10 steps for smartphone safety Page Article Set PINs and passwords. To prevent unauthorized access to your phone, set a password or Personal Identification Number (PIN) on your phone’s home screen as the first line of defense in case your phone is lost or stolen. When possible, use a different password for each of your important log-ins (email, banking, personal sites, etc.). You should configure your phone to automatically lock after five minutes or less when your phone is idle, as well as use the SIM password capability available on most smartphones.Apple iOS: Understanding passcodes Do not modify your smartphone’s security settings. Do not alter security settings for convenience. Tampering with your phone’s factory settings, jailbreaking, or rooting your phone undermines the built-in security features offered by your wireless service and smartphone while making it more susceptible to an attack. Apple iOS: Backup and restore overview Back up and secure your data. You should back up all of the data stored on your phones – such as your contacts, documents, and photos. These files can be stored on your computer, on a removal storage card, or in the cloud. This will allow you to conveniently restore the information to your phone should it be lost, stolen, or otherwise erased. Only install apps from trusted sources. Before downloading an app, conduct research to ensure the app is legitimate. Checking the legitimacy of an app may include such things as checking reviews, confirming the legitimacy of the app store, and comparing the app sponsor’s official website with the app store link to confirm consistency. Many apps from untrusted sources contain malware that once installed can steal information, install viruses, and cause harm to your phone’s contents. There are also apps that warn you if any security risks exist on your phone. Understand app permissions before accepting them. You should be cautious about granting applications access to personal information on your phone or otherwise letting the application have access to perform functions on your phone. Make sure to also check the privacy settings for each app before installing it. - Apple iOS: Set up Find My iPhone- Apple iOS: Locate your device on a map- Apple iOS: Lock and track your device Instale aplicaciones de seguridad que permitan la localización y el borrado remotos. Una importante característica de seguridad ampliamente disponible en los smartphones, ya sea por por defecto o como una aplicación, es la capacidad de localizar y borrar remotamente todos los datos almacenados en tu teléfono, incluso si el GPS del teléfono está apagado. En el caso de que que extravíes tu teléfono, algunas aplicaciones pueden activar una fuerte alarma, incluso incluso si el teléfono está en silencio. Estas aplicaciones también pueden ayudarte a localizar y recuperar tu teléfono cuando lo pierdas. Accept updates and patches to your smartphone’s software. You should keep your phone’s operating system software up-to-date by enabling automatic updates or accepting updates when prompted by your service provider, operating system provider, device manufacturer, or application provider. By keeping your operating system current, you reduce the risk of exposure to cyber threats. Apple iOS: How to update your iPhone, iPad, or iPod touch Be smart on open Wi-Fi networks. When you access a Wi-Fi network that is open to the public, your phone can be an easy target of cybercriminals. You should limit your use of public hotspots and instead use protected Wi-Fi from a network operator you trust or a mobile wireless connection to reduce your risk of exposure, especially when accessing personal or sensitive information. Always be aware when clicking web links and be particularly cautious if you are asked to enter account or log-in information. Wipe data on your old phone before you donate, resell, or recycle it. Your smartphone contains personal data you want to keep private when you dispose of your old phone. To protect your privacy, completely erase data off of your phone and reset the phone to its initial factory settings. Now having wiped your old device, you are free to donate, resell, recycle or otherwise properly dispose of your phone. Apple iOS: Understanding ‘erase all contents and settings’ Denunciar el robo de un smartphone. Los principales proveedores de servicios inalámbricos, en coordinación con la FCC, han creado una base de datos de teléfonos robados. Si Si le roban el teléfono, debe denunciar el robo a las autoridades locales de la ley local y luego registrar el teléfono robado con su proveedor de servicios inalámbricos. De este modo, los principales proveedores de servicios inalámbricos proveedores de servicios inalámbricos que el teléfono ha sido robado y permitirá "el teléfono para que no pueda activarse en ninguna red inalámbrica sin su permiso. inalámbrica sin su permiso.