- Open administration
The DESA'L service of the AOC obtains the certification of conformity with the ENS in the high category
It is becoming more commonmobile internet access (in Spain, almost 53% access the Internet through this channel, compared to 18% of the EU average), and it is for this reason that it is important that the use of this device is safe. A few weeks ago we published an article on the cloud security and another on theuse of public wifi networks, now we give you a brief sketch of recommendations for safe mobile use.
El theft or loss of mobile devices, and also the leaking or leaking information that we have stored there, are the order of the day, but we must know that measures can be taken, at least to cushion the impact of this possible loss, leakage or theft. The most used mobile phones today, of the type smartphones, have virtually the same benefits and therefore the same security risks as laptops or desktops. All this we must take into account to apply a more or less high level of security to the mobile we use. In the following article, you will find a collection of simple security tips to protect your mobile phone in order to prevent it from becoming infected, to surf safely, so that there are no unintentional leaks of information and to avoid losing the information we have. stored: Tips for the safe use of mobile phones. Additionally you can consult the following guide of the del CESSATED for safe mobile use: Guide to protect and use your mobile phone safely. The Center for Information Security of Catalonia (CESICAT) was born as the support body for the "National Plan to promote information security", approved in 2009, and has been promoted, among others, by the Government of the Generalitat de Catalunya and the Open Administration Consortium of Catalonia (AOC Consortium).
On the other hand, the mobile phones are the quintessential parallel access channel, that is, the additional authentication mechanism or "second authentication factor" that is used in many applications, to create a much more robust system than the usual password protection schemes, which can be easily usurped via software malware, server software bugs, or insecure channel connections. It is for this reason that it is important to take care of the security of mobile phones.
We encourage you to read this article about solutions for the second factor in authentication based on smartphones: Second Authentication Factor