Secure Mobile Phone Data


Our mobile phone or smartphone, contains more information about us. Yet, unlike a computer, we secure little, if any, its access. In case of loss or theft, very personal information can be read and be public. How to protect its information on a smartphone

Note the number “IMEI” phone

The IMEI is a unique serial number, composed of 15 to 17 digits identifying your phone. This is somehow the DNA of the mobile. If lost or stolen, this code is used to block the use of phone on any network. It is stated on the box of the phone when you bought it. Write it down and keep it in a safe place (not on your phone). Tip: You can get the IMEI by typing.

Always put in place a code “PIN”

The PIN (Personal Identification Number) control the SIM card (smart card inserted in the remote phone) when you turn the phone. This code locks the phone after 3 wrong codes consecutive. Tip: Choose a complicated code. No birth date or nickname

Set up a phone lock code

In addition to the PIN code, this code allows inactivate (lock) the phone after a certain time.

This prevents the consultation of information in the phone in case of loss or theft.

Enable encryption of the phone backups

To do this, use the platform settings with which you connect the phone. This manipulation will ensure that no one will be able to use your data without the password you set. This encryption prevents malicious access to Don-born stored on the computer. It also allows you to remotely wipe all data on in a phone, which provides extra security in case of theft or loss of equipment.

Do not automatically be accepted geo location

You can control when and by whom it can be geo located. Simply adjust the geo location phone settings or location-based applications (Twitter, Facebook Places, Foursquare, Plyce …). It is also possible to turn off or suspend the geo location service any time, select the contacts that are allowed to access location data. In general, it is recommended to read the conditions of use during installation location-based application. It should also pay attention to messages asking permission access to certain information that appears when an application is launched.


Comments are closed.