Sunday, August 24, 2014

8 Ways to Protect Your Smartphone

Failing to protect your smartphone or tablet leaves your personal information vulnerable to thieves and hackers. Your personal information may be used to obtain credit, access bank accounts or make fraudulent purchases. These tips are designed to help you secure your smartphone or tablet and protect your personal information.
  1. Set your phone to automatically lock when not in use. Leaving your phone unlocked is asking for trouble. If your phone or tablet is stolen or misplaced, keeping it locked will help protect your data. Some phones and devices can be configured to delete all stored data when an incorrect password is entered multiple times.
  2. Use strong passwords and update them on a regular basis. Secure passwords include numbers, symbols, lowercase and capital letters. You should not use your name or other easily identifiable information such as a street address or birth date in your password. Do not use the same password for all of your accounts. It is also important to periodically update your passwords.
  3. Beware of free open Wi-Fi hotspots. Configure your phone to only join networks you approve. Scammers sometimes set up free wireless networks in public places to lure users to log on. Joining the network could allow the scammer to track data going to and from your phone.
  4. Update your device's software. Hackers are continually looking for new security flaws to exploit. Many software updates include important security patches that repair known flaws. Failing to update your software or apps may leave you vulnerable to hackers.
  5. Location and anti-theft applications may help you locate a lost phone or deactivate a stolen phone. There are a wide variety of apps that help users locate a lost or stolen phone. Some apps allow you to delete data remotely or completely disable the device. Check reviews and specifications carefully and test the software before your phone is lost or stolen so you know how to use it when the time comes.
  6. Only download reviewed and tested applications. Some apps and websites may include malicious software designed to capture your personal information. Read reviews and research new apps before installation.
  7. Use encryption to protect sensitive information. If you use your phone or other mobile device for particularly sensitive business or financial communications, talk to your IT professional about using encryption to protect your data.
  8. Report your device as lost or stolen. In an effort to curb the rising rate of smartphone theft, some mobile carriers track stolen phones and tablets. Tracking systems only work when thefts are reported. While you might not get your phone or tablet back, these systems can help disable the growing black market for stolen devices. You should also report any theft to your local police department.

No comments:

Post a Comment

LegalShield Product Overview