Mobile phone security: 10 best practices from CERT-FR
- Julien ROBERT
- 5 days ago
- 3 min read
Mobile phones have become indispensable tools, both in our personal and professional lives. Emails, instant messaging, access to business tools, sensitive documents… our smartphones now hold a large portion of our data.
However, they often remain under-protected , even though they are a prime target for cyberattacks : phishing, espionage, data theft, compromise of professional access, etc.
Faced with this situation, CERT-FR (the French government's computer attack monitoring, alert and response center), attached to ANSSI , recently published an official note listing 10 essential best practices for securing the use of mobile phones .
A valuable publication, still little publicized, which we have chosen to highlight.
Why mobile security has become a major issue
Today, a mobile phone can contain:
professional emails,
access to business applications,
passwords,
customer data,
even strategic information for a company.
The line between personal and professional use is becoming increasingly blurred, particularly in very small businesses and SMEs. If a smartphone is compromised, the consequences can be severe: data leaks, identity theft, unauthorized access to information systems, or even business interruption.
This is why mobile security must be considered as a full-fledged pillar of cybersecurity , just like workstations or servers.
An official recommendation from CERT-FR / ANSSI
The document published by CERT-FR is entitled:
📄 “Best practices for using mobile phones”
👉 Link to the official document: 🔗 https://www.cert.ssi.gouv.fr/uploads/CERTFR-2025-DUR-002.pdf
This guide is also intended for:
to individuals,
than to professionals,
and to organizations wishing to reduce the risks associated with smartphone use.
10 best practices for securing your mobile phone
1. Update your phone regularly
Always install system and application updates. They patch security vulnerabilities actively exploited by attackers.
2. Activate advanced security features
When the system allows it (e.g., enhanced protection modes), activate the hardening mechanisms offered by the manufacturer.
3. Avoid uncontrolled connections
Do not connect your phone to unknown chargers, computers or accessories, and beware of unsecured public Wi-Fi networks.
4. Remove unnecessary applications
The fewer applications you have installed, the smaller your attack surface. Uninstall those you no longer use and limit the permissions granted to them.
5. Separate personal and professional uses
Avoid using the same phone for sensitive professional and personal uses, or implement separation solutions (profiles, MDM, etc.).
6. Turn off the phone when it is not in use
A switched-off phone cannot be listened to or compromised remotely. This practice is recommended when it is left unattended.
7. Do not keep your phone with you during sensitive conversations
During confidential meetings or discussions, it is advisable to leave phones outside to avoid any risk of being intercepted.
8. Use secure messaging services
For sensitive communications, opt for end-to-end encrypted messaging applications rather than traditional SMS.
9. Be wary of suspicious messages
Phishing, fraudulent SMS, urgent messages… Always check the origin of communications before clicking on a link or forwarding information.
10. Protect access to the phone
Use a strong lock code, biometric authentication, and disable automatic access to sensitive functions.
Personal phone and professional use: an underestimated risk.
In many companies, personal phones are used for:
check work emails,
access to internal tools,
exchange with clients or partners.
Without clear rules or appropriate security measures, these practices directly expose the company to risks of data leaks and targeted attacks.
Raising user awareness and implementing good practices are therefore essential .
Going further in mobile cybersecurity
These recommendations form an essential basis, but they must be part of a comprehensive cybersecurity approach:
audit of uses and risks,
raising employee awareness
securing access,
supporting businesses in the face of current threats.
Our team assists organizations in implementing appropriate cybersecurity strategies , including mobile device security.
👉 Feel free to contact us for more information.
Source: CERT-FR / ANSSI – https://www.cert.ssi.gouv.fr



Comments