ACSC provides topical, relevant and timely information on how home internet users and small businesses can protect themselves from, and reduce the risk of, cyber security threats such as software vulnerabilities, online scams, malicious activities and risky online behaviours. It’s the hub for private and public sector collaboration and information sharing to combat cyber security threats. The Australian Cyber Security Centre (ACSC) brings cyber security capabilities from across the Australian Government together in a single location.
If you’re concerned your identity may be at risk, check out How to keep your identity safe online for advice on where to go for help.Īustralian Government | Australian Cyber Security Centre (ACSC) They will be able to block your service using your IMEI, or bar the service from using their network and then advise you of next steps.
This refers to an iOS/Android device which has bypassed the security settings in order to remove software restrictions (usually in order to install software not approved by the App Store or Google Play).
Only download apps from trusted online stores such as Google Play or the iTunes Store.Log out of websites, such as your online banking account, when you’ve finished using them.Get into the habit of the following behaviours to keep your mobile device secure: If your device is lost or stolen, you can report the IMEI number to your billing provider and they can block your device remotely. Ask your product retailer where to find this number. If you don’t have these options, record the International Mobile Equipment Identifier (IMEI) of your handset. Provided that you regularly backup your data, if you lose your mobile device or it has been stolen, you can lock it remotely, or choose to completely wipe the data.
Lock out dishonest users remotelyĬheck if your mobile device supports remote locking or wiping functions. Get into the habit of regularly deleting your internet browsing history on your mobile device and closing multiple browsing tabs. Ignore offers of free (usually unsecured) public Wi-Fi access and ensure your mobile device is set up to only connect to secure networks you have approved. When you’re not using Bluetooth, turn it off. So if your mobile device is no longer in your possession, you can still access your data via the internet. ‘Cloud’ storage means you can get access to your information at any time through the internet. Always backup irreplaceable data such as photos or emails through reputable and secure Cloud storage solutions. Install virus protection software to protect you from malware. Set up automatic updates for applications and operating systems, so that your device is always up to date with the latest security features. Check your device’s security settings and select automatic locking to make sure your phone locks itself after a defined period of time. You’ll need to set up a PIN to unlock your SIM card too as it is removable and its use is what your internet provider will bill you for, so you need to protect it. Set up a password, PIN, passcode or fingerprint pattern to unlock your mobile device. Set up your mobile device, your social media and other applications (or apps) so that it is tough for even the most trusted person in your life to access it.