After a Canadian woman was required to surrender her cell phone to US border guards last week and then denied entry, people are wondering what they can do to protect their privacy. Unfortunately, not a whole lot. When crossing the border, you are entering a foreign country and their laws take precedence. They can scan your phone, laptop, tablet or any other device for content as they wish. Any information they find can be used against you. Any sensitive data that is stored can be exposed.
The best way to protect your privacy and that of Mount Royal is to not bring a device with you. Leave your smartphone, tablet or laptop at home. This is especially true if you are traveling to countries with less than honest border guards who are known hold on to your device until you pay a fine. If you are traveling for business and require portable devices:
- Ensure that portable devices are wiped clean of anything you want to remain private. This includes removing social media apps and deleting browser, email and text message history.
- Store data you need access to on Google drive or leave it on your workstation and then use SRAS to access it from your hotel.
- Make sure you remove your Mount Royal email account from your phone and devices and log out of Google.
Basically you want to turn your smartphone into a phone. It takes calls and that’s it. Theoretically they could ask you to login to your email anyway, however the odds are they are not going to bother.
If you need specific legal advice concerning crossing the border as a Mount Royal University employee, contact Legal Services.
One last piece of advice, be nice to the border guards. Declaring that you have rights as a Canadian citizen will only aggravate them. You are attempting to enter their country, our privacy laws do not apply.
Here is the latest malware scam. Cyber criminals are sending out phishing emails that appear to come from your bank and include a link to download a new banking app on your phone. The email notifies you that for the app to work, you will have to give it administrative privileges. When you download the app, everything works fine. You can make transactions just as you did with your old app. However, after after you have completed several transactions, your phone will not recognize your unlock password. While you are distracted with your locked phone, the criminals are busy emptying your bank accounts using all the information that you entered earlier into their fake app.
Sound scary? It is. How do you protect yourself? Easy, don’t download apps from unsolicited emails. Only download apps from reputable sources such as iTunes, the Google Play Store or vendors/banks legitimate websites. When downloading from a store, make sure you check reviews before you download. Safe apps have millions of downloads and good reviews.
What do you do if you become a victim? Call your bank immediately and do a factory reset on your phone.
Here are 5 simple tips on how to keep your mobile devices secure.
Public WiFi is a lifesaver for your data package. However, it is a favorite place for cyber criminals to hang out and take advantage of unaware users. Watch the video to find out what you can do to keep your data safe when using public WiFi.
Our mobile devices have made our lives easier and more fun. However, because they are mobile it is easy to loose them or for someone to steal them. Also, because they are essentially mini computers, they are also susceptible to malware. Watch the video for some great tips on keeping your mobile device safe.
Malware isn’t jut for computers, criminals are now targeting your phone. Watch the video to find out how to protect yourself.