android | TechSolutions, Inc. Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation. Thu, 27 Apr 2023 03:41:22 +0000 en-US hourly 1 https://www.techsolutionsinc.com/wp-content/uploads/2020/05/favicon.png android | TechSolutions, Inc. 32 32 Protect your Facebook and Twitter from hackers https://www.techsolutionsinc.com/blog/protect-your-facebook-and-twitter-from-hackers/ https://www.techsolutionsinc.com/blog/protect-your-facebook-and-twitter-from-hackers/#respond Sat, 24 Apr 2021 00:00:01 +0000 https://www.techsolutionsinc.com/blog/protect-your-facebook-and-twitter-from-hackers/ Popular social media platforms like Facebook and Twitter have been suffering massive data breaches for a number of years now. If you wish to continue using these services, you need to tighten your social media privacy settings. Here are a few reminders and tips to help you secure your personal information on social media. Lock […]

The post Protect your Facebook and Twitter from hackers appeared first on TechSolutions, Inc..

]]>

Popular social media platforms like Facebook and Twitter have been suffering massive data breaches for a number of years now. If you wish to continue using these services, you need to tighten your social media privacy settings. Here are a few reminders and tips to help you secure your personal information on social media.

Lock screens exist for a reason

Always lock all your devices as soon as you stop using them. This way, you are safe from the simplest hack of all: someone opening a social media site on your browser while you’re still signed in.

In case you didn’t know, here’s how to lock your computer:

On Macs:

  • Press Ctrl+Command+Q.
  • Click the Apple logo on the top left corner of the screen, and click Lock screen.

On Windows devices:

  • Press Windows key+L.
  • If there are multiple users using the device, click the Start button on the bottom left corner of the screen, then select User > Lock.

Strong passwords aren’t out of fashion — yet

A six-digit passcode may be enough to secure your phone, but you’ll need something much more complicated for your social media account passwords. Create a password that you don’t use for any other account because with the regular occurrence of data breaches, hackers probably already have a long list of your favorite passwords from other websites and platforms.

It is best to use a password manager like 1Password, LastPass, or Dashlane. These allow you to generate, save, and retrieve complex passwords.

You can also enable multifactor authentication, which requires users to fulfill at least one more identity verification step after entering their username and password. The extra step or steps can be getting your fingerprint scanned or entering a one-time passcode on an authentication app. Even if hackers have your password, they won’t be able to log in without the additional authentication requirements.

Make use of social media features

Facebook can help you monitor who’s accessing your account and from where. On a Mac or Windows computer, click on the down arrow located at the upper right corner of your Newsfeed and select Settings and Privacy. Then click Settings > Security and Login to get more information.

Under the section Where You’re Logged In, you’ll see a list of the places and devices you’re logged into. If you don’t recognize a particular location or device, that means someone else has logged in as you and is likely doing things you do not approve of. You need to log them out forcibly (by clicking the ellipsis on the row indicating the malicious login and click Not you?) and then report the incident immediately.

Then, under Setting Up Extra Security, turn on Get alerts about unrecognized logins. Unfortunately, as of this writing, Twitter doesn’t have the same option. This makes implementing multifactor authentication even more necessary.

Hackers can also take over your Facebook and Twitter accounts through third-party services to which you’ve given access to your profiles, so make sure to double-check what you have approved. Here’s what you need to do:

  • Facebook: Go to Settings > Apps and Websites to view and manage third-party services that use Facebook to log you into the accounts you have with them.
  • Twitter: Go to Settings and Privacy > Apps to check and edit the list.

Lastly, check the permissions Facebook and Twitter have on your smartphone or tablet.

  • Android: Go to Settings > Apps > App permissions.
  • iOS: Go to Settings > Privacy to manage which service can access which parts of your phone (such as the camera and speaker).

Less personal info, fewer problems

These steps are just the beginning of what you should be doing. You should also limit the personal data you share on your social media accounts. Avoid oversharing.

By following these tips, you can significantly prevent Facebook and Twitter hacking.

Cybersecurity is a sprawling issue — and social media privacy is but one of the many things you need to stay on top of. For 24/7 support, call our team of experts today.

Published with permission from TechAdvisory.org. Source.

The post Protect your Facebook and Twitter from hackers appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/protect-your-facebook-and-twitter-from-hackers/feed/ 0
Uninstall these sneaky Android adware apps now https://www.techsolutionsinc.com/blog/uninstall-these-sneaky-android-adware-apps-now/ https://www.techsolutionsinc.com/blog/uninstall-these-sneaky-android-adware-apps-now/#respond Tue, 02 Feb 2021 02:00:58 +0000 https://www.techsolutionsinc.com/blog/uninstall-these-sneaky-android-adware-apps-now/ Google Play recently removed 17 apps identified by security company Zscaler to contain malicious adware code. These apps bombard users with unwanted advertisements and collect marketing-type data about them. If you’re one of the thousands of users worldwide who downloaded at least one of these apps, here’s a quick guide to finding and uninstalling them. […]

The post Uninstall these sneaky Android adware apps now appeared first on TechSolutions, Inc..

]]>

Google Play recently removed 17 apps identified by security company Zscaler to contain malicious adware code. These apps bombard users with unwanted advertisements and collect marketing-type data about them. If you’re one of the thousands of users worldwide who downloaded at least one of these apps, here’s a quick guide to finding and uninstalling them.

Sneaky adware apps

These potentially malicious apps are disguised as harmless system or utility apps. They pose as image editors, photo or document scanners, and even messenger apps. Their names even resemble those of legitimate system apps, chosen for the express purpose of tricking Android users into installing them onto their devices. These apps are:

  1. All Good PDF Scanner
  2. Blue Scanner
  3. Care Message
  4. Desire Translate
  5. Direct Messenger
  6. Hummingbird PDF Converter – Photo to PDF
  7. Meticulous Scanner
  8. Mint Leaf Message-Your Private Message
  9. One Sentence Translator – Multifunctional Translator
  10. Paper Doc Scanner
  11. Part Message
  12. Powerful Cleaner
  13. Private SMS
  14. Style Photo Collage
  15. Talent Photo Editor – Blur focus
  16. Tangram App Lock
  17. Unique Keyboard – Fancy Fonts & Free Emoticons

How to remove these adware apps

It’s important that you immediately remove these apps from your device to prevent them from exposing you to all kinds of IT security threats, like man-in-the-middle attacks. One way to do this is to use an anti-malware app that scans and automatically removes malicious software from your device. You can also check your phone or tablet’s app permissions to see if any questionable apps have permission to access your text messages, contact list, etc., and manually uninstall the dubious apps.

However, some apps are harder to detect because they display two different sets of names and icons — one on your device’s Settings app and another when they’re actually running. This makes it more difficult to identify and uninstall the malicious apps on your device, which is exactly what the developers want.

On the other hand, some apps appear on your app tray, but launching one triggers a message that says the app is incompatible with your device. You will then be redirected to a random page on Google Play. And when you return to your app tray, you’ll find that the app’s icon has disappeared.

If there’s no icon, how can you uninstall the app? Andrew Brandt, a researcher at Sophos, says deleting adware apps will require a little bit of digging on your part, as there’s no icon that you can click and drag to the top of the screen and into the trash.

To do this, you have to first identify the adware apps. Go to Settings > Apps & Notifications. This will direct you to a page that displays the most recently opened apps on your device. Next, check if any of those apps have the generic greenish-blue Android icon and/or have generic-sounding names such as Back Up, Update, and the like. If they do, they’re likely adware. Finally, tap the icon and then select Force Stop > Uninstall. Note that a legit system or utility app will have a Disable option instead of an Uninstall option.

There may be similar apps that are yet to be identified and are likely to be made available on Google Play in the future. The key takeaway here is to be mindful of what you download, even if it’s from Google Play or other official platforms. Check out the reviews — the reported adware apps got poor reviews from users who complained about getting a lot of pop-up ads.

Remember that malware can be hiding in even the most innocuous apps, and downloading them gives bad actors the chance to access any confidential information on your device. For advice on how to keep your Android devices safe from adware and other malicious malware, give us a call today.

Published with permission from TechAdvisory.org. Source.

The post Uninstall these sneaky Android adware apps now appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/uninstall-these-sneaky-android-adware-apps-now/feed/ 0
4 easy ways to wipe data from your phone https://www.techsolutionsinc.com/blog/4-easy-ways-to-wipe-data-from-your-phone/ https://www.techsolutionsinc.com/blog/4-easy-ways-to-wipe-data-from-your-phone/#respond Thu, 15 Aug 2019 00:00:33 +0000 https://www.techsolutionsinc.com/blog/4-easy-ways-to-wipe-data-from-your-phone/ The smartphone has become an important part of our lives and is one gadget that many of us carry most of the time. We not only use it to communicate with others, but to store personal information like email, photos, and contacts, as well. So if you plan to sell your phone or give it […]

The post 4 easy ways to wipe data from your phone appeared first on TechSolutions, Inc..

]]>

The smartphone has become an important part of our lives and is one gadget that many of us carry most of the time. We not only use it to communicate with others, but to store personal information like email, photos, and contacts, as well. So if you plan to sell your phone or give it to someone else, make sure you erase everything that’s stored there.

1. Encrypt your Android phone

Ensure that strangers don’t have access to your private data by encrypting it to make it unreadable. Newer phones usually encrypt data by default. But if you’re unsure about yours,  double-check to avoid regrets later.

Go to Settings in your phone and search for Encryption. Where you’ll find that depends on the phone you’re using, but it should be easy to locate. Once there, you’ll see whether your device is encrypted or not. If it’s the latter, start the encryption process. This normally takes an hour or more, and you can’t use your device during that time.

2. Remove the SIM and storage cards

Now that your data is encrypted, remove your SIM card and external memory card. Both are linked to your identity and contain sensitive information so don’t let them out of your sight. 

3. Perform a factory reset

You can now start the actual data wiping process. Under Settings, look for Backup & Reset and go to Factory Data Reset. This is where you can remove data and accounts from your phone. You will be asked to verify your fingerprint, or input your password, pattern, or PIN before starting the process.

4. Sever ties to specific websites

The final step is to manually remove your old device from Google and other websites it is associated with. Go to the concerned sites, choose your device, and remove it from the list of Trusted Devices. Don’t forget your password manager and multi-device authentication apps; sign in to those and close any connections there as well.

As long as you follow these four easy steps, you can safely get rid of your old mobile phone. For those who are still worried about their data, give us a call. We’ll protect your files from prying eyes and give you valuable tips to secure your Android device.

Published with permission from TechAdvisory.org. Source.

The post 4 easy ways to wipe data from your phone appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/4-easy-ways-to-wipe-data-from-your-phone/feed/ 0
What Google Assistant can do for you https://www.techsolutionsinc.com/blog/what-google-assistant-can-do-for-you/ https://www.techsolutionsinc.com/blog/what-google-assistant-can-do-for-you/#respond Sat, 13 Jul 2019 00:00:57 +0000 https://www.techsolutionsinc.com/blog/what-google-assistant-can-do-for-you/ Before there was Google Assistant, there was Google Now. In 2016, it replaced Google Now as the virtual assistant (VA) in the Google app for Android and iOS. The updated VA offers plenty of functionalities to Google device users. Here are a few that you should take advantage of. Locate the best route to any […]

The post What Google Assistant can do for you appeared first on TechSolutions, Inc..

]]>

Before there was Google Assistant, there was Google Now. In 2016, it replaced Google Now as the virtual assistant (VA) in the Google app for Android and iOS. The updated VA offers plenty of functionalities to Google device users. Here are a few that you should take advantage of.

Locate the best route to any location

Google Assistant works seamlessly with Google Maps, which makes it a great tool for finding the best route to any location.

For instance, if you’re trying to find the best route home, just turn on the app and say, “Get me home.” It will then work with Google Maps to let you know the ideal route based on your current location.

You can also check for traffic updates with Google Assistant, and get the latest information on road closures and traffic diversions. This feature is perfect for people who are often on the move.

Make a shopping list with your voice

Google Assistant can also help you make shopping lists with ease — just “talk” to the app.

To do this, open the app and say, “Add [item] to my shopping list.”  Google Assistant will then collate all the items on your shopping list and read it back to you for good measure

Stay updated with the latest news

Too busy to browse the day’s news? Why not have Google Assistant read them for you? If you say “Play the news,” Google Assistant will begin reading the stories from news sources you have saved in your RSS feeds, social media accounts, etc.

You can make Google Assistant play, pause, and stop reading at any time, as well as request it to read articles from a particular source or media site. 

Take control of your smart home

If you’re enhancing your living space with smart devices like ovens, light bulbs, or thermostats that operate automatically, Google Assistant can help you easily control them. For example, you can say, “Okay. Google, turn off lights in the living room.”

To activate Google Assistant, tap on the menu icon at the upper-right section of the screen and choose Settings. You can then add the smart devices in your house that are compatible with your app.

Measurement and currency conversions and language translation

You can also use Google Assistant to convert measurements, currencies, and other data. You can even ask it to get exchange rates between the US dollar and a foreign currency. Just say, “What is 12 US dollars in euros?” The trusty assistant also has a nifty language translation feature. 

Check the email inbox and appointments calendar

If you’re using Google Assistant, chances are you’re using other services like Gmail or Google Calendar, so why not use your voice-activated helper to connect to these apps?

You can ask Google Assistant to skim through your Gmail inboxes for target keywords, or pull up a recently added appointment in your Calendar app. Google Assistant can also work with your Google Keep app, which is handy for taking down notes. 

These are just a few of the things Google Assistant can do for you. If you have questions about this tool, get in touch with our experts who are ready to help you.

Published with permission from TechAdvisory.org. Source.

The post What Google Assistant can do for you appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/what-google-assistant-can-do-for-you/feed/ 0
Chrome to mark HTTP as ‘not secure’ https://www.techsolutionsinc.com/blog/chrome-to-mark-http-as-not-secure/ https://www.techsolutionsinc.com/blog/chrome-to-mark-http-as-not-secure/#respond Fri, 15 Jun 2018 00:00:50 +0000 https://www.techsolutionsinc.com/blog/chrome-to-mark-http-as-not-secure/ Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will mark all HTTP sites as “not secure.” Google hopes this move will nudge users away from the unencrypted web. Read on to learn more about the forthcoming changes. For several years, Google has moved toward […]

The post Chrome to mark HTTP as ‘not secure’ appeared first on TechSolutions, Inc..

]]>

Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will mark all HTTP sites as “not secure.” Google hopes this move will nudge users away from the unencrypted web. Read on to learn more about the forthcoming changes.

For several years, Google has moved toward a more secure web by strongly advocating that sites adopt the Secure HyperText Transfer Protocol (HTTPS) encryption. And last year, Google began marking some HyperText Transfer Protocol (HTTP) pages as “not secure” to help users comprehend risks of unencrypted websites. Beginning in July 2018 with the release of a Chrome update, Google’s browser will mark all HTTP sites as “not secure.”

Chrome’s move was mostly brought on by increased HTTPS adoption. Eighty-one of the top 100 sites on the web default to HTTPS, and the majority of Chrome traffic is already encrypted.

Here’s how the transition to security has progressed, so far:

  • Over 68% of Chrome traffic on both Android and Windows is now protected
  • Over 78% of Chrome traffic on both Chrome OS and Mac is now protected
  • 81 of the top 100 sites on the web use HTTPS by default

HTTPS: The benefits and difference

What’s the difference between HTTP and HTTPS? With HTTP, information you type into a website is transmitted to the site’s owner with almost zero protection along the journey. Essentially, HTTP can establish basic web connections, but not much else.

When security is a must, HTTPS sends and receives encrypted internet data. This means that it uses a mathematical algorithm to make data unreadable to unauthorized parties.

#1 HTTPS protects a site’s integrity

HTTPS encryption protects the channel between your browser and the website you’re visiting, ensuring no one can tamper with the traffic or spy on what you’re doing.

Without encryption, someone with access to your router or internet service provider (ISP) could intercept (or hack) information sent to websites or inject malware into otherwise legitimate pages.

#2 HTTPS protects the privacy of your users

HTTPS prevents intruders from eavesdropping on communications between websites and their visitors. One common misconception about HTTPS is that only websites that handle sensitive communications need it. In reality, every unprotected HTTP request can reveal information about the behaviors and identities of users.  

#3 HTTPS is the future of the web

HTTPS has become much easier to implement thanks to services that automate the conversion process, such as Let’s Encrypt and Google’s Lighthouse program. These tools make it easier for website owners to adopt HTTPS.

Chrome’s new notifications will help users understand that HTTP sites are less secure, and move the web toward a secure HTTPS web by default. HTTPS is easier to adopt than ever before, and it unlocks both performance improvements and powerful new features that aren’t possible with HTTP.

How can small-business owners implement and take advantage of this new interface? Call today for a quick chat with one of our experts to get started.

Published with permission from TechAdvisory.org. Source.

The post Chrome to mark HTTP as ‘not secure’ appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/chrome-to-mark-http-as-not-secure/feed/ 0
5 new features for Outlook https://www.techsolutionsinc.com/blog/5-new-features-for-outlook/ https://www.techsolutionsinc.com/blog/5-new-features-for-outlook/#respond Wed, 23 May 2018 00:00:27 +0000 https://www.techsolutionsinc.com/blog/5-new-features-for-outlook/ Lately, Microsoft has given some love to Outlook — not just the desktop app, but also the web and app versions. In fact, they just released a bunch of new and improved features. Let’s take a look. #1 RSVP Outlook makes it fairly simple to invite people to a meeting, but now it will also […]

The post 5 new features for Outlook appeared first on TechSolutions, Inc..

]]>

Lately, Microsoft has given some love to Outlook — not just the desktop app, but also the web and app versions. In fact, they just released a bunch of new and improved features. Let’s take a look.

#1 RSVP
Outlook makes it fairly simple to invite people to a meeting, but now it will also keep tabs on who’s coming. Just click the new “Tracking” option under “Meeting Occurrence” and see who has committed to the meeting and who hasn’t. RSVP isn’t just available for the meeting organizer, but the attendees, too.

#2 Multiple time zones
Traveling internationally and trying to sync appointments on different continents? Not fun. But now you can set up event start times and end times across different zones.

Outlook now allows you to show multiple time zones – three within Windows, and one within Outlook for Mac. In Outlook for Windows, add one by clicking File > Options > Calendar Time Zones and clicking “Show a second time zone”. In Mac, add one additional time zone under Outlook > Preferences > Calendar Time Zones. For Outlook on the web, click the “Time Zone” drop-down arrow in your Calendar meeting invite to add an additional time zone.

#3 BCC warning
If you’re on the receiving end of a blind carbon copy (bcc) email, that means the other recipients didn’t know you were copied on it. In Outlook for Windows, you’ll now get an alert if you attempt to reply to that message, such as “You were bcc’d, so perhaps you should reply only to the sender?” That way you’ll remain anonymous.

#4 Office Lens for Android
If you use Outlook for Android, the app will integrate the Microsoft Office Lens feature.
When that happens, you can tap the photo icon while composing a message, then take a snapshot of a whiteboard, document, photo or the like. Outlook will optimize it and then embed it into the email.

#5 Bill-pay reminders
What about your bills? Outlook will identify them in your inbox, show you a summary card at the top of your email each day, send an email to remind you two days before the due date, and automatically add an event to your calendar so you don’t forget to pay on the actual day.

If you want to learn more about these new and improved features, with more on the way, just call us today for a quick chat with one of our Microsoft Office experts.

Published with permission from TechAdvisory.org. Source.

The post 5 new features for Outlook appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/5-new-features-for-outlook/feed/ 0
Don’t give social media hackers a chance https://www.techsolutionsinc.com/blog/dont-give-social-media-hackers-a-chance/ https://www.techsolutionsinc.com/blog/dont-give-social-media-hackers-a-chance/#respond Fri, 18 May 2018 00:00:22 +0000 https://www.techsolutionsinc.com/blog/dont-give-social-media-hackers-a-chance/ Pranksters, malicious attackers, extremists — hackers come in different forms, but they all have one thing in mind: compromising your online privacy and security. Some of them specialize in hacking social media, but don’t fret; there are several things you can do to protect your Facebook or Twitter account. Lockscreens exist for a reason Make […]

The post Don’t give social media hackers a chance appeared first on TechSolutions, Inc..

]]>

Pranksters, malicious attackers, extremists — hackers come in different forms, but they all have one thing in mind: compromising your online privacy and security. Some of them specialize in hacking social media, but don’t fret; there are several things you can do to protect your Facebook or Twitter account.

Lockscreens exist for a reason

Make sure all your computing devices lock the moment you stop using them. This way, you are safe from the simplest hack of all: someone opening a browser on your computer that has your social media login saved. As long as your password isn’t your birthday or anniversary, you’ll be forcing hackers to work for access to your account.

Strong passwords are never out of fashion

Unlocking your phone may be limited to a six-digit passcode, but you’ll need something much more complicated for your account password. The first thing you’ll need to do is create a password that isn’t used for any other account. Because data breaches have become such a regular occurrence, hackers probably have a long list of your favorite passwords from other websites and platforms.

In this case, it is best to use a password manager like an app or online service that allows you to generate and retrieve complex passwords.

Another thing you can do is enable something called two-factor authentication, which requires you to type in a secondary code sent to your phone. Even if hackers have your password, they won’t be able to log in without your phone.

Make use of social media features

Facebook offers functions that help you keep tabs on who’s accessing your account and from
where. To use this feature, click the down arrow in the upper right corner of your Newsfeed and select Settings. Then click Security and Login to get more information. If you sense an imposter, click the right-hand icon to give you the option of logging out remotely or reporting the person.

From there, turn on Get alerts about unrecognized logins to be notified via Facebook, Messenger, or email if someone is logged into your account from an unrecognized browser. Unfortunately, Twitter doesn’t have the same option (that makes the two-factor authentication extremely necessary).

While it may be difficult for a hacker to barge into your Facebook or Twitter account through a third-party service that you have given access to your profile, it’s still advisable that you check what you have approved.

  • Facebook: Go to Settings > Apps and Websites to view and manage outside service with access to your account
  • Twitter: Go to Settings and Privacy > Apps to check and edit the list

Last, be sure to check the permissions mobile apps like Facebook and Twitter have on your smartphone or tablet.

  • Android: Go to Settings > Apps > tap the icon in the upper right and then tap App permissions
  • iOS: Go to Settings > Privacy to manage which service can access which parts of your phone

Less personal info, fewer problems

These steps are just the beginning of what you should be doing. The next thing you should consider is limiting the personal data you input into your social media accounts. If you have to put a ton of information, then be sure you read this blog from the top.

With a little practical knowledge, you can prevent Facebook and Twitter hackers from doing what they do. Cybersecurity is a sprawling issue and social media privacy is such a small sliver of what you need to stay on top of. For 24/7 support, call our team of experts today.

Published with permission from TechAdvisory.org. Source.

The post Don’t give social media hackers a chance appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/dont-give-social-media-hackers-a-chance/feed/ 0
Tips to protect your smartphone https://www.techsolutionsinc.com/blog/tips-to-protect-your-smartphone/ https://www.techsolutionsinc.com/blog/tips-to-protect-your-smartphone/#respond Sat, 30 Dec 2017 02:00:54 +0000 https://www.techsolutionsinc.com/blog/tips-to-protect-your-smartphone/ Cyber criminals will always be eyeing your data regardless of where it’s stored. That means even your trusty Android phone or iPhone isn’t safe. In fact, it may be more exposed to security risks than you think. These tips can help increase your mobile’s security. Set a strong password Whether your device requires a 4-set […]

The post Tips to protect your smartphone appeared first on TechSolutions, Inc..

]]>

Cyber criminals will always be eyeing your data regardless of where it’s stored. That means even your trusty Android phone or iPhone isn’t safe. In fact, it may be more exposed to security risks than you think. These tips can help increase your mobile’s security.

Set a strong password

Whether your device requires a 4-set or 6-set numerical PIN, a fingerprint, or a facial scan, set a lock that’s difficult to crack. This is not the strongest security measure by any means, but they provide a necessary initial barrier for intruders.

Major manufacturers like Apple and Samsung are innovating their products’ locking mechanisms and you’re doing yourself a favor by using them. To manage your device’s locks, follow these steps:

  • iOS – Go to Settings > Touch ID & Passcode, enter your passcode, and switch on ‘Require Passcode.’ This is also where you can manage your Touch ID settings and adjust access controls (Recent Notifications, Today View, and more). If you’re using an iPhone X, go to ‘Face ID & Passcode.’
  • Android – Go to the Settings page > Lock Screen and Security to set your passcodes. These feature names may vary per device.

Download applications only from official stores

For iPhone users, download only from the App Store, and for Android phones, Google Play Store. Downloading apps only from these platforms doesn’t guarantee that your phone will be 100% safe from malware, but doing so greatly reduces the likelihood of you downloading malicious programs disguised as legitimate apps.

Even Apple, which used to be the gold standard for software security, is no longer immune to system vulnerabilities. Despite having a strict policy on downloads (iPhone users can download only from the App Store), those with ‘jailbreak apps’ are exposed to a multitude of malicious entities. As a further precaution, download only apps that have high ratings and steer clear of downloads from unknown links.

Check your apps’ permissions

When you download certain apps, you’ll be asked to grant permission for it to access your data (files, contacts, photos, etc.). What most users don’t know is that some of these permissions also gain access to hardware controls such as those found in the device’s camera and microphone. And if a malicious app happens to slip through the cracks, these permissions can serve as a gateway for hackers.

Android and Apple have already improved their respective OS’s mechanisms to control what apps can access, but you can take it up a notch. Follow these steps to manage what apps can access on your phone:

  • iOS – Go to Settings > Privacy to see your apps’ access level. For example, if you tap on Microphone, you’ll see all the apps that have access to your iPhone’s Microphone. If you wish to deny access to it, you can do so by turning privacy off.
  • Android – Go to Settings > Apps, select an app, then tap ‘Permissions.’ From here, you can control every individual app’s access to your devices’ files.

Update apps and security software

We cannot stress this enough: As soon as they become available, download and update your OS and apps’ software.

In exceptional cases where certain versions of an OS are known to have bugs, not patching your device doesn’t make it any less exposed to risk. And here’s why: Most older OS versions have had to be patched because of a software vulnerability, and delaying its update to the latest version doesn’t make it safer. In fact, it’s far riskier to remain unpatched and wait for the next update.

These basic yet critical tips will help keep all your gadgets safe and your business data unharmed by cyber criminals. Boost your devices and your business’s defenses with dependable cyber security from our team — call us today!

Published with permission from TechAdvisory.org. Source.

The post Tips to protect your smartphone appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/tips-to-protect-your-smartphone/feed/ 0
Ransomware is coming to your Android https://www.techsolutionsinc.com/blog/ransomware-is-coming-to-your-android/ https://www.techsolutionsinc.com/blog/ransomware-is-coming-to-your-android/#respond Fri, 08 Sep 2017 00:00:42 +0000 https://www.techsolutionsinc.com/blog/ransomware-is-coming-to-your-android/ Traditional ransomware like WannaCry has been explained a thousand ways on a thousand blogs. But one thing you may not have thought about is what ransomware would be like if it infected your mobile device. Read on to learn more. How does ransomware make it onto your Android device? Like its desktop equivalent, mobile ransomware […]

The post Ransomware is coming to your Android appeared first on TechSolutions, Inc..

]]>

Traditional ransomware like WannaCry has been explained a thousand ways on a thousand blogs. But one thing you may not have thought about is what ransomware would be like if it infected your mobile device. Read on to learn more.

How does ransomware make it onto your Android device?

Like its desktop equivalent, mobile ransomware needs to be installed on your device before it can do damage. For Android devices, this means mobile apps that hide their true intent. There are two ways to install programs on your mobile device: downloading them from app stores like Google Play and Amazon Appstore, or downloading them directly from websites and email links.

Surprisingly, both come with risks. Unverified sources often advertise free apps that hide malware, and the best of these can occasionally avoid detection and be allowed into monitored app stores.

What does mobile ransomware look like?

Similar to ransomware on personal computers, mobile ransomware holds data stored on your device hostage and demands ransom. For example, in the case of a ransomware that came with the “OK” app, a popular Russian social network platform that was infected earlier this year, a user is prompted to change device settings. There is no option to close the prompt and tapping Accept locks everything down and leaves you with nothing but a ransom note.

How to protect yourself from mobile ransomware

First and foremost, avoid downloading apps directly from websites or third-party app stores. Additionally, make sure you turn on Google’s security system — Verify Apps — which scans all the apps about to be installed on your device for potential threats. You can do so by opening your Android’s settings, choosing Security, tapping on Verify Apps, and activating ‘Scan device for security threats’.

Second, install antivirus software on your device and keep it up to date.

Third, back up important files from your device to either a USB disk, a computer, or any cloud-based services. This way, you won’t lose your valuable data if you are forced to factory-reset your device.

Last, if ransomware made its way into your device, don’t pay. According to IT security company ESET, mobile ransomware very rarely includes programming to reverse the damage it has done.

Losing any type of data is an enormous inconvenience, but businesses need to be especially careful about careless employees. Data loss could result in lawsuits or regulatory fines, so it’s important that you know how to safeguard your Android against ransomware.

For more in-depth advice on how to protect yourself and your business from this threat, get in touch with our experts today.

Published with permission from TechAdvisory.org. Source.

The post Ransomware is coming to your Android appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/ransomware-is-coming-to-your-android/feed/ 0
Android features you won’t find in iOS 11 https://www.techsolutionsinc.com/blog/android-features-you-wont-find-in-ios-11/ https://www.techsolutionsinc.com/blog/android-features-you-wont-find-in-ios-11/#respond Thu, 06 Jul 2017 00:00:58 +0000 https://www.techsolutionsinc.com/blog/android-features-you-wont-find-in-ios-11/ Apple’s iOS 11 will be released later this year, but many Android users might not willingly trade in their device for an iPhone. Even with its key productivity features like Files, drag-and-drop functionality, a more enterprise-friendly user interface, and sleek new design changes, the latest version of Apple’s mobile operating system is missing a few […]

The post Android features you won’t find in iOS 11 appeared first on TechSolutions, Inc..

]]>

Apple’s iOS 11 will be released later this year, but many Android users might not willingly trade in their device for an iPhone. Even with its key productivity features like Files, drag-and-drop functionality, a more enterprise-friendly user interface, and sleek new design changes, the latest version of Apple’s mobile operating system is missing a few important tools that many Android users can’t live without.

Multiple profiles

Android devices allow users to create multiple user profiles — ideal for company devices shared among staff. This feature is also great for privacy because it lets users create an individual profile and password, so there’s no need to worry about important files and apps in the device being compromised. This feature is something iOS 11 should have included since multiple user functionality is commonly found in desktops environments, which is what it is trying to emulate.

Customization

In the upcoming iOS 11 release, iPad users can expect improvements in design. What they shouldn’t expect to find are features that will enable customizations much beyond personalizing their home screen wallpaper. Adjusting the color settings, fonts, and themes are capabilities Android device users have been enjoying for years, but Apple users will have to wait for later iOS releases to enjoy the same.

Screen search

In an Android device, tapping the “What’s on my screen?” button in Google Assistant lets a user search for info on whatever’s “on-screen.” It returns results pertaining to whatever the user is looking at on his or her screen and is useful for those who need comprehensive search results. By contrast, iOS’s search function, called Spotlight, allows instant web searches only on highlighted text.

Local photo deletion

Android’s “Free up space” capability lets users back up photos in the cloud and easily delete local files stored in the device with just one tap. On the other hand, iOS offers a convenient way to sync photos and videos to iCloud, and its Optimize iPhone Storage function is great for users with low-storage devices. Even though this is enhanced for iOS 11, it still doesn’t save as much storage space as Android’s Photos app.

Other features

The iOS 11’s “Do Not Disturb While Driving” mode detects whether the user is driving, which stops the device from sending notifications in order to avoid distractions. It’s a welcome addition, but it’s a weak counterpart to Android’s “Do Not Disturb” function, which is far more robust. Another feature that won’t be found in iOS 11 is a “Clear All” button, which closes all open apps at once.

Even with a handful of nifty features in the iOS 11, those who enjoy Android’s customizability and unique features likely won’t switch. However, the iOS 11’s focus on enterprise usability might be attractive for some non-Apple users.

Businesses need simple yet functional devices that work. If you need expert advice on device features and usability, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

The post Android features you won’t find in iOS 11 appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/android-features-you-wont-find-in-ios-11/feed/ 0