Mobile devices and tablets are no longer used solely for communication, with social media and the development of applications that can do almost anything you can think of, these devices are being used for work, play and everything in between, says Gregory Anderson, country manager at Trend Micro. The question of mobile security is too soft on the lips of consumers who use these devices like they are extensions of their being. As more and more mobile threats pop up every year it is imperative that consumers pay attention not only to physical security but virtual security as well.

How mobile has changed security
With everything going mobile these days it is no surprise that some, if not the majority of mobile users disregard the value of privacy. Cybercriminals are ready and waiting for users to slip up, which they often do, leaving traces of personal information all over the Web.

In social media alone, a Trend Micro survey noted that only 38% of Internet users know how to limit what they post online. Oversharing is an opportunity for more severe cybercrimes like identity theft with the creation of-millions of malicious applications engineered to steal sensitive user data.

To increase protection from cybercriminals on mobile devices the first place you should look is your default device settings. By familiarising yourself with these settings and modifying them to suit your personal mobile needs, you can be assured that no one has easy access to your mobile device. You also need to be aware that connecting to open WiFi networks and leaving Bluetooth on constantly is now a threat to mobile security.

Communication has been made easier through Bluetooth and wireless connections, but unfortunately, these tools have been exploited for malicious reasons allowing attackers to hack into user networks and gain access to credentials and information transmitted through mobile devices.

Change your security habits
Having the online world at your fingertips is the ultimate gift, but before you open it, think about safeguarding yourself by changing your security habits. Cybercriminals went mobile with the rest of earth’s population and have stepped up production of threats that will affect online activities like social networking, online stores and even banking, and they won’t stop at creating seemingly legitimate apps.

The 2013 TrendLabs Security Report noted that crimeware is taking a significant turn in focusing on gaining users’ money- with a growth of almost a-million new banking malware variants developed in 2013. Users need to be vigilant regarding dodgy-looking URLs accessed on mobile devices to ensure they don’t enable the execution of more malicious routines on the device.

By the end of 2013, malicious and high-risk apps reached the 1.4-million mark and those with the capabilities of stealing information grew from 17% at the start of 2013 to almost a quarter by the year’s end- with TrendLabs predicting that the number will rise to 3-million by the end of 2014. As the number grows so do the sophistication and capabilities of these applications and cybercriminals are always looking for a way to make a profit.

Is free really free
With this in mind users should be asking themselves if, in fact it is possible that “free” applications really are free. In order to enjoy the game that everyone has been talking about or edit your photos to perfection you have to make a trade-off. You may not be physically paying to use an application but the owners could be reselling your personal information, or taking data from you while confidently proclaiming that an application is free.

Its every man for himself in the online service developers game when it comes to End-User License Agreements (EULAs), you see it on the terms they ask you to agree with that they can change at any time, with or without notice. Read through the conditions or you may end up giving them permission to track your online activities, sell your photos or hand your information over to others without your consent.

The same goes for privacy and mobile security at work. BYOD is thriving in many industries, but be wary of using company laptops, smartphones and tablets for work as even the company’s IT department could use a set of protocols that can give them liberty to access your personal files and information.

Take precautions
To prevent cyber-attacks mobile users need to take precautions, these may feel over-the-top, but rather safe than sorry. Refrain from keeping compromising files- photos and videos- on your device, you will be happy you did this in cases of loss or theft. Configure your device’s browser settings to control the amount of information it shares.

Enable your device’s data encryption and configure your passwords. Regularly clear your browser cache to avoid data leakage and information-stealing malware. You need to monitor your application and account settings to ensure that sharing and connectivity are secure. To minimise chances of hacking users must activate screen locks and passwords and change these passwords every three months for security.

Think of your device like it is your home, because in a way it is your virtual home, where you connect with family and friends, conduct business and store personal files. You need to ensure that your virtual home is secure, so put up burglar bars, electric fences and beams. Lock the doors, close the windows and get 10 dogs.

When it comes to the protection of sensitive data there should be no limit to the lengths users go to, think about this next time you’re tempted to overshare.