DIGITALSECURITYGUIDE

To make a Playlist private, go to Account > Playlists under "My Videos." Select the Playlist you want to make
private.
You can create a Group to focus your YouTube communications on your organization go to Account > Groups,
then click "Create a Group". After you've filled in all the information, click the "Create a Group" button. You will
then be directed to a blank Group homepage where you'll invite Group members, post videos for the Group,
and so on.

Mobile phone security
Mobile phones are an integral part of our daily communications. All mobile phones have the capacity for voice
and simple text messaging services. Their small size, relatively low cost and many uses make these devices
popular. In Zimbabwe the mobile penetration rate is more than 100 percent.
Recently, mobile devices with many more functions have become available. They may feature GPS, multimedia
capacity (photo, video and audio recording and sometimes transmitting), data processing and access to the
internet. However, the way the mobile networks operate, and their infrastructure, are fundamentally different
from how the internet works. This creates additional security challenges, and risks for users' privacy and the
integrity of their information and communications.
It is important to start with the understanding that mobile phones are inherently insecure:
• Information sent from a mobile phone is vulnerable.
• Information stored on mobile phones is vulnerable.
• Phones are designed to give out information about their location.
People often carry mobile phones that contain sensitive information. Communications history, text and voice
messages, address books, calendar, photos and many other useful phone functions can become highly
compromising if the phone or the data is lost or stolen. It is vital to be aware of the information that is stored, both
actively and passively, on your mobile phone. Information stored on a phone could implicate the person using
the phone as well as everyone in their address book, message inbox, photo album, etc.
Mobile phones that connect to the internet are also subject to the risks and vulnerabilities associated with the
internet and computers, as discussed in our other tactics guides regarding information security, anonymity,
information retrieval, loss, theft and interception.
In order to reduce some of these security risks, users should be aware of their phone's potential for insecurity, as
well as its set-up options. Once you know what the possible problems may be, you can put safeguards into
place and take preventative measures.
Physical security for your mobile phone
As is the case with other devices, the first line of defence for the safety of the information on your mobile phone
is to physically protect the phone and its SIM card from being taken or tampered with.
• Keep your phone with you at all times. Never leave it unattended. Avoid displaying your phone in public.
• Always use your phone's security lock codes or Personal Identification Numbers (PINs) and keep them
secret
(unknown to others). Always change these from the default factory settings.
• Physically mark (draw on) the SIM card, additional memory card, battery and phone with something
unique and not immediately noticeable to a stranger (make a small mark, drawing, letters or numbers, or
try using ultra-violet marker, which will be invisible in normal light). Place printed tamper-proof security

23

Select target paragraph3