Archives - Mobile Security


Eliminate those pesky unwanted calls by screening them

If you’ve got too many unwanted calls, you can do something about it! Many Android devices have the ability to screen calls already built in through the Phone and Google Assistant apps. When you activate this service, every caller has to go through a prompt before connecting to you. This prompt can be customized to […]

Back up your camera photos

There are many services that can back up your camera storage to the cloud to preserve your memories even if you lose access to your phone. They often offer paid plans with higher storage caps if you have a large amount of content you want to save. These services also offer additional features such as […]

Replace your phone when the security update period runs out

All smartphones have a limited period of time until they’ll stop releasing security updates for the device. Look up how long those periods are for your model. Most devices have three-year cycles, but some have up to five years. Once your security patches run out, you’ll be vulnerable to new threats.

Double-check two-factor authentication before switching your phone number

If you switch your phone number, make sure to update any two-factor authentication (2FA) services you use. As many 2FA processes are based on the phone number, you won’t be able to access your accounts after the number is changed. It’s recommended to use an authenticator app or a trusted device for your 2FA needs, […]

Disable Bluetooth when it’s not being used

Bluetooth can be an exceptionally useful wireless technology when connecting a range of devices including earbuds, microphones or personal vehicles. However, leaving Bluetooth on all the time, especially if you frequent public areas, can be a security risk. Turn it off when you’re not using it, and only turn it back on if you’re sure […]

What’s multi-factor authentication (MFA)?

Multi-factor authentication is a type of authentication that requires multiple pieces of evidence to validate a user’s identity. It typically involves up to three factors – something the user knows (like a password or PIN), something the user has (such as a security token or cellphone), and something the user is (a biometric characteristic, like […]