{"id":314,"date":"2017-11-14T11:40:19","date_gmt":"2017-11-14T01:40:19","guid":{"rendered":"http:\/\/www.smevidence.com.au\/?p=314"},"modified":"2024-02-26T08:03:10","modified_gmt":"2024-02-25T22:03:10","slug":"30disc-day-1-installing-operating-system-and-application-updates-2-2-2-2-2-2-2-2-2-2-2-2-2-2","status":"publish","type":"post","link":"https:\/\/www.smevidence.com.au\/website\/?p=314","title":{"rendered":"30DISC &#8211; Day 17 &#8211; Smartphone Security II"},"content":{"rendered":"<p>Always with the phone!<\/p>\n<p>Today&#8217;s challenge &#8211; Smartphone Security II &#8211;\u00a0<a href=\"https:\/\/blog.yourultimatesecurity.guide\/2016\/03\/3dsc-day-17-smartphone-security-ii\/\" target=\"_blank\" rel=\"noopener\">Direct Link to Guide Page<\/a><\/p>\n<p>Following on from yesterday&#8217;s Challenge, this time we&#8217;re looking at the software that runs on your smartphone. Whilst &#8220;apps&#8221; have been incredibly convenient solutions to many problems, they can introduce significant vulnerabilities to our devices. This is particularly the case for Android devices, because the apps that are in the Google Play store are not vetted to anywhere near the standard that apples in the Apple Apps Store are. We can get all philosophical about this, the &#8220;walled garden&#8221; vs &#8220;my device my rules&#8221; debate, but let&#8217;s bypass that and just say this: Android apps are by and large less secure than iPhone apps, but that doesn&#8217;t mean you&#8217;re safe on iPhone. So what to do about it?<\/p>\n<p>Today&#8217;s Challenge isn&#8217;t difficult technically, all of our participants completed it themselves without any technical support. No, today&#8217;s Challenge is difficult because it makes you ask yourself some hard questions, and introspection is usually fraught with danger.<\/p>\n<p>One of the key concepts in information security is called &#8220;attack surface&#8221;. It describes how many avenues a would-be hacker has to attack you and your data. The greater your attack surface, the more avenues the hacker has to try to comprise you. Part of a good information security plan is to limit the attack surface as much as possible,\u00a0 which includes only installing software or apps which are necessary for you to function. You can see where this is heading can&#8217;t you.<\/p>\n<p>The biggest part of today&#8217;s Challenge is to uninstall any apps you don&#8217;t need, or disable them if they shipped with your phone and you can&#8217;t uninstall them.<\/p>\n<p>Once you&#8217;ve removed\/disabled the unnecessary apps, you then have to restrict the things that the apps that are left can do on and to your device. You might be surprised\/worried what apps want access to which parts of your phone.<\/p>\n<p>Lastly, we&#8217;re removing any WiFi access points from the phone memory that we no longer need (eg that Starbucks that you visited 3 years ago). The list of WiFi access points you&#8217;ve connected to is like a fingerprint for your device, so whenever you turn on your WiFi (because you have WiFi turned off at all times until you need to use it right!?!?) you&#8217;re broadcasting to anyone that wants to listen everywhere you&#8217;ve been. Which could be awkward&#8230;<\/p>\n<p>Geoffrey: As noted earlier I&#8217;ve only recently upgraded my mobile phone so I haven&#8217;t had time to fill it up with garbage apps that I don&#8217;t need. Nevertheless I had 6 apps on my device which I don&#8217;t really need, the info from which I can get through a web browser on the device which is much more secure. My app permissions were pretty good (although there were a few that needed to be tweaked). I had three WiFi access points that I needed to delete, so all in all, I was quite happy with my outcome.<\/p>\n<p>Juan: There is no way to say this nicely &#8211; Juan is an app whore. He seems to have taken the &#8220;There&#8217;s an app for that&#8221; mantra to the extreme. I&#8217;ve never seen a device which wasn&#8217;t owned by a teenager with as many apps on it. And just like a teenager, taking away of the apps induced pouting, tantrums, cold stares, bargaining and lots of bribing to achieve compliance. It got to the point of me threatening to double my invoice until he finally acquiesced to deleting a game that he had in fact never played. Thankfully the permissions and WiFi bit was much easier. And yes, constant followup will be required.<\/p>\n<p>Diana: I&#8217;m beginning to fall a little bit in love with Diana. She only had 2 non-standard apps installed on her phone, both absolutely essential to her work so that was pretty easy (particularly compared to her husband). App permissions and Wifi were also straightforward.<\/p>\n<p>Priscilla: Landed in the middle here, quite a few unnecessary apps on the device, but many had been installed by her kids so getting rid of them was a relief. App permissions and WiFi were also pretty straightforward.<\/p>\n<p>Previous Days Here:<br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=266\" target=\"_blank\" rel=\"noopener\">Day 0 &#8211; Introduction to the Team<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=269\" target=\"_blank\" rel=\"noopener\">Day 1 &#8211;\u00a0Installing Operating System and Application Updates<br \/>\n<\/a><a href=\"http:\/\/www.smevidence.com.au\/?p=274\" target=\"_blank\" rel=\"noopener\">Day 2 &#8211;\u00a0Set Up A Standard User Account<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=277\" target=\"_blank\" rel=\"noopener\">Day 3 \u2013 Review Privacy Settings<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=281\" target=\"_blank\" rel=\"noopener\">Day 4 &#8211;\u00a0Setup Private &amp; Secure Email<br \/>\n<\/a><a href=\"http:\/\/www.smevidence.com.au\/?p=284\" target=\"_blank\" rel=\"noopener\">Days 5&amp;6 \u2013 Weekend Project #1<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=287\" target=\"_blank\" rel=\"noopener\">Day 7 &#8211; Install a Password Manager<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=291\" target=\"_blank\" rel=\"noopener\">Day 8 &#8211; Change Your Passwords<br \/>\n<\/a><a href=\"http:\/\/www.smevidence.com.au\/?p=293\" target=\"_blank\" rel=\"noopener\">Day 9 &#8211; Browser Security<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=296\" target=\"_blank\" rel=\"noopener\">Day 10 &#8211; Firefox Security Add-ons<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=299\" target=\"_blank\" rel=\"noopener\">Day 11 &#8211; NoScript Security Suite<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=301\" target=\"_blank\" rel=\"noopener\">Days 12&amp;13 &#8211; WiFi Security Checkup<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=303\" target=\"_blank\" rel=\"noopener\">Day 14 &#8211; Virtual Private Network<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=308\" target=\"_blank\" rel=\"noopener\">Day 15 &#8211; Two Factor Authentication<\/a><br \/>\n<a href=\"http:\/\/www.smevidence.com.au\/?p=311\" target=\"_blank\" rel=\"noopener\">Day 16 \u2013 Smartphone Security I<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Always with the phone! Today&#8217;s challenge &#8211; Smartphone Security II &#8211;\u00a0Direct Link to Guide Page Following on from yesterday&#8217;s Challenge, this time we&#8217;re looking at the software that runs on your smartphone. Whilst &#8220;apps&#8221; have been incredibly convenient solutions to many problems, they can introduce significant vulnerabilities to our devices. This is particularly the case [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":267,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"_links":{"self":[{"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/posts\/314"}],"collection":[{"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=314"}],"version-history":[{"count":3,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/posts\/314\/revisions"}],"predecessor-version":[{"id":317,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/posts\/314\/revisions\/317"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=\/wp\/v2\/media\/267"}],"wp:attachment":[{"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.smevidence.com.au\/website\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}