Skip Navigation

Positions

Cybersecurity .

Every day, we’re investing in people and technologies that help protect our customers and networks from cyber threats. CTIA supports flexible, technology-neutral cybersecurity policies.

Cybersecurity

Share

Protecting Wireless Networks and Consumers

Americans' Use of PINs/Passwords

is unknown

Americans' Use of PINs/Passwords

Nearly three quarters of Americans use PINs/passwords on their smartphones, an almost 50 percent increase from 2012, when we first asked about the adoption of this practice.

We know that providing a safe and secure mobile experience is critical. The security of mobile networks has improved with each generation of wireless. As we move towards 5G and the IoT, the industry is—more than ever—building innovative security features into tomorrow’s wireless networks from the beginning.

The entire wireless ecosystem—network operators, device manufacturers, and operating system and application service providers—works together to develop security features for wireless networks and consumers. CTIA’s Cybersecurity Working Group serves as an expert resource to establish these best practices and proactively address tomorrow’s cyber risks.

Wireless customers also play a key role in protecting their data and keeping wireless networks safe. We’re proud of our efforts to educate consumers on the importance of using available security features and following best practices, including adopting passwords and PINs, using anti-virus software, and applying updates and patches when available.

Policy Positions

Awareness of Remote Locate, Lock, and Erase Capabilities

is unknown

Awareness of Remote Locate, Lock, and Erase Capabilities

Nearly 60 percent of American smartphone owners reported being aware that they have the “find your phone” capability on their device, allowing them to remotely locate, lock and erase software on their smartphones.

To ensure the wireless ecosystem can innovate as quickly as the cyber threats we face, CTIA advocates for:

Flexible, technology-neutral solutions: Voluntary, industry-led efforts will help the wireless industry identify, mitigate and respond to evolving threats.

A collaborative approach: Creating safe harbors will help government, industry, and other key stakeholders come together to share cyber threat information.

Globally harmonized standards: Federal agencies should work with international counterparts and multilateral organizations on harmonized global standards.

Everything Wireless™

CTIA Mobile Minute™ Subscription

Get features on wireless products and services by email.
1400 16th St NW #600, Washington, DC 20036(202) 736-3200
Copyright © CTIA 2018. All rights reserved.

Get in Touch