Skip to content

5000+ Great Articles

Best Articles & Essays: Interesting Articles to Read Online

  • 9 Little-Known Apple Music Tips you Need to Know General Software
  • Free Scan WiFi & Channel Scanner Software for Windows Tools Review
  • Best calculator phone case 2020 Mint
  • Will Deleting an Email on the iPhone/iPad Delete it on the Server? Help Desk
  • How to fix if iPhone calendar isn’t synced?, 11 Best Ways To Fix it iPhone
  • What Is UAC in Windows 10 and How to Disable It ? Windows 10
  • Best ti 30xs multiview calculator 2020

    Best ti 30xs multiview calculator 2020. 1 - Texas Instruments TI30XSMV TI-30XS MultiView Scientific Calculator, 16-Digit LCD Top Reviews

  • How to Lock Instagram with FaceID without Jailbreak? How-To

10 Smartphone Security Tips

Posted on October 6, 2020 By blog_786 No Comments on 10 Smartphone Security Tips

You’ve probably read a lot about hackers and how to keep your computer secure, but for some reason most people don’t really care about smartphone security.

Maybe because it doesn’t look like a traditional hard drive where you store all your documents, images, videos, etc., but today’s hyperactive smartphone users store a lot of information that is highly sensitive and that others, such as hackers, will gladly while you ‘re-browse the web at Starbucks.

Fortunately, smartphone security is gaining momentum, and there are quite a few things you can do to prevent your smartphone from being hacked. In fact, many of the measures you take to protect your computer can be used to protect your smartphone as well. If you have your own tips for protecting your smartphone, let us know in the comments.

1. Use passcodes everywhere

Whether you have an Android phone or an iPhone, you can deny access to your device by adding a passcode or lock combination on Android. This simple security measure can prevent others from seeing confidential information.

This is especially important if you have many applications installed that store personal data, such as financial apps (Mint, banking apps, etc.), Journaling apps (DayOne), note-taking apps (Evernote), etc. In some of these apps like Mint and DayOne, you can add a password specifically for that app, which I always do in addition to a home screen password.

The home screen password is important because many email apps (Mail on iPhone and Gmail on Android) don’t even have the ability to enter a password for your email. Emails can contain a lot of personal information, and since most people go to parties and leave their phones on tables and counters, it’s very easy for someone to find your stuff.

2. Protect your iCloud and Google account

Secondly, most people don’t realize that if someone can log into your iCloud or Google account, they can access a lot of data that you can create and edit from your smartphone. Currently, enabling 2-Step Verification on both accounts is a necessary inconvenience. I’ve written about how to secure your Google Account and how to properly configure your backup and restore settings for 2-Step Verification.

It’s kind of ridiculous, but your Apple ID basically controls access to all of Apple’s existing services, from iTunes to iCloud, FaceTime, iMessage, and more, etc., etc., your iPhone, iPad, and Mac remotely.

It’s the same with Google. Your Google account is used to sign in to all Google services, from YouTube to Gmail, Google Play, Google Maps, Google Calendar, Picasa, Google+, etc. Etc. Etc.

3. Avoid jailbreaking or rooting your smartphone

If you really know what you are doing and jailbreak or root for fun and enjoyment, then good for you. If you want to do this because you have heard about it in the news and want to be “free” of restrictions and limitations, then you should avoid this process altogether.

First, it can ruin your phone and cause you more grief than happiness. Secondly, you won’t be able to update your phone with the latest OS updates as it will be in an unsupported mode.

Yes, you can install some apps and tweak settings that you would not otherwise do, but that means you also download apps that might contain malware. You already have this problem on Android, as they are not as restrictive as Apple on what goes into the app store. This brings us to the next point.

4. Be careful with the applications you install

This is especially important on Android devices. Google recently removed 50,000 applications suspected of being malware. There will be no shortage of apps that contain malware, viruses, or other hidden software that can steal your data or damage your phone.

Apple’s app store also has this problem, but to a much lesser extent. Apple reviews every app before it is listed in the store and regularly removes apps from the store that are deemed to violate store policies.

Check out this article for an overview of how over 32 million Android devices were infected with malware in 2012 and how 95% of malware targets Android devices.

That’s ok if you hate Apple, but the point is, if you have an Android device, you have to be very careful when downloading apps. Check reviews, check if they have a website, do a Google search for app name, etc.

5. Use an app instead of a browser

If you are banking on your phone, trading stocks or anything else that transfers sensitive information between your phone and the Internet, it is better to use the official app for that site or company rather than opening it through the browser on your phone.

For example, Chase, Bank of America, Vanguard, ScottTrade, Mint, and many other major financial institutions have their own iOS and Android apps. Secure connections are also supported in smartphone browsers, but you’ll be safer if you get the official app, which may have additional security features.

6. Control what the app can access

You’ve probably seen the following message on your iPhone hundreds of times:

There are all sorts of messages “AppName wants to access your data.” The data can include photos, location, contacts, etc. Always be careful and don’t just click OK all the time. If you click on something all the time, it’s best to just select “Don’t Allow,” and if you really can’t use the app later, you can manually go back and change it to allow access. Most of them are legitimate requests and will not cause any harm, but it is better to play it safe.

It’s even worse on Android because some apps will ask for permissions for everything, even if they don’t need them. You can read this Lifehacker post on how to protect yourself from Android apps that ask for too many permissions. Android also has a lot more permissions than iOS, so again, you need to be more careful if you’re an Android user.

7. Keep a backup copy of the data

Backing up your smartphone is a good idea, not only in case you drop it in the toilet, but also in case of theft when you have to wipe it off remotely. Apple users can install the Find My iPhone app, which allows you to remotely lock and erase your phone if you know it’s stolen.

If you don’t have backups of your data, you will lose them all if stolen. If you back up locally or in the cloud, you can wipe your phone data and get all your data back to your new phone. You can sync your smartphone with your computer using iTunes, or create a cloud backup via iCloud.

Android has a built-in backup tool, but it doesn’t back up everything on your phone like iOS does. Instead, you’ll have to rely on third-party apps in the Google Play store for complete phone backups. Note that Android also has a remote wipe feature, but it needs to be configured first by installing certain apps.

8. Report your stolen phone

A database of stolen phones has been created over the past few months and is used by major wireless carriers. You can report a phone stolen and it will prevent someone from connecting to the carrier and using data or minutes.

If they try to erase it, replace the SIM, etc., it still won’t let them activate any of the carriers because of the serial number. You can visit the following pages to report theft of your smartphone and to prevent the thief from connecting to any wireless carrier:

AT&T, Verizon, Sprint, T-Mobile

9. Update the operating system

Just like you need to constantly install Microsoft security updates for your PC, it is recommended that you install the latest updates for your smartphone. You can wait a few days and make sure there are no major issues with the update such as reduced battery life, etc., but if nothing stands out, update your phone.

Apart from updating the OS, it is also recommended that you update the applications installed on your phone. It’s amazing how many smartphones I’ve come across with 10, 20, 30+ apps with updates for which none have been installed. These updates may include new features, but many of them are bug fixes, performance updates, and security fixes.

10. Wireless and bluetooth

When you are not at home, your best bet is to try to turn off wireless and Bluetooth completely and use a 3G or 4G connection whenever possible. The moment you connect to an unreliable wireless network, you are open to hackers looking for victims over the network. Even if you are not involved in banking or any other business related to sensitive data, a hacker may try to connect to your smartphone and steal data, etc.

When it comes to Bluetooth, hacking is not that common, but it is gaining in popularity as people start to use this technology in more than just headphones. You now have a watch connected to your phone via Bluetooth, fitness bracelets, and a whole host of other gadgets. If Bluetooth is enabled and discoverable, it gives hackers another way to see the data transferred between the Bluetooth device and your phone.

Hope these tips will help you in the unpleasant event that your phone is lost or stolen. I personally had to wipe my iPhone because I lost it and later realized that someone was using apps and data connection. This will definitely not happen again, even if my phone is lost or stolen, because I took care of its maximum protection. If you have any other tips for protecting your smartphone, let us know in the comments. Enjoy!

–

Share this:

  • Twitter
  • Facebook
Smartphones

Post navigation

Previous Post: 5 Tech Happenings to Look Forward To in 2013
Next Post: Best Online Buying Guides to Consult Before Making a Purchase

Related Posts

  • Bots That Will Instantly Make Your Facebook Messenger More Useful Smartphones
  • How to Record Internal Audio and Video on an Android Smartphone Smartphones
  • Generate a Verification Code for Apple Two Factor Authentication Smartphones
  • How To Kid-Proof Your Android Mobile Device Smartphones
  • best app to read books for free 2022 Smartphones
  • How to Type the Tilde Symbol on Android, iPhone, and iPad Smartphones

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • November 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • March 2021
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • December 2019
  • July 2019
  • May 2019
  • April 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018

Categories

  • AI Tools & Guides
  • Amazon Web Services
  • Apple Watch
  • Computer Tips
  • Cool Websites
  • Featured Posts
  • Free Software Downloads
  • Gadgets
  • Gaming
  • General Software
  • Google Software/Tips
  • Hardware
  • Help Desk
  • How-To
  • iOS
  • iPad
  • iPhone
  • islamic Books
  • Linux
  • Linux Tips
  • Mac OS X
  • macOS
  • MS Office Tips
  • Networking
  • Office Tips
  • OS X
  • Product Reviews
  • Reviews
  • Safari
  • Smart Home
  • Smartphones
  • Software Reviews
  • technology
  • text
  • Tools Review
  • Troubleshooting
  • Tutorials
  • Uncategorized
  • Urdu Books PDF
  • Web Site Tips
  • Windows
  • Windows 10
  • Windows 7
  • Windows XP Tips
  • Wordpress
  • Here are the Top 10 highest paid YouTubers of 2017
  • Protect Your Facebook Account From Hackers (2017)
  • 4 Ways to Share WiFi Without Giving Away Your Password
  • How to Get 2 Free Audiobooks From Audible Trial Instead of 1
  • 10 Things to Check Before Publishing a YouTube Video
DMCA.com Protection Status

Recent Posts

  • Here are the Top 10 highest paid YouTubers of 2017
  • Protect Your Facebook Account From Hackers (2017)
  • 4 Ways to Share WiFi Without Giving Away Your Password
  • How to Get 2 Free Audiobooks From Audible Trial Instead of 1
  • 10 Things to Check Before Publishing a YouTube Video

Recent Comments

  1. This Simple Trick Lets You Play YouTube in the Background on iOS on YouTube Not Working? Here Are Quick Fixes To Try
  2. How to Bypass Chromecast DNS and Circumvent Geo Blocking on 5 Cool Websites to Find Good Movies and TV Shows on Netflix
  3. 5 Cool Websites to Find Good Movies and TV Shows on Netflix on check netflix video quality internet explorer
  4. SmartDNS vs VPN “What’s the Difference?” on How to Watch Apple TV on Roku
  5. How to go Back to the old YouTube Layout (2013) on 10 Things to Check Before Publishing a YouTube Video
  • 12 Best VR Apps For Android Smartphones
  • How to Make a Scatter Plot in Google Sheets 2021 Google Software/Tips
  • How To Download Vimeo Videos From the Mobile App? Computer Tips
  • 5 iOS Apps That Are Guaranteed To Improve Your Sleep iOS
  • Fix Active Directory 1818 Error during DCPromo Active Directory
  • How To Set Up Steam Link to Stream Games Gaming
  • Switching from Mac to Windows? What You Need to Know How-To
  • How to Quickly Create Keyboard Shortcuts in Ubuntu How-To

Copyright © 2023 How To Blog.

Powered by PressBook News WordPress theme

Go to mobile version