Nine steps for securing an Android tablet

Continuing Security

After you have improved the security on your tablet, remember to keep it in the same condition, following safe practices and checking regularly for bugs and malware. Just because a tablet is typically for less serious purposes than a laptop or a workstation is no reason to make it less secure.

In particular, remember security when you add functionality. For example, if you add an app for texting, you should also add extra apps for security, such as one that allows the creation of a blacklist.

Considering how well known security issues are, the wide-open condition in which tablets are shipped is surprising. You might imagine that manufacturers would know better by now. However, apparently manufacturers prefer to make their devices convenient in the short term while risking making them greatly inconvenient in the long term by being insecure.

Most of the suggestions given here can be implemented in an hour or two. Encrypting may take another couple of hours and rooting or installing CyanogenMod as much as eight more, including the research needed. That might sound like a lot, but when you are done, you will not only have the convenience of a tablet, but also the relief of knowing that the problems of running it insecurely are no longer your concern – all of which justifies the extra effort.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More