Put your phone’s security at risk in these ways

Things putting our phones at risks

Security is a major issue for all smartphones. But we intently do many things that can easily put our smartphones at risk. Here are 10 things we do to stake the security of our phones.

020914-inner

Not setting PIN and password

The worst thing you can do to stake your phone’s security is – not setting a PIN or password to restrict an unwanted access to it. The easier way to breach security of a phone is to access it directly. In case you lose your phone that you never enabled any of screen-lock methods in, the person who is going to find it may easily access all its data.

Messing up with security settings

Many people temper Factory Settings through methods called jailbreaking (for iOS) and rooting (for Android) to get some locked privileges in phones. These methods badly affect the built-in security settings of a phone. It’s true that sooner or later every rooted or jailbroken smartphone will get bricked. When you mess up with factory security settings you make your phone more vulnerable to attacks.

Ignoring back up

Although taking back up of phone’s data isn’t a part of security but you would miss everything in your phone when it is lost or stolen. Many people, who do never back up their phone’s contacts, documents and photos, regret later when their phone is stolen or lost.

Downloading apps from un-trusted sources

Downloading apps from any source you found is another way you can easily stake your phone’s security. It’s very common with Android phones. Because Android is an open-source software, users have freedom of downloading apps from un-trusted sources. This isn’t a general case with iOS devices as downloading apps from places other than iOS app store is prohibited, though jailbroken iPhones may have powers to allow downloading apps from other sources too.

Allowing illogical permission

There is always something fishy in a torch app that wants you to grant it permission to your phone’s GPS, contact list, media files etc. People do not often logically check permissions of apps and later encounter security breaches.

Not enabling security features

Today’s mobile phones come with a range of security features that allow you to locate and erase all your data from a stolen or lost phone. These features work even without GPS. There are apps that can activate a loud alarm even if the phone is on silent mode. There are many similar security apps available across stores.

Not installing updates and patches

Ignoring app and OS security-patch updates make your device vulnerable to new risks. App and OS developers keep discovering weak areas in their software and sending updates to fix related issues. If you have been ignoring these updates for so long, there could be new security flaws that your device will not be able to handle.

Using Wi-Fi stupidly

It’s a bad idea to connect your smartphone to any open Wi-Fi available without thinking it twice that cybercriminals can easily target devices connected to open Wi-Fi networks. Connecting a device to un-trusted Wi-Fi can cause breaches to data and personal/sensitive information.

Reselling or donating an old phone without wiping out its data

It can be unsafe to sell your old phone without wiping out its data. You may argue that you have logged out all your accounts but that doesn’t mean histories will automatically be erased. An expert can easily discover various sorts of information even from signed out devices.

Not reporting a stolen smartphone

It’s another way you can put yourself — not the device — at risk. If your device is lost or stolen, first thing you should do is – report the same to your local law enforcement to avoid any blame of illegal activities that someone can conduct from it. If you don’t do this, you are deliberately putting yourself in a potential problem that could rise up today, or few months later

Similar Posts

Leave a comment

Your email address will not be published.