Facebook Twitter Instagram YouTube LinkedIn
    Facebook Twitter Instagram LinkedIn YouTube
    Trending
    • IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’
    • Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases
    • BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles
    • Security Automation Cuts Down Expenses and Saves Time for IT Teams
    • IBM Think 2022 – Embracing the Present, Preparing for the Future
    • A Game of Numbers: The Correlation Between Technology and Sports Betting
    • Software-based Enterprise Solutions for Navigating the “Too Much Information” Age
    • A Look At The Last Generation Of Internal Combustion Engines
    TechSpective
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    • Technology
      Featured
      March 1, 20216

      Could Home Study Be Better for Education? Using Technology to Craft a Better Tomorrow

      Recent
      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

      May 15, 2022

      A Look At The Last Generation Of Internal Combustion Engines

    • Reviews
      Featured
      March 4, 20211

      Dell’s UltraSharp 40 – Improving Work and Workplaces with Monitor Innovations

      Recent
      April 7, 2022

      Dell’s Latitude 5430 Rugged – Redefining the Extremes of Mobile Computing

      October 12, 2021

      Innovating Home Video Conferencing: Dell’s New 27 Video Conferencing Monitor – S2722DZ

      September 22, 2021

      Review: Intrusion Shield

    • Podcasts
    • Security
      Featured
      March 7, 20212

      Pandemic Unmasks Vulnerability to Automated Bot Attacks

      Recent
      May 23, 2022

      IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’

      May 14, 2022

      Ransomware is Indiscriminatory – Prepare for Everything to Fail

      May 5, 2022

      Cybersecurity Myths that are Compromising Your Data and How to Address Them

    • Microsoft
      Featured
      September 12, 20201

      The Microsoft Surface Duo: The Communications Device for Those That Think Different

      Recent
      April 8, 2022

      AI and Why Windows 12 Could Be a Far Bigger Advance than Windows 95 Was

      October 11, 2021

      The Surface Laptop Studio: Building a Windows 11 Targeted Laptop

      August 28, 2021

      Why Microsoft’s Hardware Baseline for Windows 11 Is Important

    • News & Analysis
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

      May 20, 2022

      IBM Think 2022 – Embracing the Present, Preparing for the Future

      May 14, 2022

      Apple vs. Dell: Choosing Which Company to Work For

    • Business
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      Security Automation Cuts Down Expenses and Saves Time for IT Teams

      May 18, 2022

      Software-based Enterprise Solutions for Navigating the “Too Much Information” Age

    TechSpective
    You are at:Home»Mobile»Android»5 Smart Ways to Protect Your Phone and Maintain Your Privacy
    smartphone privacy security
    Image from Pixabay

    5 Smart Ways to Protect Your Phone and Maintain Your Privacy

    3
    By Daniel DeCloss on January 23, 2018 Android, Encryption, iOS, Mobile Threats, Privacy, Smartphones

    The smartphone in your pocket (or your hand, if you’re reading this on your phone) has become something few of us can live without. It is a powerful tool that offers a wealth of information and utility right at our fingertips.

    But there’s a dark side: with that power and function also comes privacy and security risks. More likely than not, you’ve been affected by a data breach that impacts your private information. While these are not entirely within your control, there are a few steps you can take to protect your phone and help maintain your privacy:

    1. Always use a passcode or enable fingerprint login

    If you leave your phone at the restaurant or coffee shop, someone could access your email, contacts and banking app with a simple click. There’s an easy way to help prevent this: Add a passcode or passphrase to unlock your phone.

    Some phones now have a feature that lets your fingerprint unlock your phone, which can be a convenient way to ensure nobody but you can access your sensitive information.

    Here are some links to help you get these set up. To use your fingerprint, your phone model must support that feature.

    • iOS: https://support.apple.com/en-us/HT204060
      https://support.apple.com/en-us/HT201371
    • Android: https://support.google.com/android/answer/2819522?hl=en
    • Enable Fingerprint Unlock on Google Nexus: https://support.google.com/nexus/answer/6285273?hl=en

    2. Limit location settings

    Your phone has a way of always knowing where you are. This is really important, especially for emergency calls so the dispatcher can pinpoint your location. The unfortunate side is that the apps on your phone may start broadcasting your location to lots of different people or services. The fewer people you trust with your location, the better. Try turning off location settings for all apps unless there’s a really good reason to keep them.

    Here’s how to do it:

    • iOS: https://support.apple.com/en-us/HT207092
    • Android: https://support.google.com/nexus/answer/6179507?hl=en

    3. Allow for remote wipe

    This is one of the useful location tracking services. If you lose your phone, each phone provider has a method for tracking it down and remotely wiping it clean. This means you can rest assured that any data on your lost or stolen phone will not fall into the wrong hands.

    Here’s how to do it:

    • iOS: https://support.apple.com/kb/PH19300?locale=en_US
    • Android: https://support.google.com/accounts/answer/6160491?hl=en

    4. Don’t store passwords in your browser

    Nowadays, all major browsers prompt you to save your password, credit card and lots of other private information. It can be useful, but if your phone is lost or stolen and you haven’t enabled secure login or a remote wipe, your passwords may end up in the wrong hands. Try using a password manager like LastPass or 1Password instead.

    Here’s how to do it:

    • iOS: Settings -> Safari -> AutoFill -> Names and Passwords (Slide to off)
    • Android: https://support.google.com/chrome/answer/142893?co=GENIE.Platform percent3DAndroid&hl=en

    5. Back up your phone, and—while you’re at it—encrypt it

    The best way to ensure you don’t lose data is to back up your phone, and often. Take the extra step to keep your information private and encrypt the backup.

    Here’s how to do it:

    • iOS: https://support.apple.com/en-us/HT205220
    • Some Android phones may have different encryption and backup settings. Here are articles for Nexus and Pixel. For others, check the Security options in the Settings app:
      • https://support.google.com/nexus/answer/2844831?hl=en
      • https://support.google.com/pixelphone/answer/7179901?hl=en

    Stay cybersafe out there!

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleNew Year’s Resolutions: Putting Cybersecurity at the Top of Your List for 2018
    Next Article What Makes a Good Apple iOS App?
    Daniel DeCloss
    • Website
    • LinkedIn

    Daniel is director of cybersecurity for Scentsy, Inc. He has over ten years of experience in computer security, penetration testing, computer forensics, incident response, and programming. Daniel also has a passion for security and helping clients address their security needs and concerns.

    Related Posts

    Hybrid Working in the Age of Cloud and Open Source Security

    Surefire Ways to Boost PC Cybersecurity

    Lisa Plaggemier Discusses Cybersecurity at the Winter Olympics

    3 Comments

    1. Stephen muthee on November 6, 2018 7:40 pm

      That’s a very nice information,to educate someone , thanks!!

    Site Sponsors
    Intel
    DevOps.com
    Adobe
    PopSpective
    • Technology
    • Popular
    • Top Reviews
    May 20, 2022

    Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

    May 20, 2022

    BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

    May 15, 2022

    A Look At The Last Generation Of Internal Combustion Engines

    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    9.7
    November 16, 2018

    Review: BlackVue DR900S-2CH Vehicle Dash Cam

    9.5
    September 2, 2015

    Review: Microsoft Band

    May 27, 2014

    Protect your family photos with ScanMyPhotos

    Coffee and Politics
    Popular Posts
    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    PopSpective
    PopSpective
    Adobe
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    About

    TechSpective covers technology trends and breaking news in a meaningful way that brings value to the story, and provides you with information that is relevant to you. We offer in-depth reporting and long-form feature stories, as well as breaking news coverage, product reviews, and community content in plain English terms, and with a unique perspective on technology.

    Coffee and Politics

    © 2020 Xpective, Inc.

    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact
    © 2021 Xpective, Inc.
    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact

    Type above and press Enter to search. Press Esc to cancel.