<
 
 
 
 
×
>
You are viewing an archived web page, collected at the request of United Nations Educational, Scientific and Cultural Organization (UNESCO) using Archive-It. This page was captured on 07:47:11 Apr 01, 2022, and is part of the UNESCO collection. The information on this web page may be out of date. See All versions of this archived page.
Loading media information hide

Mobile devices, phones and tablets, are more than communication tools...

They are used for online shopping, banking, learning, games, remote controlling home appliances/cars .... also, for work.

Some default settings leave the devices vulnerable to attacks. Therefore we need to pay attention on how to reduce such vulnerabilities and here are few steps to do so :

For all devices in general

  • Disable wireless if not needed.
  • Disable the Bluetooth if not needed.
  • Only use known Wi-Fi connections, beware of free public Wi-Fi.
  • When plugging in USB, do not "Trust this PC" when prompted, unless it is your personal or UNESCO system.
  • Don't leave your device unattended, treat it like your wallet.
  • Uninstall unused apps.
  • Factory reset phones before returning the phone.

Verify why you should grant or deny app access to the following sensitive objects:

  • Body sensors
  • Calendar
  • Call logs
  • Camera
  • Contacts
  • Location
  • Microphone
  • Phone (to make a call)
  • Health monitor
  • SMS
  • Bluetooth
  • Storage (folders, Photos, Videos)

Contact us if you need further information.