Smartphones are almost everywhere
these days. We also use our smartphones as a little black book
with all kinds of sensitive personal data such as login credentials for online
banking or social media sites. So take steps to protect your smartphone is
vital.
The problem is that smartphones are small and very portable and therefore easily lost or stolen.
Smartphone flights
A smartphone can be easily picked up from a table in a cafe or snatched from the hand of a user. The probability that the phone is stolen will be much greater than most people think.
Once a thief has his hands on his pride and joy, it can upload personal or financial data on your phone, such as bank details, press the reset button to erase your data, and then resell it. As you can see, the stolen phones generate a lot of income for groups that perform these flights. They also generate new business for manufacturers, to $ 30 billion per year in replacement phones in the United States alone.
Kill switches
In most forms of technology, a kill-switch is a single command or button that can stop a complicated system almost immediately. On a smartphone, which is the stop command.
There are actually two types of kill switches for smartphones - a permanent brick kill-switch drive a telephone and a gentle alternative that makes a phone unusable for all but the rightful owner.
All you need is access to a computer, tablet, laptop or smartphone to activate the kill-switch remotely.
Kill switches work. Apple added a kill-switch to devices in September 2013. Within 12 months, the number of stolen iPhones fell 40 percent in San Francisco and 25 percent in New York. In London, the smartphone theft fell 50 percent.
So far, Apple, Samsung and Google have implemented Kill keys on their smartphones and Microsoft should launch an operating system with a kill-switch for its Windows phones in 2015.
The chances that the smartphone can be lost or stolen are still very high. In fact 44 percent of flights are due to distracted owners who leave their phone in public places.
Protect your data using a simple PIN or password to 4 digits to lock the phone screen. If you use a screen lock that requires a code to access the phone you leave your contact, text messages, email accounts and social networks open to anyone who receives your phone.
Make contact sheet ... use wallpaper smartphone (the guy you see on the screen when you get it) like a contact sheet to register your name, alternate phone number, e -mail and a financial reward for the return.
The easiest way to save your material (image, coordinates, etc.) is connect your phone to a computer using a USB cable. Then drag and drop items to your desktop device.
Fortunately, these days, most phones automatically back up your contacts and data online, as with Android devices that link to your Google and Apple account to connect to iTunes and iCloud.
Install tracking software ... using tracking applications that allow you to locate your phone on a card if it is lost or stolen. Some even allow you to view a message, remotely lock the device to play a sound alarm sound, even if it is in silent mode. You can learn more from you local cell phone store.
Use a kill-switch ... getting a phone with a kill-switch or by activating the kill switch you already have.
Note that some smartphone systems require consumers to opt-ignition, that is, they are not protected when the phones work in standard mode.
First, read reviews from users to check for problems with a specific application. During installation, pay attention to the type of access that the application requires.
The problem is that smartphones are small and very portable and therefore easily lost or stolen.
Smartphone flights
A smartphone can be easily picked up from a table in a cafe or snatched from the hand of a user. The probability that the phone is stolen will be much greater than most people think.
Once a thief has his hands on his pride and joy, it can upload personal or financial data on your phone, such as bank details, press the reset button to erase your data, and then resell it. As you can see, the stolen phones generate a lot of income for groups that perform these flights. They also generate new business for manufacturers, to $ 30 billion per year in replacement phones in the United States alone.
Kill switches
In most forms of technology, a kill-switch is a single command or button that can stop a complicated system almost immediately. On a smartphone, which is the stop command.
There are actually two types of kill switches for smartphones - a permanent brick kill-switch drive a telephone and a gentle alternative that makes a phone unusable for all but the rightful owner.
All you need is access to a computer, tablet, laptop or smartphone to activate the kill-switch remotely.
Kill switches work. Apple added a kill-switch to devices in September 2013. Within 12 months, the number of stolen iPhones fell 40 percent in San Francisco and 25 percent in New York. In London, the smartphone theft fell 50 percent.
So far, Apple, Samsung and Google have implemented Kill keys on their smartphones and Microsoft should launch an operating system with a kill-switch for its Windows phones in 2015.
The chances that the smartphone can be lost or stolen are still very high. In fact 44 percent of flights are due to distracted owners who leave their phone in public places.
Protect your data using a simple PIN or password to 4 digits to lock the phone screen. If you use a screen lock that requires a code to access the phone you leave your contact, text messages, email accounts and social networks open to anyone who receives your phone.
Make contact sheet ... use wallpaper smartphone (the guy you see on the screen when you get it) like a contact sheet to register your name, alternate phone number, e -mail and a financial reward for the return.
The easiest way to save your material (image, coordinates, etc.) is connect your phone to a computer using a USB cable. Then drag and drop items to your desktop device.
Fortunately, these days, most phones automatically back up your contacts and data online, as with Android devices that link to your Google and Apple account to connect to iTunes and iCloud.
Install tracking software ... using tracking applications that allow you to locate your phone on a card if it is lost or stolen. Some even allow you to view a message, remotely lock the device to play a sound alarm sound, even if it is in silent mode. You can learn more from you local cell phone store.
Use a kill-switch ... getting a phone with a kill-switch or by activating the kill switch you already have.
Note that some smartphone systems require consumers to opt-ignition, that is, they are not protected when the phones work in standard mode.
First, read reviews from users to check for problems with a specific application. During installation, pay attention to the type of access that the application requires.
Put Wi-Fi and Bluetooth ... when not in use to reduce the chances that hackers can connect to your smartphone and steal your personal and financial information.
Do not save login information app ... for sensitive applications or websites in your mobile browser, such as banking or social media sites. If you save your login information and your phone falls into the wrong hands, a foreigner can connect to their bank accounts or other sensitive accounts with the recorded information.
Buy an alarm proximity ... to warn you when you phone is a few meters from you.
Connect the transmitter to your smartphone. If the transmitter is supported by 15 to 25 feet away from the receiver, the alarm sounds.
Alarms in some proximity alarms are not too high.
0 komentar