How to protect your device and yourself

August 13, 2019
empty

If you’ve ever misplaced your phone and thought that it was lost or stolen, you’ll know the anxiety it causes. The prospect of having lost your contact list and the thought of someone having access to your photo gallery and banking apps is enough to drive you to the edge. Here are some useful tips to help you protect your data:

Use auto-lock and a passcode
It’s possible to lock most devices using a passcode or some sort of biometric feature. These are increasingly easy to use on the latest phones but if yours doesn’t utilize this technology, try to add a similar feature. Failure to password protect your device leaves your contacts, text messages, emails, and social networking accounts open to anyone.

Back up information
Get into the habit of regularly backing up your device so that it is stored in the cloud. This makes it accessible to you even if your device is stolen. Your service provider can also access your data if you are unable to restore it yourself. If you’re not tech-savvy and prefer to adopt an old-school method of recording your data like keeping a written copy of contacts somewhere or whether you can download to external hard drives or save to the cloud, it doesn’t matter. The ultimate goal is to have a backup when you need it.

Consider tracking software
Most mobile phones and other digital devices offer basic tracking and remote protection software, but it must be installed and configured in order for it to work. If your phone doesn’t come with a “kill switch,” or you want something with more safety features, consider something like Norton Mobile Security, which gives you the ability to lock and wipe your mobile phone if stolen or lost.

Don’t save passwords to your browser
When you visit password-protected websites, take the time to type in the password. Otherwise, a thief could access sensitive information simply by unlocking your phone. It may seem tiresome to enter your password every time, but the extra effort could help you protect your identity.

Learn more about how to protect your smartphones, PCs, Macs, and other devices.

Leave a Reply

Your email address will not be published. Required fields are marked *