How To: Change These Settings Now to Protect Your Data in Case Your Phone Is Stolen

How To: Change These Settings Now to Protect Your Data in Case Your Phone Is Stolen

As smartphone users, we live in dangerous times. The value of phones continues to rise, making them prime targets for thieves. In 2015, the FCC estimated that one million phones are stolen each year, and with several devices starting to hit the $1,000 mark now, these numbers are sure to rise. But what do you do if you fall victim to phone theft?Unfortunately, there's always a chance that you or someone you love will have their smartphone stolen. Replacing the phone, although costly, is easy to do — but your precious data is still vulnerable. If a thief is savvy enough, they can access the personal information on a stolen phone and potentially empty your bank account, steal your identity, or worse. Thankfully, we can protect ourselves.Since you can never know when your phone might be stolen, you'll need to take a proactive approach to lock down your data now. By following these tips, you can minimize the chances of a thief accessing your data while increasing the odds of locating your stolen device. Although we live in dangerous times, we do possess strong tools to protect ourselves.Don't Miss: How to Secure Your Texts & Other Communications on Android

Step 1: Install an Anti-Theft AppWith the rise of smartphone theft, many security-focused companies started to expand their efforts from remote threats to those nearby. This led to the creation of several anti-theft programs that combine different technologies to assist users if their device is stolen.Typically, these programs will include remote tracking so that you can locate your device and relay that information to the proper authorities. Remote wiping is another great feature that allows you to wipe the data and prevent unwarranted access. If you conduct regular backups, you won't lose any data, but the thief will not have access.Google provides these two features and the ability the ring your device to help you locate your phone as part of their Find My Device service, which is baked into all modern Android phones. This year, Google combined this program with an antivirus suite to create Play Protect, which acts as a security platform for Android smartphones. If anything happens to your phone, you can use the Find My Device app on another phone (or from the desktop) to see its location on Google Maps. But there's a problem here: Your GPS has to remain on for this feature to work. However, having your GPS always on will drain your battery faster, and it's a security risk in the sense that someone could track you using the same technology. Also, if your phone is turned off, tracking doesn't work.For these reasons, we recommend using Cerberus to supplement Google's default anti-theft measures. This all-in-one anti-theft solution provides all the basic functionality found in Find My Device, but expands on it significantly.Play Store Link: Cerberus (free) With Cerberus, you can remotely turn on GPS so that you can track the device. You can prevent someone from shutting down your device by tricking them with a fake shutdown menu. While they believe they've escaped detection, your phone would really be on and continue its tracking. You can hide the app so that they won't know Cerberus is installed.Cerberus has a web app that allows you to track your phone remotely, and when you first sign up, you'll receive an email with SMS commands that you can use to remotely control your phone. You can remote wipe both the local storage and the SD card. (1) Some of the features found in Cerberus. (2) Cerberus' IFTTT options. But one of the best features is the ability to take a picture or video of the perpetrator without their knowledge. It also has SIM checker that will inform you if the thief changes your SIM card, and it supports IFTTT to set up a series of commands that activate another program based on previous actions. Cerberus also has many more features to assist you if you unfortunately ever have to experience this situation.Cerberus is $5.52 a year, but has a seven-day free trial. We strongly recommend you use this program. By itself, it can be the difference between retrieving your phone or losing everything.

Step 2: Secure Your Lock ScreenOne of the most effective deterrents against unwanted access to your data is a secure lock screen. This starts with enabling one of the authentication methods to enter your device. Do not forgo the lock screen by using just a swipe up gesture or having none. By implementing any authentication, thieves will have some difficulty entering into your phone.As the absolute minimum, we recommend using the fingerprint scanner to enter your device. Fingerprint scanners provide the best balance between security and speed, as most scanners can detect your finger within a fraction of a second. As long as the thief doesn't force you to unlock your device, once they run away with your phone, they won't be able to access any of your data unless they can get your fingerprint. Fingerprint scanners provide adequate lock screen security. However, fingerprint scanners are a flawed security method since consciousness isn't required for access. For example, if you are sleeping on the subway and someone steals your phone, they can use your fingerprint while you sleep to access your phone and turn off the security. That is why, for maximum protection, we recommend a password.A strong password (with over eight characters and a combination of uppercase, lowercase, numbers, and special symbols while having no relation to you or known words) is the best way to impede access, as it requires you to be conscious to implement and is hard to replicate by simple observation. A strong password can last you years without anyone gaining access — although we recommend changing all passwords after 90 days for the best security.

Step 3: Enable Secure Start-UpWith Android 4.4 KitKat, Google introduced full-disk encryption to the platform. What this provided was a virtual safe that locked away all the data stored locally on your device, preventing anyone from accessing it. This encryption was optional, requiring the user to enable it. It prevented access to your phone after it was shut down (or restarted) by requiring the same passcode from your lock screen to decrypt the device for use.Google changed this with Android 7.0 Nougat to a file-based encryption to protect users from themselves. This is because some users would restart their phones and unknowingly be locked out their device for hours, not receiving notifications because the lock screen password hadn't been entered yet. Nougat also removed the default requirement of a passcode each time you restart your device, but you can re-enable it. That way, if a thief turns off your phone to hide his or her location, when they turn it back on, they will not be able to access its data without your passcode.To enable this feature, head to your phone's main Settings menu and select the "Security" option (it might be combined with another feature such as "Fingerprints & Security," depending on the skin). Choose the "Secure start-up" option, then enable the "require X to turn on phone" setting (X representing the lock screen security you are using, whether PIN, password, or pattern). You'll be prompted for this passcode, and then you're done.

Step 4: Secure Your AppsA secure lock screen with secure start-up offers great protection against thieves accessing your data. However, one of the leading principles in cybersecurity is layered security. By having protection at various levels, your data stands a better chance of not being accessed. For an additional layer of protection, we recommend securing apps individually.Not all apps contain precious data that could compromise us if accessed by another individual. However, for the apps that do, you can use an app called AppLock to provide additional protection.Play Store Link: AppLock (free) With AppLock, you can secure individual apps from being accessed without proper authentication. AppLock allows you to use either a pattern, PIN, or fingerprint to secure individual applications.AppLock also can prevent certain actions from being conducted without a passcode, such as installing or uninstalling apps, receiving calls, or toggling connectivity radios. It allows you to schedule protection based on the time of day or location if you choose.

Step 5: Hide Info from the Lock ScreenEven without requiring proper authentication, the notifications presented on your lock screen can contain valuable data. Although convenient, notifications such as text messages can be read from the lock screen without ever needing a passcode.To disable this, head to the Settings menu and select "Notifications" (for some skins, you'll need to search for "notifications" instead). Select the "Lock screen" option and choose "Hide sensitive only." Once enabled, the lock screen will still show all new notifications, but it will block the contents of messages, preventing someone from reading them without unlocking the device.

Step 6: Use a Password ManagerIt is convenient to use our favorite apps without having re-login in each time. Yet, if they are unlocked for you, they would be unlocked for a thief if he or she was able to gain access to your device. Hence, always log out of all important apps, such as banking or e-commerce. This way, your data is protected with layered security. Also, if possible, don't autofill your user name, as this can be used to retrieve your password. Hackers have used usernames to call up customer support to gain the access to accounts.To take things a step further, use a password manager to create secure passwords for all your accounts. If you try to make up a secure password for all of your accounts, you'll likely forget them — especially if they follow the good password guidelines.Password managers, such as LastPass, assist with this by only requiring you to know one strong password. LastPass can generate passwords for all your other accounts and store them in an encrypted database. The password generated can be as complex and long as necessary since you are not required to remember it.Play Store Link: LastPass (free) There may be more smartphones stolen each year, but the tools available now allow you to better protect your data and minimize the damage. By using these recommendations, you can safeguard your smartphone's data in the event it ever falls into the hands of a thief.This article was produced during Gadget Hacks' special coverage on smartphone privacy and security. Check out the whole Privacy and Security series.Don't Miss: Android Security 101 — How to Browse the Web SafelyFollow Gadget Hacks on Pinterest, Reddit, Twitter, YouTube, and Flipboard Sign up for Gadget Hacks' daily newsletter or weekly Android and iOS updates Follow WonderHowTo on Facebook, Twitter, Pinterest, and Flipboard
Cover image and screenshots by Jon Knight/Gadget Hacks



Update: If you're running iOS 7 or higher, you'll want to check out the new way to fully close your background applications. With this new feature, some might be confused on how to actually shut down their running apps, instead of leaving them on in the background. If you're confused as to how to
Quitting All Your Apps in iOS Can Actually Worsen Battery Life


How To Remove Or Change iOS 11 App Icon Label On Home Screen Without Jailbreak By Paul Morris | December 19th, 2017 The discovery and release of Ian Beer's iOS 11.1.2 exploit has opened up a seemingly endless list of possibilities that otherwise wouldn't have been possible without a full jailbreak.
How to Remove Icon Labels in iOS 5 - idownloadblog.com


How To: Install Ubuntu on your Samsung Galaxy Tab 10.1 Android tablet How To: Install Adobe Flash Player on a Samsung Galaxy S4 to Watch Amazon Instant Videos & More How To: Share Your Samsung Galaxy S3's Screen with Other Devices
How to Install Flash on Any Kindle Fire « Amazon Fire


Here is how to easily update and install iOS 10 on your iPhone, iPad, or iPod Touch. Before you update to iOS 10 make sure to backup your device either with iCloud or iTunes.
How to get iOS 9 on iPod touch 4g and iPhone 3GS and iPad 1


My Next Car how to video series - how to restore factory settings in Peugeot 308 iCockpit (2015, 2016 and 2017 Europe model). You use this if you want to return to the default values present when the vehicle was new.

My Book: http
TextingStory Chat Story Maker on the App Store - iTunes


However, it only lets you view YouTube videos, which is a drawback when there are so many good video hosting sites out there. If you want floating windows for YouTube videos as well as Facebook, TED, Vimeo, Vine, and other media sites, there's a better option. The only downside is that it requires root access.
Android 8.0 'Octopus' Could Be a Complete Misdirect


Lock down Six ways to increase your iPhone and iPad security in 2017! The iPhone and iPad make our lives more convenient than ever, but they can also help us make them more private and more secure.
How to Create a More Secure Passcode on Your iPhone or iPad

How to Uninstall Cydia Apps Directly from SpringBoard


Apple is expected to unveil iPhone 6s and iPhone 6s Plus on Wednesday, September 9, with a possible release date of September 18. If you intend to the buy iPhone 6s or iPhone 6s Plus then here's how to find out your upgrade eligibility status for Sprint, AT&T, Verizon or T-Mobile.
Are you eligible for an iPhone 6 upgrade? Here is how to find out


How To: Increase your Swype speed and text faster than ever How To: Change your phone and video ringtones on the Samsung Galaxy Tab How To: Record voice memos on the Apple iPhone 3G How To: Enable and use the Voice Control feature on an iPad
How to Type Faster with the Swype Keyboard for Android

0 comments:

Post a Comment