Thursday, October 19, 2017

How to make you mobile theft proof


Following are few steps that you can follow to secure your mobile devices form attackers. Security countermeasures are being developed and applied to Smartphone, from security in different layers of software to the dissemination of information to end users. There are good practices to be observed at all levels, from design to use, through the development of operating systems , software layers, and downloadable apps.


How to
1.      Add protection
You can activate the security features in the phone. Apple device users can enable the “Find My iPhone” or “Find My iPad” feature in iCloud, which will help them locate the device if it is missing and erase the data on it. New Apple devices also include an activation lock feature that prevents the devices from being reactivated without the owner’s credentials. Android device users can log into Android Device Manager to locate their devices on a map and set up the lock and erase capabilities.
2.      Set a strong password
choose long, complex passwords for their devices, instead of using the standard four-digit code. A strong password is at least eight characters long and includes a combination of letters, numbers and special characters. Employees should also set their screens to lock after a period of inactivity — for example, two minutes.A strong password can provide a valuable layer of protection for mobile data.
What to do if your device is lost or stolen

1.       Report the missing device

Contact the specialist organization to stop the record to anticipate unapproved utilization. The transporter may likewise add the gadget to a worldwide database of boycotted telephones, which can help prevent another client from initiating it. Additionally tell the police and give them the gadget's area and whatever other data that could recover it.

2.       Wipe the Device


If you believe sensitive data stored on the device may be at risk, wipe it remotely. This will reset the device to its factory installed settings. Any passwords stored on the phone should be changed as an extra precaution. For example, if an email password is automatically saved in an email application or a banking password is kept in a note-taking app on the device, the owner should log into the email or banking service from another device and reset it.

Contact the service provider to put a hold on the account to prevent unauthorized usage. The carrier may also add the device to a global database of blacklisted phones, which can help stop another user from activating it. Also notify the police and give them the device’s location and any other information that could help to retrieve it.

What are the consequences of mobiles not being secured?

·         The attacker can change your phone to a zombie machine
·         A compromised Smartphone can record conversations between the user and others and send them to a third party
·         The attacker can prevent the operation and/or be starting of the Smartphone by making it unusable

·         The attacker can remove the personal (photos, music, videos, etc.) or professional data

No comments:

Post a Comment

Test Images

Below images  are being used for the   Hashtag Generator and Content Authenticator research .