SlideShare a Scribd company logo
1 of 10
Download to read offline
HOW TO (SAFELY) CUT 
THE CORD WITH YOUR 
OLD iPHONE
Excited for the new iPhone 6? 
With Apple reportedly building 80 million new 
iPhones this year, it’s safe to say that 
You’re not alone!
What happens to your old phone when you upgrade? 
Whether you’re selling, donating or recycling your old phone, the 
personal data stored on it doesn’t disappear just because you stop 
using it every day. 
?
Now a stranger has your phone. So what? 
As a handful of celebrities just learned, privacy is no joke when it comes 
to the private photos, emails and data that are living on your iPhone.
How do you give your old phone a permanent scrub? 
Hint: it takes more than just dropping files into the on-screen 
garbage can.
 
 
1 
 
 
 
 
 
 
BACK UP ALL YOUR DATA 
 
 
 
 
Use phone backup software to ensure all your 
photos, contacts and other data are safely stored 
where you can retrieve them. You can backup the 
data by syncing to iTunes on your computer, using 
iCloud or third-party backup services, like Lookout. 
 
 
 
 
 
 
 
 
 

2 
ERASE THE DATA 
To completely erase the device and turn off iCloud, 
iMessage, FaceTime and other services go to Settings > 
General > Reset and tap Erase All Content and Settings. If 
you’re on iOS 7, you’ll need to turn off the Find My Phone 
feature before doing this. This process returns the device to 
state it was when it was shipped from the factory. 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

3 
UNLINK APPS AND ACCOUNTS 
Beyond the data that resides on the phone, you also want to 
make sure no one can access your Facebook or any other 
accounts you accessed on that device that authenticated you 
based on the iPhone's unique hardware ID. You should visit 
the websites of those apps to unlink the phone from your 
account. You can also unregister your iPhone from Apple’s 
website so it is no longer linked to your Apple ID by visiting: 
https://supportprofile.apple.com/MySupportProfile.do and 
clicking on edit products after you’ve logged in.
4 
REMOVE THE SIM CARD 
Think of the SIM card as your mobile identity. 
It’s better off staying with you. 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

For more mobile security tips, follow

More Related Content

What's hot

What's hot (20)

How To Identify A Fake App In Playstore
How To Identify A Fake App In PlaystoreHow To Identify A Fake App In Playstore
How To Identify A Fake App In Playstore
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady Apps
 
How to Recover Deleted Videos on iPhone
How to Recover Deleted Videos on iPhoneHow to Recover Deleted Videos on iPhone
How to Recover Deleted Videos on iPhone
 
Jail breaking
Jail breakingJail breaking
Jail breaking
 
WhatsApp Chat Hacking/Stealing POC
WhatsApp Chat Hacking/Stealing POCWhatsApp Chat Hacking/Stealing POC
WhatsApp Chat Hacking/Stealing POC
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
How to install cell phone spyx
How to install cell phone spyxHow to install cell phone spyx
How to install cell phone spyx
 
Forgot restrictions passcode - How to Reset Restrictions Passcode on iPhone
Forgot restrictions passcode - How to Reset Restrictions Passcode on iPhoneForgot restrictions passcode - How to Reset Restrictions Passcode on iPhone
Forgot restrictions passcode - How to Reset Restrictions Passcode on iPhone
 
Best Cell Phone Spyware - HelloSpy installation on Android phone
Best Cell Phone Spyware - HelloSpy installation on Android phoneBest Cell Phone Spyware - HelloSpy installation on Android phone
Best Cell Phone Spyware - HelloSpy installation on Android phone
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
How to secure your Gmail account using android phones?
How to secure your Gmail account using android phones?How to secure your Gmail account using android phones?
How to secure your Gmail account using android phones?
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
iCloud
iCloudiCloud
iCloud
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
 
Recover data from iOS device
Recover data from iOS deviceRecover data from iOS device
Recover data from iOS device
 
2FA, WTF? - Phil Nash - Codemotion Amsterdam 2016
2FA, WTF? -  Phil Nash - Codemotion Amsterdam 20162FA, WTF? -  Phil Nash - Codemotion Amsterdam 2016
2FA, WTF? - Phil Nash - Codemotion Amsterdam 2016
 
Iphone and ipad kids safety
Iphone and ipad kids safetyIphone and ipad kids safety
Iphone and ipad kids safety
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
News Bytes - June 2015 - Null HYD
News Bytes - June 2015 - Null HYDNews Bytes - June 2015 - Null HYD
News Bytes - June 2015 - Null HYD
 

Viewers also liked

А. Илларионов - Предчувствие катастрофы
А. Илларионов - Предчувствие катастрофыА. Илларионов - Предчувствие катастрофы
А. Илларионов - Предчувствие катастрофы
guest743108
 
【Interop tokyo 2014】 回線の有効活用を可能にするCisco iWANによる最新WAN構築
【Interop tokyo 2014】  回線の有効活用を可能にするCisco iWANによる最新WAN構築【Interop tokyo 2014】  回線の有効活用を可能にするCisco iWANによる最新WAN構築
【Interop tokyo 2014】 回線の有効活用を可能にするCisco iWANによる最新WAN構築
シスコシステムズ合同会社
 

Viewers also liked (20)

Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
タイムボックス制約付きインクリメンタル開発
タイムボックス制約付きインクリメンタル開発タイムボックス制約付きインクリメンタル開発
タイムボックス制約付きインクリメンタル開発
 
Axa early research and concepts
Axa early research and conceptsAxa early research and concepts
Axa early research and concepts
 
Jani voert drastische boekhoudkundige wijziging door bij firma
Jani voert drastische boekhoudkundige wijziging door bij firmaJani voert drastische boekhoudkundige wijziging door bij firma
Jani voert drastische boekhoudkundige wijziging door bij firma
 
Making Wearables Tip
Making Wearables TipMaking Wearables Tip
Making Wearables Tip
 
А. Илларионов - Предчувствие катастрофы
А. Илларионов - Предчувствие катастрофыА. Илларионов - Предчувствие катастрофы
А. Илларионов - Предчувствие катастрофы
 
Fietsenwinkel Niels Albert loopt als... een trein
Fietsenwinkel Niels Albert loopt als... een treinFietsenwinkel Niels Albert loopt als... een trein
Fietsenwinkel Niels Albert loopt als... een trein
 
Leveraging Social Media Platforms; Techniques and Tools to Monitor and Measur...
Leveraging Social Media Platforms; Techniques and Tools to Monitor and Measur...Leveraging Social Media Platforms; Techniques and Tools to Monitor and Measur...
Leveraging Social Media Platforms; Techniques and Tools to Monitor and Measur...
 
A wearables story mobile dev and test 2016
A wearables story mobile dev and test 2016A wearables story mobile dev and test 2016
A wearables story mobile dev and test 2016
 
Social media
Social mediaSocial media
Social media
 
【Interop tokyo 2014】 回線の有効活用を可能にするCisco iWANによる最新WAN構築
【Interop tokyo 2014】  回線の有効活用を可能にするCisco iWANによる最新WAN構築【Interop tokyo 2014】  回線の有効活用を可能にするCisco iWANによる最新WAN構築
【Interop tokyo 2014】 回線の有効活用を可能にするCisco iWANによる最新WAN構築
 
CES 2016: The State of Fitness Wearables
CES 2016: The State of Fitness WearablesCES 2016: The State of Fitness Wearables
CES 2016: The State of Fitness Wearables
 
Account Management Best Practices: Strategies, Tactics & More to Increase Ret...
Account Management Best Practices: Strategies, Tactics & More to Increase Ret...Account Management Best Practices: Strategies, Tactics & More to Increase Ret...
Account Management Best Practices: Strategies, Tactics & More to Increase Ret...
 
eMarketer Webinar: Wearables—10 Insights on Device Adoption and Business Oppo...
eMarketer Webinar: Wearables—10 Insights on Device Adoption and Business Oppo...eMarketer Webinar: Wearables—10 Insights on Device Adoption and Business Oppo...
eMarketer Webinar: Wearables—10 Insights on Device Adoption and Business Oppo...
 
Safdarjang (or Safdarjung) Tomb - one of New Delhi's most beautiful historica...
Safdarjang (or Safdarjung) Tomb - one of New Delhi's most beautiful historica...Safdarjang (or Safdarjung) Tomb - one of New Delhi's most beautiful historica...
Safdarjang (or Safdarjung) Tomb - one of New Delhi's most beautiful historica...
 
The State of Wearables Today
The State of Wearables TodayThe State of Wearables Today
The State of Wearables Today
 
A Globo e os #panamapapers
A Globo e os #panamapapersA Globo e os #panamapapers
A Globo e os #panamapapers
 
Seminário03 - Por uma prática docente crítica e construtiva
Seminário03 - Por uma prática docente crítica e construtivaSeminário03 - Por uma prática docente crítica e construtiva
Seminário03 - Por uma prática docente crítica e construtiva
 

Similar to How to (Safely) Cut the Cord With Your Old iPhone

Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – and
RandyBett
 
Fonepaw iphone data recoevry
Fonepaw iphone data recoevryFonepaw iphone data recoevry
Fonepaw iphone data recoevry
JamesDanial
 
I phone tips for new and advanced users
I phone tips for new and advanced usersI phone tips for new and advanced users
I phone tips for new and advanced users
Dianne Rabago Abaya
 

Similar to How to (Safely) Cut the Cord With Your Old iPhone (20)

How to ensure your mobile data is secured
How to ensure your mobile data is securedHow to ensure your mobile data is secured
How to ensure your mobile data is secured
 
Steps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossSteps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or Loss
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
How to track my i phone if its stolen
How to track my i phone if its stolenHow to track my i phone if its stolen
How to track my i phone if its stolen
 
HOW TO LOCATE YOUR IPHONE WHEN IT GOES MISSING
HOW TO LOCATE YOUR IPHONE WHEN IT GOES MISSINGHOW TO LOCATE YOUR IPHONE WHEN IT GOES MISSING
HOW TO LOCATE YOUR IPHONE WHEN IT GOES MISSING
 
How to Unlock iPhone Passcode
How to Unlock iPhone PasscodeHow to Unlock iPhone Passcode
How to Unlock iPhone Passcode
 
Imei tracker software
Imei tracker softwareImei tracker software
Imei tracker software
 
How to reset i phone without apple id
How to reset i phone without apple idHow to reset i phone without apple id
How to reset i phone without apple id
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – and
 
How to Retrieve Contacts from iphone
How to Retrieve Contacts from iphoneHow to Retrieve Contacts from iphone
How to Retrieve Contacts from iphone
 
Tips and tricks from the experts on iPhone Data Recovery.pptx
Tips and tricks from the experts on iPhone Data Recovery.pptxTips and tricks from the experts on iPhone Data Recovery.pptx
Tips and tricks from the experts on iPhone Data Recovery.pptx
 
Forgot iPhone Passcode without Restore -How to Reset It without Passcode
Forgot iPhone Passcode without Restore -How to Reset It without PasscodeForgot iPhone Passcode without Restore -How to Reset It without Passcode
Forgot iPhone Passcode without Restore -How to Reset It without Passcode
 
Restore iPhone data easily
Restore iPhone data easilyRestore iPhone data easily
Restore iPhone data easily
 
A Complete Guide to Cyber Hygiene
A Complete Guide to Cyber HygieneA Complete Guide to Cyber Hygiene
A Complete Guide to Cyber Hygiene
 
15 cool i phone hacks to try
15 cool i phone hacks to try15 cool i phone hacks to try
15 cool i phone hacks to try
 
How to Set up a Personal Hotspot on iPhone
How to Set up a Personal Hotspot on iPhoneHow to Set up a Personal Hotspot on iPhone
How to Set up a Personal Hotspot on iPhone
 
Confused by your new phon1
Confused by your new phon1Confused by your new phon1
Confused by your new phon1
 
Fonepaw iphone data recoevry
Fonepaw iphone data recoevryFonepaw iphone data recoevry
Fonepaw iphone data recoevry
 
I phone tips for new and advanced users
I phone tips for new and advanced usersI phone tips for new and advanced users
I phone tips for new and advanced users
 
Enjoying Your Unique IPhone
Enjoying Your Unique IPhoneEnjoying Your Unique IPhone
Enjoying Your Unique IPhone
 

More from Lookout

2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
Lookout
 
Dragon lady
Dragon ladyDragon lady
Dragon lady
Lookout
 
History of Lookout
History of LookoutHistory of Lookout
History of Lookout
Lookout
 
Sécurité Mobile 101
Sécurité Mobile 101Sécurité Mobile 101
Sécurité Mobile 101
Lookout
 

More from Lookout (19)

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise Products
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for Good
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?
 
Dragon lady
Dragon ladyDragon lady
Dragon lady
 
Dragon Lady
Dragon LadyDragon Lady
Dragon Lady
 
History of Lookout
History of LookoutHistory of Lookout
History of Lookout
 
Scaling Up Lookout
Scaling Up LookoutScaling Up Lookout
Scaling Up Lookout
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21
 
Sécurité Mobile 101
Sécurité Mobile 101Sécurité Mobile 101
Sécurité Mobile 101
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

How to (Safely) Cut the Cord With Your Old iPhone

  • 1. HOW TO (SAFELY) CUT THE CORD WITH YOUR OLD iPHONE
  • 2. Excited for the new iPhone 6? With Apple reportedly building 80 million new iPhones this year, it’s safe to say that You’re not alone!
  • 3. What happens to your old phone when you upgrade? Whether you’re selling, donating or recycling your old phone, the personal data stored on it doesn’t disappear just because you stop using it every day. ?
  • 4. Now a stranger has your phone. So what? As a handful of celebrities just learned, privacy is no joke when it comes to the private photos, emails and data that are living on your iPhone.
  • 5. How do you give your old phone a permanent scrub? Hint: it takes more than just dropping files into the on-screen garbage can.
  • 6.   1       BACK UP ALL YOUR DATA     Use phone backup software to ensure all your photos, contacts and other data are safely stored where you can retrieve them. You can backup the data by syncing to iTunes on your computer, using iCloud or third-party backup services, like Lookout.          
  • 7. 2 ERASE THE DATA To completely erase the device and turn off iCloud, iMessage, FaceTime and other services go to Settings > General > Reset and tap Erase All Content and Settings. If you’re on iOS 7, you’ll need to turn off the Find My Phone feature before doing this. This process returns the device to state it was when it was shipped from the factory.                      
  • 8. 3 UNLINK APPS AND ACCOUNTS Beyond the data that resides on the phone, you also want to make sure no one can access your Facebook or any other accounts you accessed on that device that authenticated you based on the iPhone's unique hardware ID. You should visit the websites of those apps to unlink the phone from your account. You can also unregister your iPhone from Apple’s website so it is no longer linked to your Apple ID by visiting: https://supportprofile.apple.com/MySupportProfile.do and clicking on edit products after you’ve logged in.
  • 9. 4 REMOVE THE SIM CARD Think of the SIM card as your mobile identity. It’s better off staying with you.                      
  • 10. For more mobile security tips, follow