Categories: Mobile

How to protect your smartphone data from being stolen

One of the biggest threats to our smartphone privacy isn’t Carrier IQ or any kind of malware but ourselves.  We store countless pieces of personal and corporate data on our phones which, if lost or stolen, could be accessed and used by anyone.

Credit: Lookout

So how do you protect your smartphone’s data and your privacy?  Threatscape’s MD, Dermot Williams, took us through how you can keep your data secure even if you lose your phone.

Read more security advice from Dermot Williams here.

The Technology
The most basic form of phone protection is your PIN but many of us undermine our own security by choosing unsecure PINs.  Many phones won’t allow you to use basic PINs like 0000 or 1234 but if you phone does, or if you are using these numbers, then you should change them.  If you’re not using a PIN then your data is open to the world.

Bluetooth and WiFi
The same goes for Bluetooth, be sure to use a unique Bluetooth PIN and when not connected to an external device to turn your Bluetooth connection off, even if just to save your battery.

For WiFi connections make sure you use encryption where possible.  Only this year Google had to plug an Android WiFi security hole which would have allowed people to snoop on other’s WiFi data.  Apple and Android apps like Lookout can give you more information and protection when connecting to unsecured WiFi channels.

One of the first things you should do when you turn on your new phone (after setting a secure PIN) is to download a mobile tracking app.  Again, Lookout is a good option for both iPhone and Android.  We’ve covered Lookout Mobile Security before but we haven’t gone into too much detail about the app’s tracking system.  With Lookout you have the ability to locate your phone using the app’s site and using the same site you can lock and even wipe your phone.

Apps
Only download apps from trusted sources, if you are an iPhone user chances are you will feel more protected than Android or Windows Phone 7 users but don’t be complacent.  All three companies have the ability to remotely delete apps after they have been installed on your smartphone, suggesting that they fear malware could get through their app markets’ vetting systems.  They can do this for a number of reasons but user and data security are the main ones.  Thankfully, so far Google is reportedly the only manufacturer to have used their “kill-switch” and they have not had to use it often.

If your iPhone, Android, or WP7 have been jailbroken be extra careful with the apps you install.  You should ask yourself if jailbreaking your phone is worth the increased security risks.

You
There are a number of apps on your smartphone that you probably can’t live without; personal/work email, Twitter, Facebook would be the main ones but these are also the apps which would give would-be thieves access to accounts you’d rather keep private.  To be absolutely sure that your data is not at risk on your phone Williams recommends you log out of each account when finished.  Leaving your phone logged into your social media, and personal email accounts is a risk to your privacy; leaving your phone logged into your work email is another story entirely.

Remotely log out of your social media apps
Remember that if your phone is taken and it is logged into your social and email accounts there are a few things that you can do.

 

Loose lips
Be careful what you say when you are logged into your personal accounts with your smartphone.  Even SMS messages can contain personal information that you might not want others to see. Consider downloaded a trustworthy app that backups your text messages to your email account.  This way you can be sure you always have a copy of them and you can delete ones with personal information from your phone directly.

Remember to back up your phone on a regular basis; at least this way if it is lost or stolen you don’t have to worry about losing your data.  If your phone is stolen make sure you know where its IMEI number is (it’s usually on the phone’s box) so when you report it stolen to your service provider they can prevent it from making calls.

When your phone comes to the end of its life be certain that you have completely wiped all data from it before you recycle it.

Recovered your phone?
If you recover your phone Williams recommends you check its security settings to ensure nothing was changed.  Also check your apps to be sure nothing new apps were installed.

And with this you should be more secured with your phone.

Ajit Jain

Ajit Jain is marketing and sales head at Octal Info Solution, a leading iPhone app development company and offering platform to hire Android app developers for your own app development project. He is available to connect on Google Plus, Twitter, Facebook, and LinkedIn.

View Comments

Recent Posts

AI safety for kids a top concern for COPPA compliant AI startups

June means the start of summer is upon us, and as teachers put the 2024-2025…

2 days ago

DARPA to simulate disease outbreaks: model lockdown, vaccination & messaging strategies

Why is DARPA modeling disease outbreaks & intervention strategies while simultaneously looking to predict &…

4 days ago

ManagedMethods launches Advanced Phishing solution against rising tide of malicious emails 

Earlier this year, a report from non-profit organization the Center for Internet Security shone a…

4 days ago

DARPA ‘CoasterChase’ looks to mitigate stress with ingestible neurotech

DARPA is putting together a research program called CoasterChase that aims to mitigate warfighters' stress…

5 days ago

U.S. Fusion Power Plant Design Passes Independent Review

In the global race to develop and commercialize fusion power reactors, U.S. scientists have reached…

5 days ago

Pet Health Meets Convenience: New Partnership Aims to Empower Pet Owners with At-Home Testing

Innovative Pet Lab, a science-forward company offering at-home health tests for pets, today announced a…

1 week ago