النسخة العربية

Oman National CERT Towards a safe cyber environment

Regional Cybersecurity Week 2019

Regional Cybersecurity Week 2019

The 2nd Regional Cybersecurity Week will be held from 27th to 31st October 2019 in Kempinski Hotel, Muscat, Sultanate of Oman...

View
OIC-CERT Drill 2019

OIC-CERT Drill 2019

The OIC-CERT1 Drill is an annual event for the OIC-CERT member teams ...

View
National Cyber Security Drill ( Malware and dark web: The Persistent Threat )

National Cyber Security Drill ( Malware and dark web: The Persistent Threat )

The objective of this Cyber Drill is to enhance communication, teamwork, and participating teams’ incident response capabilities to ensure continued collective efforts against cyber threats through the CIRT of the region.

View
Oman Threat Hunters 2019

Oman Threat Hunters 2019

The ITU- Arab Regional Cybersecurity Centre (ITU-ARCC), hosted by Information Technology Authority and Oman National CERT, and in partnership with Silensec , is organizing “Threat Hunters 2019” , a national cybersecurity competition.Registration is open now through : https://cyberstars.pro/profile/register/

View
ISO/ IEC 27001: 2013 Lead Auditor training course – IRCA Certified

ISO/ IEC 27001: 2013 Lead Auditor training course – IRCA Certified

The ISO/IEC 27001 Lead Auditor training is an intensive five-day course where you’ll discover internationally- recognized best practice auditing techniques so you can confidently lead auditing activities...

View

Share it

Online Incidents Report
Request OCERT Services
Information Security Glossary

Article Details

 

Mobile Data Encryption

Mobile Data Encryption

Category: Mobile Security | Published Date: 25/07/2013 | Author: OCERT | Rating: Mobile Data Encryption(1177 Votes)


Encryption is the process of converting your personal and confidential information into unreadable format using special algorithms to prevent unauthorized people from accessing or using your information.
Data encryption can happen at 3 different levels:

  • File Level

At this level you ensure that certain files are encrypted and cannot be accessed by anyone else.

  • Folder Level

At this level you ensure that the whole folder and its content is not compromised this feature is advisable for work related material, personal photos and banking details.

  • Device Level

This is the ultimate encryption form since it encrypts the whole device from the OS level all the way to the content of the device.
 

Don’t forget to encrypt and password protect your SD card and its content. People usually forget how easy it is to open SD cards.


There are apps that allows you to set password for certain folders and files, but that’s not enough! Passwords can be cracked so you need to encrypt and password protect your files and folders for maximum protection. (This also applies to all of your external storage devices)

Good example of encryption apps include: Sophos Mobile Encryption, Symantec Mobile Encryption.