How to Take Advantage of Encryption in Bluetooth
People should use the strongest Bluetooth security mode available for their Bluetooth devices e.g. wireless headset, printer, USB adapters, or mobile phones. It is important to use the above-mentioned 2, 3, or 4 security modes to prevent threats.
Authenticate the connections made by a Bluetooth device to not to allow other Bluetooth device using your connection or accessing the device. When entering the PIN code, use 8 or more characters to authenticate.
The most important security feature in using Bluetooth is the use Simple Sharing Pairing (SSP) to pair allowed or trusted Bluetooth-enabled devices.
Keep Bluetooth software and drivers up-to-date to take advantage of product improvements and security fixes. It’s also recommended to stop using a non-supported or not secure Bluetooth-enabled devices or module, e.g. Bluetooth 1.0 and 1.2.
A Bluetooth software setting is important to configure by not allowing any computers to connect to the computer unless you are expecting an incoming connection from other Bluetooth-enabled devices. It’s also important to not to make it discoverable so hackers or intruders scouring the area will not find the unused Bluetooth connection.
If your Bluetooth software provides an option to limit the device visibility, take advantage of it. The image below is an example option that Nokia N8 smartphone provides where you can temporarily show the device for other device to receive or send data: