Whenever someone asks me if a smartphone is truly secure, I find myself feeling vexed. On the one hand, anything that connects to the Internet could become a security concern. By the same token, if someone is aware of commonsense practices for avoiding data leakage and exploitation, then today’s smartphones are very safe to use.
In this article, we’re going to be talking about Android security. I’ll share my top tips for avoiding data leakage and doing everything possible to protect yourself against threats like identity theft, hacked accounts and your contact list being spammed.
Difficult to avoid security exploits can range from provider backdoors to exploits affecting firmware. Realistically, these issues aren’t going to be something the casual users are able to protect themselves against. Therefore, this article is going to focus on completely avoidable security issues instead.
This is a fact, regardless of your preferred mobile platform. So even if someone claims alternative mobile platforms have an edge on security due to their walled garden app store, they fail to realize this only prevents applications from becoming a security risk. It does nothing for other entry points.
Spend some time in your Android device’s data usage area. All Android devices have access to this feature, and I suggest getting to know it better. Right away, you’re going to notice the biggest data users on your device. This is also the area where you can click onto a specific app and only allow it Internet access when connected to wifi.
My recommendation is doing this with the apps that will never need to connect to the Internet when not at home. This includes file managers and apps that you would never think to connect to the Internet in the first place. While it doesn’t prevent malware or data leaks specifically, this practice can help you to troubleshoot potentially bad apps.
As a general rule, I recommend always restricting apps from using mobile data unless it’s necessary. Others might point you to using software firewalls. Instead I prefer using carefully thought out hardware firewall on my LAN with logging. If something besides allowed ports are being used for that device, the ports will be blocked. This practice might not stop crazy ads and other ad related weirdness, but it could prevent other more dangerous surprises by restricting port access at the network level.
The problem I have with Android firewalls is that many of them are by no-name companies which I’ve never heard of. They ask for heavy permissions and their support email is an @gmail.com address. Personally, I don’t find all that secure. I’d much rather have some control over which apps are connecting to the Internet. I may grant some exceptions (SMS apps, etc), but I keep a tight leash otherwise.
I’d love to tell you that every single application on the Google Play Store is well vetted. The truth is that isn’t true – period. This means it’s easier to get applications with more features than you might find on other platforms, but it also means you need to be careful about what you’re installing.
The first rule of installing Android applications is to only do so from trusted sources. I’m not talking about installing apk packages vs Google Play. You need to know the source and company behind the application before trusting it completely. Like many of you, I’ve been known to make exceptions…but even then I’m careful about the permissions I grant the software.
To be clear, I would trust an apk package from a vendor’s website I trust more than I would some random Google Play app that I know nothing about. Why? Because Google Play on its own merit doesn’t promise security. There is still some user responsibility for maintaining a secure Android experience. That said, I would suggest you’re safer downloading random apps on Google Play than some mysterious forum page’s listed apk packages.
No matter what software you choose to install, more often than not the biggest security threat comes from your browser. When you’re using a public wifi access point, you’re taking a significant risk each time you login to anything important. Much of this is mitigated thanks to SSL and https secured websites, such as banking and some email websites. But there are still countless other sites out there where you could be sending your login credentials to anyone around you monitoring your connection.
I suggest looking into a reliable VPN service. There are some good ones, but I suggest doing your own research. Some might question how a VPN tunnel secures your Android device. I would submit that it provides an added layer of encryption to your online web browsing activities. And while the encryption ends on the other end of the tunnel, at least your activity isn’t broadcasted to other users sharing the same public wifi access point.
There was a time when the idea of running anti-malware software on your Android device might have seemed unnecessary. And even in 2015, there are Android users who may still feel this way. Personally, I happen to be in the “better safe than sorry” camp. The software I’ve had the most success with is called Lookout. Using Lookout has proven to be low on resource usage and big on making sure my installed applications aren’t doing anything nefarious.
I also like the fact that Lookout provides me with the ability to remotely locate my phone if it were lost or stolen, and can also remotely wipe the data if I choose. It’s a solid application and it works properly across all of my Android devices. I’ve also never had any issues with software being missed that contained something dangerous.
There are other decent security software titles out there, but I’d advise you to research each app and their company closely before installation. Some of the security apps out there are thinly veiled adware installers. So be careful.
The last security tip I want to share is about rooting your phone. On the surface, rooting your Android phone has a lot of benefits. You can remove pre-installed bloatware, install applications that only work when a device is rooted, plus be in full control of the device to its core. It’s a powerful experience, no question about it. The downside of running as root is that any layer of protection from Android has been removed. This is a root device – if code is executed, it’s going to run. Period.
On the flipside, rooting also allows you to take control of your device and setup your own security best practices. The key factor is since you’ve rooted, you’re in charge. Don’t expect your mobile carrier to bail you out if you screw up. If you’re someone who has rooted a phone before, has a rock-solid plan for restoring their device if they need to, then rooting can indeed make a lot of sense.
A rooted phone can allow you to install a strong software firewall – one that works reliably with 4g LTE and wifi. You’re also free to install adblockers and make advanced changes to better secure your phone from web threats. But before even considering rooting your phone, make sure you have a plan B if something goes wrong.
So what say you? Do you feel a rooted phone is a secure option? Perhaps you believe security software on your Android device is just silly? Hit the Comments and share your thoughts!
Photo courtesy of Shutterstock.
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2020
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Anticipating The Coming Wave Of AI Enhanced PCs
FEATURE | By Rob Enderle,
September 05, 2020
The Critical Nature Of IBM’s NLP (Natural Language Processing) Effort
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
August 14, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.