","information security degree","information technology homeland security","information technology security certification","information technology security officer"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/","name":"Information Security for Mobile Devices","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website"},"primaryImageOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/#primaryimage"},"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2014\/08\/facility-ss1-1.jpg","datePublished":"2017-11-19T20:16:35+00:00","author":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"description":"When you\u2019re obtaining your information security degree you\u2019re going to learn all about the different threats posed to mobile devices. Take a look today","breadcrumb":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-for-mobile-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/impactwindowswholesaler.com\/iticollege\/"},{"@type":"ListItem","position":2,"name":"Information Security for Mobile Devices"}]},{"@type":"WebSite","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/","name":"ITI College","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/impactwindowswholesaler.com\/iticollege"],"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/7676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/comments?post=7676"}],"version-history":[{"count":0,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/7676\/revisions"}],"wp:attachment":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/media?parent=7676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/categories?post=7676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/tags?post=7676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}