النسخة العربية

Oman National CERT Towards a safe cyber environment

Oman Threat Hunters 2019

Oman Threat Hunters 2019

The ITU- Arab Regional Cybersecurity Centre (ITU-ARCC), hosted by Information Technology Authority and Oman National CERT, and in partnership with Silensec , is organizing “Threat Hunters 2019” , a national cybersecurity competition.Registration is open now through : https://cyberstars.pro/profile/register/

View
ISO/ IEC 27001: 2013 Lead Auditor training course – IRCA Certified

ISO/ IEC 27001: 2013 Lead Auditor training course – IRCA Certified

The ISO/IEC 27001 Lead Auditor training is an intensive five-day course where you’ll discover internationally- recognized best practice auditing techniques so you can confidently lead auditing activities...

View
Safer Internet Day 2019

Safer Internet Day 2019

To mark Safer Internet Day 2019 with the rest of the world, the Information Technology Authority (ITA), represented by Oman National CERT organizes...

View
Network Traffic Analysis workshop

Network Traffic Analysis workshop

A 03 day, practical course designed to give you a thorough understanding of Network Traffic Analysis which is essential in identifying malicious communications and troubleshooting devices and applications.

View
The 7th Regional Cybersecurity Summit

The 7th Regional Cybersecurity Summit

ITU-ARCC is organizing The 7th Regional Cybersecurity Summit which is kindly hosted by CITRA Kuwait on 21- 22 October 2018.

View

Share it

Online Incidents Report
Request OCERT Services
Information Security Glossary

Article Details

 

Mobile Data Encryption

Mobile Data Encryption

Category: Mobile Security | Published Date: 25/07/2013 | Author: OCERT | Rating: Mobile Data Encryption(1177 Votes)


Encryption is the process of converting your personal and confidential information into unreadable format using special algorithms to prevent unauthorized people from accessing or using your information.
Data encryption can happen at 3 different levels:

  • File Level

At this level you ensure that certain files are encrypted and cannot be accessed by anyone else.

  • Folder Level

At this level you ensure that the whole folder and its content is not compromised this feature is advisable for work related material, personal photos and banking details.

  • Device Level

This is the ultimate encryption form since it encrypts the whole device from the OS level all the way to the content of the device.
 

Don’t forget to encrypt and password protect your SD card and its content. People usually forget how easy it is to open SD cards.


There are apps that allows you to set password for certain folders and files, but that’s not enough! Passwords can be cracked so you need to encrypt and password protect your files and folders for maximum protection. (This also applies to all of your external storage devices)

Good example of encryption apps include: Sophos Mobile Encryption, Symantec Mobile Encryption.