Page 34 - Mobile-En-V3
P. 34

Protecting the smartphone and ensuring the security of data and accounts

     You may imagine how much private data your phone contains: chat messages, emails,
     call logs, websites you visit and recently visited, personal images, passwords, and
     electronic financial transactions. It is necessary to protect your phone against hacking.
     You should consume as much as you can of the following:

    First: Security Settings for The Smartphone

        • Set your device to automatically lock after a period of inactivity: Most
            smartphones and tablets enable you to set a specific time frame, after which the
            device locks automatically if the phone is inactive.

        • Use the smartphone lock feature: The phone lock feature is a step to protect
            data if you lose or steal the device, such as using the pin code, pattern,
            fingerprints, or face recognition feature, so that no one can unlock the phone
            except its owner.

        • Update your operating system and applications: Make sure to update your
            operating system and applications periodically, updates provide new features,
            or close security vulnerabilities.

        • Activate Find My Phone feature: If your phone is lost or stolen, tracking apps
            can tell you exactly where it is. If your phone ends up in the wrong hands. you
            can activate Find Your Phone via your phone's security settings.

        • Monitor Startup Manager: Some apps, when installed on your smartphone, try
            to start themselves at the start of your operating system. This may be a good
            thing if you want to get instant access to the chat messages and emails provided
            by different apps; however, if you have too many apps starting with operating
            system startup, the device's uptime increases dramatically and may slow down
            quickly due to a lack of system memory. In addition to battery consumption and
            network data, Therefore, monitor the phone startup manager, which provides
            the user with the ability to control which applications will be allowed to run
            automatically when the phone is turned on.

        • Be careful of clicking on advertising links: Absolutely avoid clicking on any link
            or attachment in a suspicious email message, this can actually lead to your
            device being completely hacked.

20 Training unit in the field of technological information - at the Supreme Council of Universities © Intellectual property rights 2024
   29   30   31   32   33   34   35   36   37   38   39