10 SAFETY RULES WHEN WORKING WITH YOUR SMARTPHONE

Safety rules when working with your smartphone (photo)
One of the main problems is the smartphone to users for them. Despite the fact that smartphones are almost complete replacement for a laptop or home computer, many refer to him as a normal phone, which is fraught with possible negative consequences. 
To better understand how stupid things we often do on your phone, try to position it as not your fancy mobile, but as a smaller version of a laptop computer. With every action ask yourself the question: would I do on my laptop? That's how the problem will become more apparent.

1. We do not set a password for your smartphone
Somehow all care about the safety of your laptop, but do not pay enough attention to the smartphone.Why do we zaparolivaem system on a laptop? Obviously, we carry it with you, but there are people around us, and we do not want these people with a certain situation could freely get into our computer.
In this regard, in the smartphone even easier to get into, because we used to lay it on the table. Do not forget about the attacker. Unprotected password smartphone will cause a great temptation to steal from a thief, if he finds the lack of protection. In this regard, it is much easier to steal someone else smartphone, rather than spend time and energy on the discharge to protect your smartphone.
Smartphone - it's almost a complete replacement of the computer (photo)
2. We will make purchases via mobile browser, rather than through the application
Any self-respecting major online store offers smartphone users a special application for shopping. The fact that the data from the application is much harder to intercept, they are insulated inside and outside are much less visible.
In addition, malicious software can be operated via a browser, but to intervene in the buying process through the application much more difficult. The only thing you need to make sure the user - is the authenticity of the application being used and the lack of it "improvements" from third parties.
3. We do not razloginivaemsya in critical services
holy belief that our smartphone - it's only our smartphone, and no one will ever be able to reach it, and generates such carelessness. It is unlikely that you leave your bank card within reach of the people around them. It is understood that staying logged in financial and social services, you are actually completely give all their finances and personal information to anyone who would pick up your smartphone (especially in view of the first paragraph).
Do not allow such services to save your entries in the mobile browser or application. Of course, you do not really want to enter each time data at the entrance, but the price for financial security and data privacy.
Financial security when using your smartphone (photo)
4. We allow the smartphone to automatically connect to any open Wi-Fi network
Perhaps it is convenient, but here's how to find out who administers the network and what are his intentions? With appropriate software, which is freely available, the attacker can gain access to your data.
5. We reserve the Bluetooth enabled
smartphone hacking There are methods and via Bluetooth. Despite the fact that this method requires the immediate vicinity of the attacker from the victim, crowded places such as shopping malls, airports and similar places can be an excellent manger for such individuals.
6. We do not scrub data from old smartphones
Often people do not pay enough attention to the complete purification of the smartphone data before passing it to others. This can be a gift or sale, but you do not know who will end up device.
Need a premeditated plan for long-term transmission smartphone others, which must include factory reset with the complete removal of all the data, as well as low-level format the removable drive.
How to protect your smartphone from intruders (photo)
7. We download the incomprehensible applications from unknown sources
is great if Goolge help you find the apk file a paid application, but to analyze the contents of this application for malicious code or functions he can not. We rarely read permissions applications, and it is likely a situation where such a "freebie" suddenly merge all your logins, passwords, credit cards and other critical private information to third parties, in passing sending spam to all your friends and a few SMS to premium numbers.
It is worth remembering that in the world there are few enthusiasts who make the toll free only from a sense of solidarity with the principles of Linus Torvalds.
Malicious applications for smart phones (photos)
8. We keep very personal information on a smartphone
This largely relates to the preceding paragraphs, but it is necessary to understand: photos "not for everyone", e-mail and documents, financial data and any other information representing the value should not be stored on the smartphone accessible form. Especially talented and stored on the smartphone password file called "passwords." It is very polite towards intruders.
9. We do not clean history in the mobile browser
history stored in your mobile browser - it's almost the same as the situation described in the third paragraph. If the attacker is a persistent desire to gain access to your data, the presence of history in the browser can help them greatly.
10. We do not set a smartphone application to remotely formatting
Of course, if your device is stolen with the clear objective to steal data from it, then this application will not help, but if you have lost your smart phone or it was stolen just in order to sell, then this app will help if they do not return the smartphone, then at least to deprive the new owner access to your information.
Area paranoid
Perhaps you would think that all this gives nonweak paranoia. In the end, if you - not the head of the department of development of top-secret things, and your electronic accounts do not have millions, why would someone your data? Never rule out a simple self-indulgence, it has not been canceled. In addition, each account has stolen any service - a great spam-bot that has a list of friends to trust him. Anyway, the list of your contacts would not hurt to make a couple of large databases for spamming.
How to protect your smartphone (photo)

1 comment:

  1. I'm using AVG security for a few years now, I'd recommend this solution to everybody.

    ReplyDelete