Encryption Helps Keep your Smartphone Secure

Encryption Helps Keep your Smartphone Secure

These days everyone has a smartphone; and, they can do some pretty incredible things. One place that the average smartphone may seem to be a little loose is in the arena of data security. Today’s smartphones do, in fact, come with encryption by default, so there is some semblance of device security on every device. What does this mean? We’ll break it down.

“Smartphone encryption” describes the state in which the data on the device is scrambled so that people that don’t have the proper security clearance, won’t be able to see the device’s contents. While this is extraordinarily helpful for device security and personal privacy, it has nothing to do with protecting actual data transmission.

Without entering the credentials or biometric data that allows for a device to open, many of the features a device has are not able to be accessed. In fact, most modern smartphones won’t actually connect to a Wi-Fi network without the proper credentials. This is handled differently on the different mobile platforms.

The iPhone ships with 256 AES encryption. It is not stored on the phone (which could result in more successful hacks), a correct passcode combines with data stored on the Secure Enclave chip to generate a key that unlocks the device. This chip also holds biometric data (fingerprint and facial recognition) that can be used to open the device or use Apple Pay. Any Apple product that is repeatedly unsuccessfully opened will lock, stopping unwanted parties from getting into your iPhone.

Since so many more people use the Android mobile OS, Google did not make device encryption standard until devices that run their Android 6.0 Marshmallow mobile OS. If your new Android device runs 6.0 Marshmallow or better, it now ships with encryption enabled. Since Google’s implementation of encryption depends on the manufacturer, some phones will use a key generation system similar to the iPhone’s, while others will use a more complex system called file-based encryption. File-based encryption allows for varying levels of decryption and provides unauthorized users access to a limited number of the features on the device.

In the News
Over time, there has been a push for mobile OS developers to build in “backdoors” to ensure that law enforcement can get into a device if/when they need to. Companies like Apple, Microsoft, and Google have had to field their fare share of criticism, but strongly defend their position. Apple CEO Tim Cook states the following, “In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks - from restaurants and banks to store and homes. No reasonable person would find that acceptable.”

Encryption is for your benefit. If you would like more information about modern digital cryptography or any other mobile security, visit our blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 21 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Privacy Best Practices Technology Cloud Software Business computing Google Network Security Microsoft Hackers Windows 10 Backup Malware Android Smartphones Business Browser Hardware Managed IT Services Alert Internet Small Business Business Continuity Innovation Email Computers Disaster Recovery Smartphone Ransomware Data Office Hosted Solutions Productivity Computer Cloud Computing VoIP Efficiency Outsourced IT Business Management User Tips Cybersecurity Cybercrime Virtualization Data Backup Productivity Telephone Systems How To Law Enforcement Chrome Mobile Devices Collaboration Social Engineering Communications Windows Work/Life Balance Miscellaneous Managed IT Services App IT Services Health Passwords Password Social Media Quick Tips Money Network Apps Data Recovery Office Tips Data Security Communication Router Upgrade Data Protection Bring Your Own Device Windows 10 Office 365 Private Cloud Phishing Google Drive HaaS Data Breach Artificial Intelligence IT Support Tech Term Vulnerability Spam Hacking Holiday Wi-Fi Two-factor Authentication Facebook Mobile Device Management Redundancy Avoiding Downtime Data Management Worker Workplace Tips Automation Big Data Saving Money End of Support Battery Remote Monitoring Comparison Electronic Medical Records Server Microsoft Office Update Data Storage Business Intelligence Legal Government Charger OneNote Keyboard Patch Management Employer-Employee Relationship Gadgets IT Management Spam Blocking Public Cloud Cleaning Scam Marketing VPN IT Plan Operating System Mobile Device Word Internet of Things Computer Care Unsupported Software History CES Flexibility Samsung Remote Computing PDF BYOD Mobility Value Managed Service Provider Automobile Identity Theft Infrastructure Audit Loyalty Information Technology HIPAA Multi-Factor Security Current Events Two Factor Authentication IT solutions Inventory Physical Security Credit Cards Humor Sync Password Manager Computer Fan Risk Management SaaS Internet Exlporer Human Resources Data loss Trending Knowledge IT Support Data storage Access Control Fraud Business Mangement Rootkit The Internet of Things Politics Instant Messaging Staff Screen Mirroring Books Network Congestion Authentication HBO Amazon Telephony Gmail Training FENG Assessment Internet exploMicrosoft Education Recovery Cast Specifications IT Consultant Outlook Amazon Web Services Save Money Settings Skype Recycling Vendor Management Television Advertising Emergency Leadership Wireless Computing Infrastructure Digital Signature Frequently Asked Questions Online Shopping Save Time Start Menu eWaste Public Computer Applications Encryption Millennials Excel Evernote Techology Best Practice Tools Criminal Experience Users Workforce Tip of the week Wireless Charging Hiring/Firing Content Files Hybrid Cloud Search Downtime Google Docs Music Transportation webinar Virtual Reality Accountants BDR Windows Server 2008 Cortana Employer Employee Relationship Windows 10s Audiobook Video Games How to Apple Managed IT Root Cause Analysis Website Wearable Technology Safety Benefits Conferencing Worker Commute Software Tips Telecommuting Windows 7 Google Apps Computer Accessories Entertainment Black Market iPhone Botnet Content Management Voice over Internet Protocol USB Bandwidth Firewall Emails Practices Remote Work Relocation Flash Workers Bluetooth Solid State Drive User Error Scalability Travel Blockchain Meetings Troubleshooting Networking Smart Technology Monitor Hosted Computing Thank You Nanotechnology Congratulations CrashOverride WiFi Webinar

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Digital Hold The Case for Hosting Your Phone Solution In-House
24 February 2018
Informative Blog. Thanks a lot for the useful info.
Maria Albert Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
26 September 2017
Occasionally I strive to not concentrate such these kinds of articles and neglect reading like these...
nathan dwyer Your Guide To Mobile Device Management as an SMB
07 September 2017
I come here after quite a while since 2016 and entire this term i have miss the chance to get inform...