{"id":1211,"date":"2017-12-29T21:00:54","date_gmt":"2017-12-30T02:00:54","guid":{"rendered":"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/"},"modified":"2022-03-02T08:42:08","modified_gmt":"2022-03-02T13:42:08","slug":"tips-to-protect-your-smartphone","status":"publish","type":"post","link":"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/","title":{"rendered":"Tips to protect your smartphone"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-full wp-image-31695\" src=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017December29Android_A.png\" alt=\"\" width=\"170\" height=\"170\" \/>Cyber criminals will always be eyeing your data regardless of where it\u2019s stored. That means even your trusty Android phone or iPhone isn\u2019t safe. In fact, it may be more exposed to security risks than you think. These tips can help increase your mobile\u2019s security.<\/p>\n<h3>Set a strong password<\/h3>\n<p>Whether your device requires a 4-set or 6-set numerical PIN, a fingerprint, or a facial scan, set a lock that\u2019s difficult to crack. This is not the strongest security measure by any means, but they provide a necessary initial barrier for intruders.<\/p>\n<p>Major manufacturers like Apple and Samsung are innovating their products\u2019 locking mechanisms and you\u2019re doing yourself a favor by using them. To manage your device\u2019s locks, follow these steps:<\/p>\n<ul>\n<li>iOS &#8211; Go to Settings &gt; Touch ID &amp; Passcode, enter your passcode, and switch on \u2018Require Passcode.\u2019 This is also where you can manage your Touch ID settings and adjust access controls (Recent Notifications, Today View, and more). If you\u2019re using an iPhone X, go to \u2018Face ID &amp; Passcode.\u2019<\/li>\n<li>Android &#8211; Go to the Settings page &gt; Lock Screen and Security to set your passcodes. These feature names may vary per device.<\/li>\n<\/ul>\n<h3>Download applications only from official stores<\/h3>\n<p>For iPhone users, download only from the App Store, and for Android phones, Google Play Store. Downloading apps only from these platforms doesn\u2019t guarantee that your phone will be 100% safe from malware, but doing so greatly reduces the likelihood of you downloading malicious programs disguised as legitimate apps.<\/p>\n<p>Even Apple, which used to be the gold standard for software security, is no longer immune to <a href=\"https:\/\/9to5mac.com\/2017\/11\/29\/macos-root-fix\/\">system vulnerabilities<\/a>. Despite having a strict policy on downloads (iPhone users can download only from the App Store), those with \u2018jailbreak apps\u2019 are exposed to a multitude of malicious entities. As a further precaution, download only apps that have high ratings and steer clear of downloads from unknown links.<\/p>\n<h3>Check your apps\u2019 permissions<\/h3>\n<p>When you download certain apps, you\u2019ll be asked to grant permission for it to access your data (files, contacts, photos, etc.). What most users don\u2019t know is that some of these permissions also gain access to hardware controls such as those found in the device\u2019s camera and microphone. And if a malicious app happens to slip through the cracks, these permissions can serve as a gateway for hackers.<\/p>\n<p>Android and Apple have already improved their respective OS\u2019s mechanisms to control what apps can access, but you can take it up a notch. Follow these steps to manage what apps can access on your phone:<\/p>\n<ul>\n<li>iOS &#8211; Go to Settings &gt; Privacy to see your apps\u2019 access level. For example, if you tap on Microphone, you\u2019ll see all the apps that have access to your iPhone\u2019s Microphone. If you wish to deny access to it, you can do so by turning privacy off.<\/li>\n<li>Android &#8211; Go to Settings &gt; Apps, select an app, then tap \u2018Permissions.\u2019 From here, you can control every individual app\u2019s access to your devices\u2019 files.<\/li>\n<\/ul>\n<h3>Update apps and security software<\/h3>\n<p>We cannot stress this enough: As soon as they become available, download and update your OS and apps\u2019 software.<\/p>\n<p>In exceptional cases where certain versions of an OS are known to have bugs, not patching your device doesn\u2019t make it any less exposed to risk. And here\u2019s why: Most older OS versions have had to be patched because of a software vulnerability, and delaying its update to the latest version doesn\u2019t make it safer. In fact, it\u2019s far riskier to remain unpatched and wait for the next update.<\/p>\n<p>These basic yet critical tips will help keep all your gadgets safe and your business data unharmed by cyber criminals. Boost your devices and your business\u2019s defenses with dependable cyber security from our team &#8212; call us today!<\/p>\n<div class=\"autoblogfoot\">Published with permission from TechAdvisory.org. <a href=\"https:\/\/www.techadvisory.org\/2017\/12\/tips-to-protect-your-smartphone\/\">Source.<\/a><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber criminals will always be eyeing your data regardless of where it\u2019s stored. That means even your trusty Android phone or iPhone isn\u2019t safe. In fact, it may be more exposed to security risks than you think. These tips can help increase your mobile\u2019s security. Set a strong password Whether your device requires a 4-set [&hellip;]<\/p>\n","protected":false},"author":53,"featured_media":1213,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[27],"tags":[1125,29,1126,1127,1128,150],"class_list":["post-1211","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-android","tag-2017december29android_a","tag-android","tag-cyber-security","tag-mobile-phones","tag-smartphones","tag-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Tips to protect your smartphone<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tips to protect your smartphone\" \/>\n<meta property=\"og:description\" content=\"Cyber criminals will always be eyeing your data regardless of where it\u2019s stored. That means even your trusty Android phone or iPhone isn\u2019t safe. In fact, it may be more exposed to security risks than you think. These tips can help increase your mobile\u2019s security. Set a strong password Whether your device requires a 4-set [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/\" \/>\n<meta property=\"og:site_name\" content=\"TechSolutions, Inc.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-30T02:00:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-02T13:42:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017December29Android_A.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TechSolutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:site\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TechSolutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/\"},\"author\":{\"name\":\"TechSolutions\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\"},\"headline\":\"Tips to protect your smartphone\",\"datePublished\":\"2017-12-30T02:00:54+00:00\",\"dateModified\":\"2022-03-02T13:42:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/\"},\"wordCount\":659,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017December29Android_A.jpg\",\"keywords\":[\"2017december29android_a\",\"android\",\"cyber security\",\"mobile phones\",\"smartphones\",\"tips\"],\"articleSection\":[\"Android\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/\",\"name\":\"Tips to protect your smartphone\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017December29Android_A.jpg\",\"datePublished\":\"2017-12-30T02:00:54+00:00\",\"dateModified\":\"2022-03-02T13:42:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/#primaryimage\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017December29Android_A.jpg\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017December29Android_A.jpg\",\"width\":900,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techsolutionsinc.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tips to protect your smartphone\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"name\":\"TechSolutions, Inc.\",\"description\":\"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.\",\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\",\"name\":\"TechSolutions, Inc.\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"width\":338,\"height\":170,\"caption\":\"TechSolutions, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\",\"https:\/\/x.com\/TechSolutionsDE\",\"https:\/\/www.linkedin.com\/company\/techsolutions-inc\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\",\"name\":\"TechSolutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"caption\":\"TechSolutions\"},\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tips to protect your smartphone","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Tips to protect your smartphone","og_description":"Cyber criminals will always be eyeing your data regardless of where it\u2019s stored. That means even your trusty Android phone or iPhone isn\u2019t safe. In fact, it may be more exposed to security risks than you think. These tips can help increase your mobile\u2019s security. Set a strong password Whether your device requires a 4-set [&hellip;]","og_url":"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/","og_site_name":"TechSolutions, Inc.","article_publisher":"https:\/\/www.facebook.com\/TechSolutionsIncDE\/","article_published_time":"2017-12-30T02:00:54+00:00","article_modified_time":"2022-03-02T13:42:08+00:00","og_image":[{"width":900,"height":300,"url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017December29Android_A.jpg","type":"image\/jpeg"}],"author":"TechSolutions","twitter_card":"summary_large_image","twitter_creator":"@TechSolutionsDE","twitter_site":"@TechSolutionsDE","twitter_misc":{"Written by":"TechSolutions","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/#article","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/"},"author":{"name":"TechSolutions","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f"},"headline":"Tips to protect your smartphone","datePublished":"2017-12-30T02:00:54+00:00","dateModified":"2022-03-02T13:42:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/"},"wordCount":659,"commentCount":0,"publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017December29Android_A.jpg","keywords":["2017december29android_a","android","cyber security","mobile phones","smartphones","tips"],"articleSection":["Android"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/","url":"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/","name":"Tips to protect your smartphone","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/#primaryimage"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017December29Android_A.jpg","datePublished":"2017-12-30T02:00:54+00:00","dateModified":"2022-03-02T13:42:08+00:00","breadcrumb":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/#primaryimage","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017December29Android_A.jpg","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017December29Android_A.jpg","width":900,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.techsolutionsinc.com\/blog\/tips-to-protect-your-smartphone\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techsolutionsinc.com\/"},{"@type":"ListItem","position":2,"name":"Tips to protect your smartphone"}]},{"@type":"WebSite","@id":"https:\/\/www.techsolutionsinc.com\/#website","url":"https:\/\/www.techsolutionsinc.com\/","name":"TechSolutions, Inc.","description":"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.","publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techsolutionsinc.com\/#organization","name":"TechSolutions, Inc.","url":"https:\/\/www.techsolutionsinc.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","width":338,"height":170,"caption":"TechSolutions, Inc."},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TechSolutionsIncDE\/","https:\/\/x.com\/TechSolutionsDE","https:\/\/www.linkedin.com\/company\/techsolutions-inc"]},{"@type":"Person","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f","name":"TechSolutions","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","caption":"TechSolutions"},"url":"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1211"}],"collection":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/comments?post=1211"}],"version-history":[{"count":1,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1211\/revisions"}],"predecessor-version":[{"id":4075,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1211\/revisions\/4075"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media\/1213"}],"wp:attachment":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media?parent=1211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/categories?post=1211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/tags?post=1211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}