Hey, nice phone!

It’d be a shame if something happened to it.

You probably already got a nice case for it–no one wants a cracked screen, right?

But you can do more to protect your phone.

Here are 5 easy ways to defend your favorite piece of tech (and yourself). Plus, learn to identify the signs that your phone has been compromised.

Don’t Use Facial Recognition

We’ve all seen the latest phone unlocking methods that require a look or a tap of a finger. They’re quick, convenient, and unfortunately, can compromise your privacy and protection. For one, hackers (or your brother) may be able to beat the system. Additionally, biometric measures do not require your consent, merely your presence to unlock your phone. Set a PIN number password and stay safe.

Location, Location, Location

GPS can be a lifesaver when you’re hunting for that Krispy Kreme store. It’s also a security risk because it allows your smartphone to track all of your personal movement patterns. If your phone is stolen and compromised, the criminal will have access to your location history which may allow them to target your office or home. Deactivate your location settings and only turn them on when you need them – to hunt down doughnuts, for example.

Lock Down your SIM Card

Select the security option to “Lock SIM Card” to password protect your SIM card. The SIM card is your connection to the cell network and if improperly secured, can open your device up to exploitation.

Turn Off Your “Hack Me!” Sign

Bluetooth, hotspots, tethering, and other connection methods are fantastically useful. They also make your device vulnerable to hacking. Disable your Wi-Fi, Bluetooth, and other connections when they are not in use. Otherwise, you may be putting a target on your back for hackers and cybercriminals.

Wi-Fi: Proceed With Caution

As a bonus, this security tip applies to more than just your smartphone!

Wi-fi networks are a prime entry point for hackers and cybercriminals.

At home, you should always maximize your security settings

Please don’t use “password” as your password! You should also monitor your network usage often to ensure un-friendly users are not connecting.

In public, be cautious

Avoid connecting to unsecured networks and always ask a human for the login details. Hackers will often set-up unsecured WiFi networks in public places. While they may appear safe, they’re actually reviewing information unknowing users pass over the trap network.

How do you know your device or network has been compromised?

Indicators that your device or network has been exploited include:

Slow or dropped connections

This may mean your network is being accessed by more users than normal.

Loss of control of the network

Can’t log in to your network? Disconnect the network from the internet then perform a reset.

The network has a mind of its own

New, unexpected software or altered settings are a big warning sign that should not be ignored.

Protecting yourself and your privacy while on the go isn’t difficult. Being proactive goes a long way.

Was this post helpful?
Let us know if you liked the post. That’s the only way we can improve.
Yes179
No4
Powered by Pixelbart