The widespread use of mobile devices in everyday tasks results in personal information such as bank details, photographs, messages, contacts, emails and a long list of private information being moved from one place to another in the pockets.
How to prevent problems in case of loss or theft
Through these simple tips you can improve the security of smartphones and protect personal information, so attractive to cyber criminals.
Set up a PIN on the SIM card
The PIN number is the identification code that allows access to telephone calls and the use of mobile data by telephone companies.
You can configure a PIN with a value between 4 and 8 digits (it is recommended to choose the latter) and use a sequence of numbers that is not easily decipherable by avoiding passwords of type 1234, 1111, 1122, etc …
Establish an access code
In order to avoid unauthorized access to the devices and therefore, all personal information is recommended to have an access code configured for the lock screen.
Depending on the model of the device, different blocking methods can be set: pin, patterns, biometric detection and password (combination of alphanumeric characters).
It is also advisable to configure the automatic blocking to activate after a short period of inactivity and thus prevent access to personal data without authorization in case of theft or loss.
Download applications from the official site
There are platforms and web pages that can be infected with ‘malware’ and that allow the download of applications. To minimize the chances of infection, it is advisable not to install ‘apps’ from unknown sources on mobile devices and do so from official sites , Google Play in the case of Android and App Store for iOS.
Manage permissions in applications
Many of the applications installed in mobile devices require permissions to be able to work, but you must check what type of permissions they request and use common sense to determine if it is within reason in relation to the function of the application.
If when reviewing the permissions of an application before installing it, it requests more permits than necessary, it is preferable not to install it, surely there is another alternative that requires only the necessary permissions.
From the ‘smartphones’ you can manage the permissions, so it is advisable to disable those that are unnecessary and review them periodically.
Enable localization and connections only when using them
It is advisable to keep both the location function and the ‘Bluetooth’ of the devices disabled whenever they are not being used in order to protect privacy.
Similarly, it is advisable to check the location and privacy settings of social networks and keep disabled the options that allow automatic localization in each application installed on the “smartphones”.
Wipe Wi-Fi history periodically
It is advisable, in order to avoid unintentional connection to untrusted wireless networks, eliminate from the history of known connections all those that are not used regularly and check it regularly.
Likewise, caution should be exercised when connecting to public networks and not sending personal data or sensitive information through them.
Use an antivirus
If the mobile device works with the Android operating system it is advisable to have an antivirus installed to improve security. On the OSI website you can find free antivirus for the devices.
For iOS users the risk of viruses is lower, since it does not allow downloading applications outside the App Store, as long as the jailbreak process has not been carried out – a method to bypass the security measures imposed by Apple on its iOS system and be able to install, modify and change anything in the system.
Keep up to date
Updates of operating systems usually correct security problems, therefore, it is advisable to update the devices after notification of the existence of a new version.
Also, to avoid being exposed to known vulnerabilities that can be used by attackers, you must keep the applications updated to the latest version.
Make backup copies Making backup
Copies of the devices guarantees not to lose information in case of loss or theft of smartphones.
And when changing mobile devices, it is advisable to proceed with the deletion of all personal information stored in the ‘smartphone’ once it is no longer used, especially if it is going to be sold or given away to a third party, in order to protect both personal data such as privacy.
Devoting time to the security settings of mobile devices is an investment that avoids problems and allows you to enjoy them in a much more secure way.