النسخة العربية

Oman National CERT Towards a safe cyber environment

The 7th Regional Cybersecurity Summit

The 7th Regional Cybersecurity Summit

ITU-ARCC is organizing The 7th Regional Cybersecurity Summit which is kindly hosted by CITRA Kuwait on 21- 22 October 2018.

View
The 6th Arab Regional Cyber Drill

The 6th Arab Regional Cyber Drill

ITU-ARCC is organizing the 6th Arab Regional Cyber Drill (ALERT) for the Arab Region ,Kuwait (CITRA) from 23-25 October 2018.

View
Oman Threat Hunter 2018

Oman Threat Hunter 2018

“THREAT HUNTER” a national competition that is organized by ITU-Arab Regional Cybersecurity Center (ITU-ARCC) in a partnership with Silensec ...

View
Guide Manual for Reporting Abuse Through Social Media

Guide Manual for Reporting Abuse Through Social Media

This guidance booklet is written to facilitate reporting abuse process through Social Media and afford easy, smooth, and clear way of guidance to report over social media correctly.

View
Cybersecurity Specialized Training Courses

Cybersecurity Specialized Training Courses

Oman National CERT in cooperation with the Arab Regional Cybersecurity Center (ARCC) is conducting a series of specialized training in cybersecurity hosted in Oman.

View

Share it

Online Incidents Report
Request OCERT Services
Information Security Glossary

Article Details

 

Mobile Data Encryption

Mobile Data Encryption

Category: Mobile Security | Published Date: 25/07/2013 | Author: OCERT | Rating: Mobile Data Encryption(1177 Votes)


Encryption is the process of converting your personal and confidential information into unreadable format using special algorithms to prevent unauthorized people from accessing or using your information.
Data encryption can happen at 3 different levels:

  • File Level

At this level you ensure that certain files are encrypted and cannot be accessed by anyone else.

  • Folder Level

At this level you ensure that the whole folder and its content is not compromised this feature is advisable for work related material, personal photos and banking details.

  • Device Level

This is the ultimate encryption form since it encrypts the whole device from the OS level all the way to the content of the device.
 

Don’t forget to encrypt and password protect your SD card and its content. People usually forget how easy it is to open SD cards.


There are apps that allows you to set password for certain folders and files, but that’s not enough! Passwords can be cracked so you need to encrypt and password protect your files and folders for maximum protection. (This also applies to all of your external storage devices)

Good example of encryption apps include: Sophos Mobile Encryption, Symantec Mobile Encryption.