Archives - Smartphone


Know your options for remotely wiping a mobile device

Having your mobile device lost or stolen is never fun. You lose an essential instrument while also potentially putting your data in jeopardy, too. Services like Find My iPhone and software like Total Defense Mobile Security provide some remedy, since they allow you to remotely wipe the device, erasing all of its contents and settings […]

Safeguard your smartphone

Stay current with software updates by applying them as soon as they become available. Besides adding new features, updates also patch security weaknesses and fix other bugs that cybercriminals can exploit. Also definitely be sure to configure a passcode, along with other even more secure options such as a fingerprint or facial recognition scan, if […]

Use PINs and strong passwords on your mobile device

This is your first line of defense in the event of loss or theft. Set your phone to automatically lock after being idle and use a password manager to store all passwords. With just one master password, a computer can generate and retrieve all your other account passwords.

Wipe data on your old smartphone before you donate, resell, or recycle

Your smartphone contains personal data you want to keep private when you dispose your old phone. To protect your privacy, completely erase data off of your phone and reset the phone to its initial factory settings. Then, donate, resell, recycle, or otherwise properly dispose of your phone.

Do not modify your smartphone’s security settings

Do not alter security settings for convenience. Tampering with your phone’s factory settings, jailbreaking, or rooting your phone undermines the built-in security features offered by your wireless service and smartphone, while making it more susceptible to an attack.

Instead of connecting to public Wi-Fi, use your smartphone as a hotspot

Accessing the internet with your phone’s data is more secure than doing so with the public Wi-Fi offered at places like coffee shops and airports. Hackers can easily invade these networks and track all the activity that goes on in them. So when you don’t have access to a VPN, use your 4G, 5G, or […]