Archives - Mobile Device


Don’t mix work and pleasure

If you work from home, request that your employer give you a dedicated work laptop or computer. Keeping work and personal data separate will reduce the risk of cross contamination or incidental slips that could lead to serious data breaches. Where possible, do the same with mobile devices; ask for a work phone or tablet […]

Be sure to lock all your mobile devices

You lock the front door to your house, and you should do the same with your tablets and smartphones. Employ strong passwords to lock down your tablet and phone. Securing your devices keeps prying eyes out and can help protect your information in case your devices are ever lost or stolen.

Repairing a broken device? Bring it only to certified repair shops

Smartphones, tablets and other mobile devices are loaded with information. Over time, they may be dropped, cracked or damaged in some way that may be repairable. Before taking them in for a fix, however, look for a certified repair service to do the job. After all, once your device is in their hands, your data […]

Have your devices go to sleep quicker

Password-protected PCs, Macs, tablets and smartphones all have limit points at which they lock their screens, requiring re-entry of the passcode or PIN. The time frame for relocking is changeable, but the safest option is to force anyone attempting to log in to re-enter the device password immediately. That way, you don’t have to worry […]

How to disable in-app purchases

The advent of the modern smartphone came with a slew of marketing with the slogan “there’s an app for that.” And it’s all but true: there’s an app for nearly any and everything. A lot of these apps come for the low, low price of free, but of course, there’s a catch. Free apps can […]

Lock your mobile device

The United States Computer Emergency Readiness Team (US-CERT) advises locking your device when you are not currently using it. You might only step away for a couple of minutes, but that’s enough time for someone to steal or destroy your information. Use strong PINs, passwords and biometric (fingerprints, facial recognition) to prevent others from opening […]