Archives - Mobile Device


Be cautious when public charging mobile devices

Avoid connecting your smartphone to any computer or charging station that you do not control, such as a charging station at an airport terminal or a shared computer at a library. Connecting a mobile device to a computer using a USB cable can allow software running on that computer to interact with the phone in […]

Transfer the Google Authenticator app to a new Android device

Nobody holds onto the same smartphone forever. If you use Google Authenticator and you need to transfer permissions to a new device, open your app on the old phone. Select the vertical ellipsis menu in the upper right corner, and then click “Transfer accounts.” Tap “Export accounts.” The app will generate a QR Code that […]

Use PINs and strong passwords on your mobile device

This is your first line of defense in the event of loss or theft. Set your phone to automatically lock after being idle and use a password manager to store all passwords. With just one master password, a computer can generate and retrieve all your other account passwords.

Protect your eyes from excessive screen time

Spending a lot of time at the desk or staring at a mobile device can lead to eyestrain. Try to situate your workstation in a place that allows you to take breaks where you can look far away while also being protected from excessive glare. Use keyboard shortcuts to zoom in and out. That’s “Ctrl” […]

Don’t store sensitive data in the Notes app

Do you keep credit card numbers or log-in credentials in the Notes app on your iPhone? If so, you’re at risk of having your identity stolen by someone else who has access to your phone. Use iCloud Keychain instead.

Accept updates and patches to your smartphone’s software

You should keep your phone’s operating system software up to date by enabling automatic updates or accepting updates when prompted from your service provider, operating system provider, device manufacturer, or application provider. By keeping your operating system current, you reduce the risk of exposure to cyber threats.