{"id":311,"date":"2017-11-13T09:55:07","date_gmt":"2017-11-12T23:55:07","guid":{"rendered":"http:\/\/www.smevidence.com.au\/?p=311"},"modified":"2023-11-27T00:04:22","modified_gmt":"2023-11-26T14:04:22","slug":"30disc-day-1-installing-operating-system-and-application-updates-2-2-2-2-2-2-2-2-2-2-2-2-2","status":"publish","type":"post","link":"https:\/\/www.smevidence.com.au\/website\/?p=311","title":{"rendered":"30DISC &#8211; Day 16 &#8211; Smartphone Security I"},"content":{"rendered":"<p>Time to get moving!<\/p>\n<p>Today&#8217;s challenge &#8211; Smartphone Security I &#8211;\u00a0<a href=\"https:\/\/blog.yourultimatesecurity.guide\/2016\/03\/3dsc-day-16-smartphone-security-i\/\" target=\"_blank\" rel=\"noopener\">Direct Link to Guide Page<\/a><\/p>\n<p>For once it&#8217;s really nice to see technology actually solving problems instead of creating them. When the original 30-Day Information Security Challenge was created way back in the mists of time (March 2016), most smartphones did not ship with encrypted storage. That meant that someone like me whose job it is to extract data from mobile phones had a pretty easy time of it, even if I didn&#8217;t know your PIN for the device. Since &#8220;The Fappening&#8221; (don&#8217;t Google it, NSFW), Apple started to take their users privacy seriously (to a degree that doesn&#8217;t impinge on their revenue). Samsung followed suite and Google eventually caught up (to a point). What this means is that the second half of today&#8217;s challenge is redundant for you, if you have a reasonably new Apple iPhone, specifically one running Apple iOS8.<\/p>\n<p>For Android users, things are slightly more complex (isn&#8217;t it always). If your phone is on Android 6 (Marshmallow) or above, your internal storage is encrypted by default, but if you&#8217;ve inserted a memory card (microSD card) into the device, you&#8217;ll need to encrypt that one manually.<\/p>\n<p>The first part of the Challenge is relevant for everyone: change your access PIN and make it longer. Who&#8217;d have thought that was coming. At least 6-digits in your PIN, but preferably a alphanumeric passcode instead of just a PIN. Also, make sure you have the phone set to automatically wipe if a certain number of false entries have been input. You&#8217;ll need to check the instructions for how to do this for your phone, given the variety of operating systems and versions out there.<\/p>\n<p>If you want to be really secure, you should also turn off TouchID \/Fingerprint sensors. Whilst this is very inconvenient, you need to be aware that a usable fingerprint for TouchID to work is likely sitting just above the button on the screen. I haven&#8217;t done this myself, but I know of people who have successfully compromised a phone using a fingerprint lifted off the screen. Caveat emptor!<\/p>\n<p>Geoffrey: I&#8217;ve only recently purchased a new phone running Android 7 (Nougat) so internal storage is encrypted out of the box. The microSD card was a different story so I had to manually encrypt that. I had to come up with a new alphanumeric passcode for the phone, and I&#8217;ve made the decision to keep the fingerprint access on, but making sure to clean my screen more frequently.<\/p>\n<p>Juan &amp; Priscilla: Both have 3-month-old company-issued Android devices with no expandable storage so again this was pretty straightforward. Juan had only set a four digit PIN so we strengthened that, Priscilla had an eight digital PIN so we changed that and all set to go. Remote wiping of the device is controlled by the company IT people in a situation where the phone is stolen or lost.<\/p>\n<p>Diana: As part of her gear-up for this Challenge Diana got herself a new iPhone so again, not much to do here. What was interesting though was the look on her face when I told her that someone could break into her phone by taking a fingerprint off the screen. She really wrestled with whether to leave TouchID on, but the convenience won out (at least for the moment).<\/p>\n<p>Previous Days Here:<br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=266\" target=\"_blank\" rel=\"noopener\">Day 0 &#8211; Introduction to the Team<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=269\" target=\"_blank\" rel=\"noopener\">Day 1 &#8211;\u00a0Installing Operating System and Application Updates<br \/>\n<\/a><a href=\"http:\/\/www.smevidence.com.au\/?p=274\" target=\"_blank\" rel=\"noopener\">Day 2 &#8211;\u00a0Set Up A Standard User Account<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=277\" target=\"_blank\" rel=\"noopener\">Day 3 \u2013 Review Privacy Settings<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=281\" target=\"_blank\" rel=\"noopener\">Day 4 &#8211;\u00a0Setup Private &amp; Secure Email<br \/>\n<\/a><a href=\"http:\/\/www.smevidence.com.au\/?p=284\" target=\"_blank\" rel=\"noopener\">Days 5&amp;6 \u2013 Weekend Project #1<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=287\" target=\"_blank\" rel=\"noopener\">Day 7 &#8211; Install a Password Manager<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=291\" target=\"_blank\" rel=\"noopener\">Day 8 &#8211; Change Your Passwords<br \/>\n<\/a><a href=\"http:\/\/www.smevidence.com.au\/?p=293\" target=\"_blank\" rel=\"noopener\">Day 9 &#8211; Browser Security<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=296\" target=\"_blank\" rel=\"noopener\">Day 10 &#8211; Firefox Security Add-ons<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=299\" target=\"_blank\" rel=\"noopener\">Day 11 &#8211; NoScript Security Suite<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=301\" target=\"_blank\" rel=\"noopener\">Days 12&amp;13 &#8211; WiFi Security Checkup<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=303\" target=\"_blank\" rel=\"noopener\">Day 14 &#8211; Virtual Private Network<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=308\" target=\"_blank\" rel=\"noopener\">Day 15 &#8211; Two Factor Authentication<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Time to get moving! Today&#8217;s challenge &#8211; Smartphone Security I &#8211;\u00a0Direct Link to Guide Page For once it&#8217;s really nice to see technology actually solving problems instead of creating them. When the original 30-Day Information Security Challenge was created way back in the mists of time (March 2016), most smartphones did not ship with encrypted [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":267,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"_links":{"self":[{"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/posts\/311"}],"collection":[{"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=311"}],"version-history":[{"count":1,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/posts\/311\/revisions"}],"predecessor-version":[{"id":312,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/posts\/311\/revisions\/312"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/media\/267"}],"wp:attachment":[{"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}