Page 34 - Mobile-En-V3
P. 34
Protecting the smartphone and ensuring the security of data and accounts
You may imagine how much private data your phone contains: chat messages, emails,
call logs, websites you visit and recently visited, personal images, passwords, and
electronic financial transactions. It is necessary to protect your phone against hacking.
You should consume as much as you can of the following:
First: Security Settings for The Smartphone
• Set your device to automatically lock after a period of inactivity: Most
smartphones and tablets enable you to set a specific time frame, after which the
device locks automatically if the phone is inactive.
• Use the smartphone lock feature: The phone lock feature is a step to protect
data if you lose or steal the device, such as using the pin code, pattern,
fingerprints, or face recognition feature, so that no one can unlock the phone
except its owner.
• Update your operating system and applications: Make sure to update your
operating system and applications periodically, updates provide new features,
or close security vulnerabilities.
• Activate Find My Phone feature: If your phone is lost or stolen, tracking apps
can tell you exactly where it is. If your phone ends up in the wrong hands. you
can activate Find Your Phone via your phone's security settings.
• Monitor Startup Manager: Some apps, when installed on your smartphone, try
to start themselves at the start of your operating system. This may be a good
thing if you want to get instant access to the chat messages and emails provided
by different apps; however, if you have too many apps starting with operating
system startup, the device's uptime increases dramatically and may slow down
quickly due to a lack of system memory. In addition to battery consumption and
network data, Therefore, monitor the phone startup manager, which provides
the user with the ability to control which applications will be allowed to run
automatically when the phone is turned on.
• Be careful of clicking on advertising links: Absolutely avoid clicking on any link
or attachment in a suspicious email message, this can actually lead to your
device being completely hacked.
20 Training unit in the field of technological information - at the Supreme Council of Universities © Intellectual property rights 2024

