Categories: Mobile

How to protect your smartphone data from being stolen

One of the biggest threats to our smartphone privacy isn’t Carrier IQ or any kind of malware but ourselves.  We store countless pieces of personal and corporate data on our phones which, if lost or stolen, could be accessed and used by anyone.

Credit: Lookout

So how do you protect your smartphone’s data and your privacy?  Threatscape’s MD, Dermot Williams, took us through how you can keep your data secure even if you lose your phone.

Read more security advice from Dermot Williams here.

The Technology
The most basic form of phone protection is your PIN but many of us undermine our own security by choosing unsecure PINs.  Many phones won’t allow you to use basic PINs like 0000 or 1234 but if you phone does, or if you are using these numbers, then you should change them.  If you’re not using a PIN then your data is open to the world.

Bluetooth and WiFi
The same goes for Bluetooth, be sure to use a unique Bluetooth PIN and when not connected to an external device to turn your Bluetooth connection off, even if just to save your battery.

For WiFi connections make sure you use encryption where possible.  Only this year Google had to plug an Android WiFi security hole which would have allowed people to snoop on other’s WiFi data.  Apple and Android apps like Lookout can give you more information and protection when connecting to unsecured WiFi channels.

One of the first things you should do when you turn on your new phone (after setting a secure PIN) is to download a mobile tracking app.  Again, Lookout is a good option for both iPhone and Android.  We’ve covered Lookout Mobile Security before but we haven’t gone into too much detail about the app’s tracking system.  With Lookout you have the ability to locate your phone using the app’s site and using the same site you can lock and even wipe your phone.

Apps
Only download apps from trusted sources, if you are an iPhone user chances are you will feel more protected than Android or Windows Phone 7 users but don’t be complacent.  All three companies have the ability to remotely delete apps after they have been installed on your smartphone, suggesting that they fear malware could get through their app markets’ vetting systems.  They can do this for a number of reasons but user and data security are the main ones.  Thankfully, so far Google is reportedly the only manufacturer to have used their “kill-switch” and they have not had to use it often.

If your iPhone, Android, or WP7 have been jailbroken be extra careful with the apps you install.  You should ask yourself if jailbreaking your phone is worth the increased security risks.

You
There are a number of apps on your smartphone that you probably can’t live without; personal/work email, Twitter, Facebook would be the main ones but these are also the apps which would give would-be thieves access to accounts you’d rather keep private.  To be absolutely sure that your data is not at risk on your phone Williams recommends you log out of each account when finished.  Leaving your phone logged into your social media, and personal email accounts is a risk to your privacy; leaving your phone logged into your work email is another story entirely.

Remotely log out of your social media apps
Remember that if your phone is taken and it is logged into your social and email accounts there are a few things that you can do.

 

Loose lips
Be careful what you say when you are logged into your personal accounts with your smartphone.  Even SMS messages can contain personal information that you might not want others to see. Consider downloaded a trustworthy app that backups your text messages to your email account.  This way you can be sure you always have a copy of them and you can delete ones with personal information from your phone directly.

Remember to back up your phone on a regular basis; at least this way if it is lost or stolen you don’t have to worry about losing your data.  If your phone is stolen make sure you know where its IMEI number is (it’s usually on the phone’s box) so when you report it stolen to your service provider they can prevent it from making calls.

When your phone comes to the end of its life be certain that you have completely wiped all data from it before you recycle it.

Recovered your phone?
If you recover your phone Williams recommends you check its security settings to ensure nothing was changed.  Also check your apps to be sure nothing new apps were installed.

And with this you should be more secured with your phone.

Ajit Jain

Ajit Jain is marketing and sales head at Octal Info Solution, a leading iPhone app development company and offering platform to hire Android app developers for your own app development project. He is available to connect on Google Plus, Twitter, Facebook, and LinkedIn.

View Comments

Recent Posts

Can Bitcoin Be the Key to Ending Perpetual War?

Every now and then, I stumble upon posts such as these here and there: And,…

44 mins ago

The Coming AI Winter: How Physics May Be Leading the Way

Winter(Physics) is Coming It now looks like Large Language Models running on the GPT technology…

46 mins ago

Top 15 LatAm tech journalists and editors of 2024

Latin America’s tech industry is booming, with innovative new startups popping up across the region.…

3 hours ago

G20 announces initiative to crackdown on climate change disinformation

The Global Initiative for Information Integrity on Climate Change claims to 'safeguard those reporting on…

5 hours ago

How GPUs, widely used in gaming, are helping doctors get better look inside us

In the late 19th Century, physicians began inserting hollow tubes equipped with small lights into…

15 hours ago

Top Five Trends Shaping Gaming in 2025

This year wasn’t exactly what the video gaming industry expected — it declined by 7%…

2 days ago