ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Encryption Helps Keep your Smartphone Secure

Encryption Helps Keep your Smartphone Secure

These days everyone has a smartphone; and, they can do some pretty incredible things. One place that the average smartphone may seem to be a little loose is in the arena of data security. Today’s smartphones do, in fact, come with encryption by default, so there is some semblance of device security on every device. What does this mean? We’ll break it down.

“Smartphone encryption” describes the state in which the data on the device is scrambled so that people that don’t have the proper security clearance, won’t be able to see the device’s contents. While this is extraordinarily helpful for device security and personal privacy, it has nothing to do with protecting actual data transmission.

Without entering the credentials or biometric data that allows for a device to open, many of the features a device has are not able to be accessed. In fact, most modern smartphones won’t actually connect to a Wi-Fi network without the proper credentials. This is handled differently on the different mobile platforms.

The iPhone ships with 256 AES encryption. It is not stored on the phone (which could result in more successful hacks), a correct passcode combines with data stored on the Secure Enclave chip to generate a key that unlocks the device. This chip also holds biometric data (fingerprint and facial recognition) that can be used to open the device or use Apple Pay. Any Apple product that is repeatedly unsuccessfully opened will lock, stopping unwanted parties from getting into your iPhone.

Since so many more people use the Android mobile OS, Google did not make device encryption standard until devices that run their Android 6.0 Marshmallow mobile OS. If your new Android device runs 6.0 Marshmallow or better, it now ships with encryption enabled. Since Google’s implementation of encryption depends on the manufacturer, some phones will use a key generation system similar to the iPhone’s, while others will use a more complex system called file-based encryption. File-based encryption allows for varying levels of decryption and provides unauthorized users access to a limited number of the features on the device.

In the News
Over time, there has been a push for mobile OS developers to build in “backdoors” to ensure that law enforcement can get into a device if/when they need to. Companies like Apple, Microsoft, and Google have had to field their fare share of criticism, but strongly defend their position. Apple CEO Tim Cook states the following, “In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks - from restaurants and banks to store and homes. No reasonable person would find that acceptable.”

Encryption is for your benefit. If you would like more information about modern digital cryptography or any other mobile security, visit our blog.



No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Business Computing Hackers Cloud Microsoft Backup Innovation Android Small Business Network Security Email Internet Software Hardware Business Cybercrime Ransomware Efficiency Smartphones Malware Data Data Backup Browser Cybersecurity Cloud Computing VoIP Computers Smartphone How To Windows Mobile Devices User Tips Social Engineering Mobile Device Management Productivity Business Management Managed IT Services Chrome Business Continuity Data Recovery Data Security Communication Money Vulnerability Server Network Tech Term Automation Law Enforcement Disaster Recovery Safety Bring Your Own Device Outsourced IT Alert Collaboration Managed IT Services Gadgets Windows 10 Upgrade Bandwidth Two-factor Authentication Telephone Systems Internet of Things Operating System Computer Social Media Data Protection Phishing Data Breach Spam App Recovery Quick Tips VPN Remote Monitoring Router Business Intelligence Saving Money Government Update Internet Exlporer Data storage IT Services CES Passwords Save Money BDR Gmail Data Storage Virtualization Miscellaneous The Internet of Things Word IT Management Artificial Intelligence Identity Theft Physical Security Hosted Solutions Private Cloud OneNote IT Plan Google Drive Public Cloud Wi-Fi Unsupported Software Productivity Cleaning Apps Office 365 Communications Downtime Redundancy Spam Blocking Avoiding Downtime Comparison BYOD Windows 10 Windows 10s Recycling Computer Care History Encryption Networking Laptop Specifications Shadow IT Meetings Conferencing Password Online Shopping Hiring/Firing Relocation Chromecast eWaste Samsung Accountants IBM Touchpad Patch Management HBO Emails Evernote Telephony Value User Error Solid State Drive Criminal Data loss Supercomputer Millennials Scam HaaS Wireless Charging Skype DDoS Audit Screen Mirroring Practices Budget Workforce Reputation Frequently Asked Questions Holiday Outlook Cortana Apple Start Menu End of Support Google Docs Computer Fan Content Management Cast Hosted Computing Telecommuting Customer Excel Netflix Flexibility Humor Google Apps iPhone YouTube Tools Internet exploMicrosoft Website FENG Blockchain Inventory Current Events Marketing Remote Work Hacking Tip of the week IT Support Employer-Employee Relationship Managed Service Provider Advertising Voice over Internet Protocol HIPAA Automobile Access Control Knowledge Windows Server 2008 Legal Monitor Workers Managed IT Going Green Uninterrupted Power Supply Human Resources Work/Life Balance Authentication Network Congestion Black Market Credit Cards Windows 7 Data Management Keyboard Settings Infrastructure Health NarrowBand Botnet Multi-Factor Security Office Tips Staff Microsoft Office IT Consultant Facebook Fraud Flash Mobile Device Password Manager Wireless Technology Travel Hybrid Cloud Trending Big Data Root Cause Analysis Software Tips Amazon Electronic Medical Records Sports Business Mangement Charger Files Digital Signature PDF Tech Support webinar Robot Amazon Web Services Office Sync Scalability Education Information Technology Emergency Content Devices Workplace Tips Computing Infrastructure Audiobook Thought Leadership Techology Employer Employee Relationship Remote Computing Instant Messaging Applications Entertainment Webinar Computer Accessories Loyalty WiFi Users Wireless Transportation Thank You IT solutions IT Support Bluetooth SaaS Virtual Reality Benefits Congratulations Worker Commute Firewall Risk Management Mobility Worker Assessment Wearable Technology Search Smart Technology Politics Rootkit Television USB How to Two Factor Authentication Best Practice Training Public Computer Troubleshooting CrashOverride Nanotechnology Experience Vendor Management Smart Tech Music Video Games Books Battery Connectivity Save Time