Don’t Fall Prey To Fraud This Holiday Season

10 Steps For Mobile Phone Safety

1 – SET PINS AND PASSWORDS

A first line of defense in your personal security is setting your Personal Identification Number (PIN) or Password on your phone.  If your phone is lost or stolen, it will keep your personal information safe.

2 – KEEP SECURITY SETTINGS

Factory security settings are designed to keep you safe.  Altering these settings can leave you vulnerable to a fraudsters attack.

3 – BACK UP YOUR DATA

Back up your data on your cloud or removable storage card.  Should your device be lost or stolen, you can still retrieve your information.

4 – TRUST YOUR SOURCE

Each time you go to download an app, be sure it is a legitimate and trusted source.  Many apps come from fraudsters apt to steal your information, install viruses or damage your phones content.

5 – UNDERSTAND BEFORE YOU ACCEPT

Before you grant applications access to our personal info, be sure you are aware of what they are requesting.   Don’t leave yourself open to an attack.

6 – ENSURE SECURITY FROM AFAR

Having the ability to wipe your phone clean from a remote location can prove to be invaluable if your phone is lost or stolen.  Be sure to research this opportunity as it could save you from a breach in security.

7 – GET THE FIX

It is imperative to keep updates and patches to phones smartphone software as current as possible.  You reduce the risk of exposure to new threats.

8 – BE AWARE OF PUBLIC WI-FI

An open to the public Wi-Fi network can provide an easy target to cybercriminals.  Despite their convenience, you must be aware and cautious when utilizing them.

9 – CLEAR BEFORE YOU SAY GOODBYE

Smartphones are loaded with lots of personal data that you need to keep private.  When you decide to upgrade, resell or recycle your phone, it is necessary to completely erase all the data off your phone.  Reset it to the initial factory settings to ensure all your personal information does not go with that phone.

10 – REPORT THEFT

If your phone is stolen, let your wireless provider know as soon as possible.  They have protocols in place that will prevent the thief from activating it.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: