Encryption Helps Keep your Smartphone Secure

Encryption Helps Keep your Smartphone Secure

These days everyone has a smartphone; and, they can do some pretty incredible things. One place that the average smartphone may seem to be a little loose is in the arena of data security. Today’s smartphones do, in fact, come with encryption by default, so there is some semblance of device security on every device. What does this mean? We’ll break it down.

“Smartphone encryption” describes the state in which the data on the device is scrambled so that people that don’t have the proper security clearance, won’t be able to see the device’s contents. While this is extraordinarily helpful for device security and personal privacy, it has nothing to do with protecting actual data transmission.

Without entering the credentials or biometric data that allows for a device to open, many of the features a device has are not able to be accessed. In fact, most modern smartphones won’t actually connect to a Wi-Fi network without the proper credentials. This is handled differently on the different mobile platforms.

The iPhone ships with 256 AES encryption. It is not stored on the phone (which could result in more successful hacks), a correct passcode combines with data stored on the Secure Enclave chip to generate a key that unlocks the device. This chip also holds biometric data (fingerprint and facial recognition) that can be used to open the device or use Apple Pay. Any Apple product that is repeatedly unsuccessfully opened will lock, stopping unwanted parties from getting into your iPhone.

Since so many more people use the Android mobile OS, Google did not make device encryption standard until devices that run their Android 6.0 Marshmallow mobile OS. If your new Android device runs 6.0 Marshmallow or better, it now ships with encryption enabled. Since Google’s implementation of encryption depends on the manufacturer, some phones will use a key generation system similar to the iPhone’s, while others will use a more complex system called file-based encryption. File-based encryption allows for varying levels of decryption and provides unauthorized users access to a limited number of the features on the device.

In the News
Over time, there has been a push for mobile OS developers to build in “backdoors” to ensure that law enforcement can get into a device if/when they need to. Companies like Apple, Microsoft, and Google have had to field their fare share of criticism, but strongly defend their position. Apple CEO Tim Cook states the following, “In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks - from restaurants and banks to store and homes. No reasonable person would find that acceptable.”

Encryption is for your benefit. If you would like more information about modern digital cryptography or any other mobile security, visit our blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, July 23 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business computing Google Malware Software Microsoft Network Security Backup Hackers Windows 10 Internet Android Business Email Innovation Smartphones Hosted Solutions Data Small Business Business Continuity Hardware VoIP Tech Term Managed IT Services Browser Alert Cloud Computing Computer Smartphone Office Ransomware Mobile Devices Business Management Computers Disaster Recovery Communications Productivity Outsourced IT Efficiency Cybercrime Data Backup User Tips Law Enforcement Artificial Intelligence Router IT Services Productivity Money Telephone Systems How To Password Virtualization Chrome Collaboration Cybersecurity Windows Data Recovery Work/Life Balance Communication Quick Tips Network Miscellaneous Upgrade Managed IT Services Internet of Things App Passwords Health Office 365 Social Media Facebook Social Engineering Apps Data Breach Google Drive Connectivity Word Automation Data Security Saving Money HaaS Office Tips IT Support Vulnerability Bring Your Own Device Spam Microsoft Office Windows 10 Hacking Wi-Fi Data Protection Holiday Mobile Device Management Applications Private Cloud Two-factor Authentication Phishing Workplace Tips Operating System Infrastructure Scam Mobile Device Worker Marketing Big Data IT Support Computer Care Unsupported Software Battery Paperless Office End of Support Remote Monitoring VPN History Managed IT Server Samsung Electronic Medical Records Windows 7 Bandwidth BDR Remote Computing Comparison Entertainment USB Value Website CES Flexibility Save Money PDF BYOD Networking Data Storage Legal OneNote Content Management Mobility Automobile Employer-Employee Relationship Managed Service Provider Charger Redundancy Government IT Management Keyboard Spam Blocking Patch Management Avoiding Downtime Business Intelligence Gadgets Blockchain Data Management Cleaning Update Public Cloud IT Plan Identity Theft Tip of the week Cache Document Management Humor Internet Exlporer Data loss Millennials Encryption Content Risk Management Search Files Downtime Multi-Factor Security HIPAA Cryptocurrency Hiring/Firing Evernote Music Data storage The Internet of Things Criminal Virtual Reality Servers Network Congestion Hybrid Cloud webinar Credit Cards Inventory Instant Messaging Windows 10s Windows Server 2008 Password Manager Transportation Safety Screen Mirroring Workforce Video Games Audiobook Politics Rootkit Wireless Charging Devices How to Wireless Internet Books Assessment Root Cause Analysis Trending Human Resources Safe Mode Employer Employee Relationship HBO Wearable Technology FENG Telephony Google Docs Worker Commute HVAC IT Consultant Apple Conferencing Software Tips Fraud Access Control Business Mangement Education Machine Learning Benefits Internet exploMicrosoft Cast Accountants Training Outlook Cortana Thought Leadership Black Market Wire Television Botnet Staff Virtual Assistant Computer Accessories Settings Skype Enterprise Content Management Leadership iPhone Emails Amazon Authentication Solid State Drive Flash Gmail Computing Infrastructure YouTube Firewall Advertising Telecommuting Scalability Vendor Management Frequently Asked Questions Google Apps Sports Emergency Public Computer Relocation User Error Meetings Travel Specifications Telephone System Bluetooth Troubleshooting Loyalty Start Menu Voice over Internet Protocol Password Management Save Time Amazon Web Services Nanotechnology Wireless Monitor Audit Recovery Recycling Smart Technology Current Events Remote Work Practices Excel Workers Addiction Smart Office Digital Signature Best Practice SaaS Tools NIST IT solutions Physical Security Online Shopping Smart Tech Experience Computer Fan Sync eWaste Techology Users Two Factor Authentication Knowledge Hosted Computing Information Technology WiFi Thank You Twitter Congratulations Webinar Company Culture CrashOverride Managing Stress

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Digital Hold The Case for Hosting Your Phone Solution In-House
24 February 2018
Informative Blog. Thanks a lot for the useful info.
Maria Albert Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
26 September 2017
Occasionally I strive to not concentrate such these kinds of articles and neglect reading like these...
nathan dwyer Your Guide To Mobile Device Management as an SMB
07 September 2017
I come here after quite a while since 2016 and entire this term i have miss the chance to get inform...