ct logo wslogan

2 minutes reading time (462 words)

Encryption Helps Keep your Smartphone Secure

Encryption Helps Keep your Smartphone Secure

These days everyone has a smartphone; and, they can do some pretty incredible things. One place that the average smartphone may seem to be a little loose is in the arena of data security. Today’s smartphones do, in fact, come with encryption by default, so there is some semblance of device security on every device. What does this mean? We’ll break it down.

“Smartphone encryption” describes the state in which the data on the device is scrambled so that people that don’t have the proper security clearance, won’t be able to see the device’s contents. While this is extraordinarily helpful for device security and personal privacy, it has nothing to do with protecting actual data transmission.

Without entering the credentials or biometric data that allows for a device to open, many of the features a device has are not able to be accessed. In fact, most modern smartphones won’t actually connect to a Wi-Fi network without the proper credentials. This is handled differently on the different mobile platforms.

The iPhone ships with 256 AES encryption. It is not stored on the phone (which could result in more successful hacks), a correct passcode combines with data stored on the Secure Enclave chip to generate a key that unlocks the device. This chip also holds biometric data (fingerprint and facial recognition) that can be used to open the device or use Apple Pay. Any Apple product that is repeatedly unsuccessfully opened will lock, stopping unwanted parties from getting into your iPhone.

Since so many more people use the Android mobile OS, Google did not make device encryption standard until devices that run their Android 6.0 Marshmallow mobile OS. If your new Android device runs 6.0 Marshmallow or better, it now ships with encryption enabled. Since Google’s implementation of encryption depends on the manufacturer, some phones will use a key generation system similar to the iPhone’s, while others will use a more complex system called file-based encryption. File-based encryption allows for varying levels of decryption and provides unauthorized users access to a limited number of the features on the device.

In the News
Over time, there has been a push for mobile OS developers to build in “backdoors” to ensure that law enforcement can get into a device if/when they need to. Companies like Apple, Microsoft, and Google have had to field their fare share of criticism, but strongly defend their position. Apple CEO Tim Cook states the following, “In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks - from restaurants and banks to store and homes. No reasonable person would find that acceptable.”

Encryption is for your benefit. If you would like more information about modern digital cryptography or any other mobile security, visit our blog.



Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Cloud Business Computing Hackers Microsoft Backup Malware Innovation Internet Email Tech Term Network Security Cybercrime Android Mobile Devices Data Small Business VoIP Hardware Cloud Computing Software Windows Ransomware Business Data Backup Smartphones Efficiency Internet of Things Computers User Tips Cybersecurity Browser Business Management How To Smartphone Hosted Solutions Chrome Money Artificial Intelligence Collaboration Router Network Data Recovery Communication Law Enforcement Computer Social Engineering Managed IT Services Business Continuity Communications Upgrade Productivity Mobile Device Management Automation Bandwidth Phishing Saving Money BDR Safety Managed IT Services Telephone Systems Server Data Breach Spam Word Disaster Recovery Save Money Windows 10 Operating System Data Security Social Media Vulnerability Two-factor Authentication Bring Your Own Device Data Protection Alert Gadgets App Connectivity Outsourced IT Office 365 Data storage Avoiding Downtime Physical Security Comparison Spam Blocking Website Blockchain Government Internet Exlporer Private Cloud Downtime BYOD Google Drive Data Storage Password Networking Identity Theft IT Support Public Cloud Remote Monitoring Passwords Managed IT Facebook Cleaning Business Intelligence IT Management Sports Windows 7 Gmail Miscellaneous Update Quick Tips Applications Productivity YouTube Infrastructure OneNote IT Plan Wi-Fi Windows 10 IT Services Paperless Office Microsoft Office Recovery CES Virtualization The Internet of Things Unsupported Software Apps VPN Redundancy Content Management Root Cause Analysis Relocation Encryption Telephone System Excel Telecommuting Advertising Wireless Internet Business Mangement Software Tips Devices Tools Google Apps Computer Fan Flexibility Password Management Uninterrupted Power Supply Going Green Cast Access Control Sync Amazon Web Services Charger Accountants Tip of the week Remote Work Netflix Outlook Wire Hiring/Firing Data Management NarrowBand Recycling webinar User Error Thought Leadership Employer-Employee Relationship FENG NIST Office Tips Specifications Current Events Health Authentication Patch Management Online Shopping Computer Care Windows 10s DDoS Voice over Internet Protocol HIPAA Meetings Workplace Tips USB Windows Server 2008 Humor Smart Office Automobile Wireless Technology eWaste Conferencing Robot Workers Legal Cryptocurrency Knowledge Nanotechnology Scam Telephony Evernote Samsung Reputation Servers Human Resources IBM Laptop Apple Practices Credit Cards Hybrid Cloud Document Management Work/Life Balance Criminal HBO Tech Support Millennials Emails End of Support Addiction Botnet Safe Mode Keyboard Network Congestion Files Smart Tech Skype Wireless Charging Value Solid State Drive Customer HaaS HVAC Entertainment Multi-Factor Security Staff Supercomputer Touchpad Data loss iPhone Hosted Computing Big Data Flash Fraud Settings Monitor PDF Digital Signature Mobile Device Virtual Assistant Frequently Asked Questions Shadow IT Workforce Internet exploMicrosoft Cache Electronic Medical Records Travel Password Manager Office IT Consultant Black Market History Start Menu Cortana Audit Hacking Marketing Enterprise Content Management Holiday Trending Budget Screen Mirroring Managed Service Provider Inventory Amazon Machine Learning Google Docs Chromecast Video Games Music Bluetooth IT solutions Virtual Reality Save Time Battery Firewall Remote Computing SaaS Emergency Company Culture Scalability Wearable Technology Worker Commute Education Smart Technology Mobility Risk Management Search Managing Stress Content Thank You Worker Employer Employee Relationship Twitter Computing Infrastructure Two Factor Authentication Assessment Politics How to Techology Wireless Audiobook Instant Messaging Troubleshooting Congratulations Rootkit Computer Accessories Television Best Practice Transportation Training WiFi Experience Webinar Users Public Computer CrashOverride Benefits Loyalty IT Support Books Vendor Management Information Technology