HomeContact
Cultural and Creative
Data Protection
Raphael M
Raphael M
July 18, 2021
2 min

You should protect your identity and your mobile data

Secure

BTP

Mobile device make your life easier; everything you need to contact friends and family, manage finances and juggle your personal and professional lives is at your fingertips. But what if that information were to fall into the wrong hands? Then, scammers and thieves would have everything they need to drain your bank accounts and steal your identity. To keep your smartphone and tablet safe from such prying eyes, follow these safeguards.

Protect

PROTECT

Always password-protect your mobile device, use the auto-lock security feature, and activate the encryption feature (if its built in), advices Jack Key, chief information security officer for USAA, a financial services provider for military families. When creating a password, choose one that’s easy for you to remember but will be difficult for others to guess. And make sure the auto-lock feature is turned on so it will kick in after a couple of minutes. That helps ensure no one will be able to use the phone or tablet without knowing your password. The operating system on many tablet PCs are more advanced security measures may be available. To encourage the return of a lost device, consider writing or engraving your name and contact information. But not your password on its back.

DATA PROTECTION

Privacy

Only store the information you’ll need quick and frequent access to your mobile device to Outlook or another email application may automatically synchronize any notes in your contacts database, so pay attention to what you have on those fields. Also keep a separate record of your phone’s basic data, including all account numbers, passwords, phone, numbers, addresses, and any other sensitive information, as well as the device’s make, model and serial number, in case it’s ever lost.

BYPASS

Account Bypass

Bypass limitations imposed by the manufacturer or mobile carrier, can open your phone to viruses and Internet scams without your knowledge, Key warns. The only way to remove these harmful software threats, known as malware is to completely wipe your data and revert it to its original factory status. Just because you haven’t bypassed limitations, just because your phone isn’t jailbroken, doesn’t mean you’re immune from risk. Apple says it rejects more than 100 spyware-infested or phishing-laden applications every day. The risk is even greater with Android, because these apps are not always thoroughly vetted before they go on sale, so beware of all apps downloaded from outside the Android Market. Most tablets are thought of as overgrown smartphone that can be used for browsing the Web, viewing videos and playing games. They require the same amount of security foresight, yet few users secure them with a password. Because tablets are fully usable without a smartphone plan, they are easier to resell on the black market. Tablets are used for mobile banking, mobile investing and online shopping, so letting this device fall into the wrong hands is as disastrous as losing a phone or a laptop.

SENSITIVE DATA

Database

Among the most sensitive piece of data on your computer, tablet or phone is your contact list. Filled with personal information about hundreds or thousands of poeple, many contact databases also contain account information, passwords and sensitive information. Did yoy know many third-party apps can access your contact list? If you use Android phone, you will be notified if an app you install requires permission to access your contacts.

SHIELD

Sensitive Data

Call your provider to report the theft. File a police report (if you know it’s been stolen) Place fraud alerts on your credit reports. Notify anyone whose contact or other information is stored in your phone.

Data Wipe

-Consider using a system called remote wipe capability (if available) to prevent access of your personal information. This gives you the ability to send a command to the device that delete your data.


Tags

#Phishing#Cybersecurity#Data#Protect

Related Posts

POS design (Point of Sale) or POP design (Point of Purchase)
July 20, 2021
7 min