ย
Technology has become, not only our means of communications verbally: but now it has become the life line that keeps our schedules, important dates, and important information. What is more important is keeping this information safe from hackers. Like all things, they should be used responsibly. In order to keep your information safe, and your family safe, take these precautions. Do your research on a device that you are looking into buying. Seven ways you can keep your information safe while using your device.
1. Enable Encryption: on every device you own make sure the Encryption is turned on, and use the security controls. A lot of times this step is not taken serious enough.
2. Use Authentication. This is your own personal password for your device. Remember to use a phrase, numbers upper case letters. Also important to make sure it is a different password from all other websites, or devices.
3. Choose your 3rd party applications: Control any 3rd party apps. Apps are one way you can allow hackers into your device. Be careful, make sure you read all the information before adding, including the providers privacy policy. If privacy policy is unclear or non existent for an application, either do not install this application or provide minimum required permissions (below) to this application.
4. 3rd party applications permissions: Be very selective is providing minimum required access to third party applications. Access to your contacts, you location, calendars, photos and many other sensitive data can be selectively provided to your application. Make sure you provide what is most needed and disable any access that you provided unintentionally or for temporary purposes. It is not a bad idea to review your applications and delete/uninstall applications that you needed for a short time (such a conference application or a hotel application that you used while overseas).
5. Keep a clean device: Regularly clean your browser cache, cookies, session data and also regularly remove applications, files, certificates that are stored on your device. This will be a good way to get rid of information that is on your device that can possibly be misused or abused by either software or by someone who physically manages to steal your device.
6. Backups and testing your backups: Backup your phone and mobile device with a reliable software and test your backups for a safe restore. If you see any strange behavior with your mobile device, attempt to rollback to the best backup you have and thus test your backup for reliable restoration.
7. Lost Cell Phone service: If your provider has an option for “Lost Cell Phone” service, choose this plan. Be well aware of the procedure for reporting your lost cell phone. If you loose your cell phone while traveling international, ensure you either have “Remote / Self Wipe” capability or the ability to lock down your device in case it is reported lost of stolen. Many service providers and device providers have their own software / plans for this type of service.
Mobile devices are not a bad thing to have. They help up schedule our days, keep important dates, and get information faster to employees. But like anything else, they should be used responsibly.
PSMail Quicktips: Mobile technology has become far more than just a convenient way to talk with one another: it has become our most indispensible tool. With it we organize our schedules, store our entertainment, manage our finances, connect with our social network, and…well, nearly everything we do can have some connection to mobile technology.
Which is all the more reason to be concerned about hackers and other nefarious threats. Here are seven way you can keep your information safe while using your device.
1. Enable Encryption: One step that is often overlooked is simple: make sure encryption is turned on for every device you use, and use the available security controls.
2. Use Authentication: This is your own personal password for your device. Remember to use a phrase, numbers, and/or uppercase letters to ensure that the password is secure. Also, make sure you use a unique password for your device, not one you use on other websites/services.
3. Choose Your 3rd Party Applications Carefully: Control any 3rd party applications. Apps are one way hackers can gain access to your device. Make sure you read all the information on an app before using it, including the provider’s privacy policy. If the privacy policy is unclear or non-existent for an application, then either don’t install it at all or provide only the minimum required permissions (see below).
4. 3rd Party Applications Permissions: Provide only the minimum required access to third party applications. Some apps request access to your contacts, location, calendars, photos and other sensitive data. Make sure you provide only what is necessary, and disable any access that you might have provided unintentionally or for temporary purposes. It’s not a bad idea to review your applications and delete/uninstall apps that you only needed for a short time (such as a conference application or a hotel app you used while overseas).
5. Keep a Clean Device: Regularly clean your browser cache, cookies, and session data, and routinely remove applications, files, and certificates that are stored on your device. This is a good way to eliminate unnecessary information that might be hacked by software or by someone who physically manages to steal your device.
6. Backup Your Device and Test Your Backups: Backup your mobile device with reliable software, and test your backups for a safe restore. If you see any strange behavior on your mobile device, attempt a rollback to your best backup, thus testing your backup for reliable restoration.
7. Lost Cell Phone Service: If your provider has an option for “Lost Cell Phone” service, use it! Be well aware of the procedure for reporting your lost cell phone. If you lose your phone while traveling internationally, make sure that you have either remote/self wipe capability or the ability to lock down your device remotely. Many service and device providers have their own plans in case of a lost cell phone.
Mobile devices provide innumerable resources as we organize and structure our lives. But with great power and dependence comes great danger. Protect yourself by taking the necessary precautions.
ย
ย