In today’s world, our mobile devices are almost extensions of ourselves. We use them for everything from banking and investing to staying connected with loved ones. But with mobile devices becoming ever more central to our lives, they are also becoming increasingly attractive targets for criminals.

This page provides information on how to protect your mobile devices from hacks, scams, and abuse. By following these guidelines, you can help keep your personal information safe and secure.

Common mobile device threats

Mobile devices are vulnerable to a wide range of threats, including:

  • Malware: Malicious software that can be installed on your device without your knowledge. It can steal your data, damage your device, or even take control of it.
  • Phishing: Attempts to trick you into revealing personal information such as passwords or card details, often through fake emails or messages.
  • Smishing: Similar to phishing, but carried out through SMS messages that try to pressure you into taking immediate action.
  • Social engineering: Tactics used by scammers to manipulate you into giving them access to your device or information.
  • App vulnerabilities: Security flaws in apps that can be exploited by hackers to steal data or take control of a device.
  • Network spoofing: Fake Wi-Fi networks that look legitimate but are designed to intercept your data.
  • Ransomware: Malware that can lock you out of your device or data and demand a ransom to restore access.
  • Unsecured Wi-Fi: Public Wi-Fi networks may make it easier for hackers to intercept your activity or data.
  • Outdated software: Older operating systems and apps can contain known vulnerabilities that attackers exploit.
  • Lost or stolen devices: If your device is not properly protected, someone may be able to access your personal information.
  • Data leakage: Some apps may collect and transmit your personal data without you realising it.
  • Bluetooth hacks: Leaving Bluetooth on unnecessarily may increase the risk of unauthorised access or data theft.
Protecting your device from loss or theft

Losing your mobile device can be a major inconvenience, but it can also be a security risk. Here are some steps you can take:

  • Use a strong screen lock: Set a PIN, password, or biometric lock to help prevent unauthorised access.
  • Enable “Find My Device”: Turn on device-tracking tools so you can locate, lock, or wipe your device if needed.
  • Back up your data: Regular backups can help you recover important information if a device is lost, stolen, or damaged.
  • Be mindful of your surroundings: Stay aware when using your device in public places.
  • Keep your device out of sight: Store it securely when not in use.
  • Don’t leave your device unattended: Never leave it on a table, in a café, or in another public space.
  • Use a tracking app: Consider a trusted tracking solution for extra protection.
  • Consider insurance: Device insurance may help reduce the financial impact of theft or loss.
  • Display alternative contact information: Adding a secondary contact method to your lock screen may increase the chances of your phone being returned.
Best practiceDescription
Use strong passwordsCreate strong, unique passwords for each of your accounts. A strong password is at least 12 characters long and includes a mix of uppercase and lowercase letters, numbers, and symbols. Avoid using personal information or common words in your passwords. Reusing passwords for important accounts is risky, as a compromised password for one account could give hackers access to others.
Enable two-factor authentication (2FA)2FA adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone or email, in addition to your password.
Keep software up to dateRegularly update your device’s operating system and apps to the latest versions. These updates often include security patches that fix known vulnerabilities.
Enable “remote wipe”Enable the “remote wipe” feature, which allows you to erase data from your device if it’s lost or stolen after a certain number of incorrect password attempts.
Be cautious when downloading appsOnly download apps from official app stores, such as Google Play™ or Apple’s® App Store. Read reviews and check the app’s permissions before installing it.
Be aware of app permissionsPay attention to the permissions that apps request. Only grant permissions that are necessary for the app to function.
Use a VPNA VPN encrypts your Internet connection, making it more difficult for hackers to intercept your data. This is especially important when using public Wi-Fi and for remote work, as it creates a secure connection and protects sensitive company information.
Avoid public Wi-FiAvoid using public Wi-Fi networks whenever possible. If you must use public Wi-Fi, use a VPN to encrypt your connection.
Disable unnecessary featuresTurn off Bluetooth® and Wi-Fi when not in use to reduce the risk of unauthorised access.
Encrypt your deviceEnable device encryption to protect your data if your device is lost or stolen.
Limit location servicesOnly allow apps that need it to access your location.
Install antivirus softwareConsider installing antivirus software on your device for an extra layer of protection against malware.
Close apps when not in useClosing apps can help to prevent unauthorised access and data leakage.
Power off and on weeklyPowering your device off and on weekly can help to clear temporary files and improve performance, potentially mitigating some security risks.
Recognising and avoiding scams

Scammers use a variety of tactics to try to trick you into giving them your personal information or money. Common examples include:

  • Phishing: Fake emails or messages asking for passwords or payment information.
  • Smishing: SMS-based scams that often contain suspicious links or urgent warnings.
  • One-ring scams: Calls that disconnect quickly to encourage you to call back premium-rate numbers.
  • Ransomware scams: Attempts to lock your device or files until you pay.
  • Tech support scams: Fraudsters posing as support staff who claim your device is infected.
  • Social media scams: Fake offers, quizzes, giveaways, or messages designed to collect your information.
  • Fake apps: Malicious apps that imitate legitimate tools or services.

Tips to help you avoid scams:

  • Be sceptical of messages or offers that seem too good to be true.
  • Verify the source through an official channel before taking action.
  • Never share passwords, card details, or security codes by phone, email, or text.
  • Watch for spelling mistakes, poor grammar, or unusual links.
  • Be cautious when a message creates urgency or fear.
  • Be aware of emotional manipulation, including fear and greed.
  • Report suspected scams to the appropriate authorities or support teams.
Physical security

Protecting your mobile device also involves physical security measures. Here are some ways to reduce physical risk:

  • Don’t leave your smartphone unattended: Especially in cafés, public transport, and crowded areas.
  • Use a holster clip or secure pocket: Keep your device securely on you and less visible.
  • Consider a phone strap or tether: This can help discourage snatching and reduce the risk of accidental loss.
Remote tracking and wiping

If your device is lost or stolen, remote tracking and wiping features can help protect your data. These features may allow you to:

  • Locate your device on a map
  • Remotely lock your device
  • Erase all data from your device

To use these features, they need to be enabled before the device is lost or stolen, and you will generally need an account with the relevant service provider, such as Google or Apple.


In summary: staying safe

Protecting your mobile device is crucial in today’s digital age. Mobile devices store a wealth of personal information, making them prime targets for criminals. By following the security measures outlined above, you can create a strong defense against common threats.

Remember to use strong passwords, enable two-factor authentication (2FA), keep your software updated, and be cautious when downloading apps. Avoid public Wi-Fi whenever possible, and if you must use it, use a VPN to encrypt your connection. Be aware of common scams and phishing attempts, and never give out your personal information to unknown sources.

In addition to digital security, remember the importance of physical security. Keep your device out of sight and never leave it unattended in public places. If your device is lost or stolen, use remote tracking and wiping features to protect your data. By taking these precautions and staying informed about the latest security threats, you can help to ensure that your mobile devices and personal information remain safe and secure.