Archives - Mobile Security


Enable Security Features to Protect and “Find My Phone”

Misplacing or having your devices stolen can put a damper on vacation plans. It can easily happen to anyone. Set up the “find my phone” feature on your devices. This will allow you to find, remotely wipe data and/or disable the device if it gets into the wrong hands. Make sure all devices are password […]

Turn off your iPhone’s lock screen notifications

Even if you have a super advanced password, sensitive information can still be revealed via lock screen notifications. You could get an email from your doctor with a confirmed appointment time or a text from your friend giving away their address. If someone untrustworthy is near your iPhone when notifications like these pop up, that […]

Wipe data on your old smartphone before you donate, resell, or recycle

Your smartphone contains personal data you want to keep private when you dispose your old phone. To protect your privacy, completely erase data off of your phone and reset the phone to its initial factory settings. Then, donate, resell, recycle, or otherwise properly dispose of your phone.

Set PINs and passwords on your mobile device

To prevent unauthorized access to your phone, set a password or Personal Identification Number (PIN) on your phone’s home screen as a first line of defense in case your phone is lost or stolen. When possible, use a different password for each of your important logins (email, banking, personal sites, etc.). You should configure your […]

Backup and secure your mobile data

You should backup all of the data stored on your phone – such as your contacts, documents, and photos. These files can be stored on your computer, on a removal storage card, or in the cloud. This will allow you to conveniently restore the information to your phone should it be lost, stolen, or otherwise […]

Only install apps from trusted sources

Before downloading an app, conduct research to ensure the app is legitimate. Checking the legitimacy of an app may include such thing as: checking reviews, confirming the legitimacy of the app store, and comparing the app sponsor’s official website with the app store link to confirm consistency. Many apps from untrusted sources contain malware that […]