SlideShare ist ein Scribd-Unternehmen logo
1 von 4
8
 Steps to
Smartphone
 Security
for Android
Securing a Smartphone is as important as securing your PC, or
perhaps more important, as most of our personal information is
now on our Smartphones. If you have a Android phone, then here
are 10 ways to secure your Smartphone. These Smartphone
security tips will keep all malicious activities at bay.

1.Set PINs and passwords
To avoid unauthorized access to your android phone, set a
password or Personal Identification Number (PIN) on your
phone’s home screen, as a first line of defense. You should also
configure your phone to automatically lock after 5 minutes or
when your phone is idle. Activate the SIM password capability
that is now available on almost all android Smartphones.

2. Do not modify security settings
It is not the best practice to alter security settings as per your
convenience in your android Smartphone. Tampering with your
phone’s factory settings, jail-breaking or even rooting your android
phone will undermine its security features, making it vulnerable to
attacks.

3. Backup and secure your data
It is important that you backup all data that is stored on your
phone like contacts, documents and even photos. These files can
be stored on your computer, or on a detachable storage card or
even in the cloud. By taking this backup, you will be able to
conveniently restore information to your phone if there is any
software problem or your phone is damaged.

4. App installation
Apps make us all very excited. But it is extremely important that
you download apps only from trusted app stores or sources. You
should also do some research to make sure that the app is
legitimate. Check reviews, see from what app store are you
purchasing the app and compare the app sponsor’s official
website with the app store link to check consistency. Downloading
apps from untrusted websites can contain malware. Once
installed it can steal your personal data, corrupt files and install
viruses. Be very careful in granting access to personal information
via apps.
Along with this, also install android security apps that enable
remote location and wiping. Your android has the capability of
being tracked from a remote location. You can even erase all the
data stored on your android phone in case it is misplaced or
stolen.

5. Accept updates and patches to your android software
Just as we require software updates in our PC, we also need to
enable automatic updates on our android Smartphone. By
keeping your OS current, you reduce the risk of exposure to
different cyber threats.

6. Be careful of Wi-Fi networks
Accessing a public Wi-Fi network can prove to be a potential
threat to your android Smartphone. It is better that you limit your
usage of public hotspots and only avail Wi-Fi from a reliable
network operator. Be very cautious if you are asked to enter
account or log in information.

7. Wipe your android clean
If you are planning to donate, resell or recycle your android
phone, then remember to wipe data clean before doing that. Your
android phone has your personal data and you definitely don’t
want it to get into unknown hands. To protect privacy, best to
erase data off your smartphone and then reset your android to
factory settings.
8. Report a stolen smartphone
Most major wireless service providers, along with FCC have
created a stolen phone database. If your android is stolen then
you should report the theft to your local law enforcement
authorities and then register the stolen android phone with your
wireless provider. This will create an alert and will allow remote
‘bricking’ of the phone, so that it can’t be activated on any
wireless network without your permission.
With a bit of caution from your side, you can keep your android
smartphone safe and secure.

Weitere Àhnliche Inhalte

Was ist angesagt?

Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethics
Syed Zeeshan Ali
 
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
Svetlin Nakov
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
Torian Group
 
Phone Safety presentation
Phone Safety presentationPhone Safety presentation
Phone Safety presentation
remiwanless
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – and
RandyBett
 

Was ist angesagt? (19)

Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Security risks with fake apps
Security risks with fake appsSecurity risks with fake apps
Security risks with fake apps
 
How To Identify A Fake App In Playstore
How To Identify A Fake App In PlaystoreHow To Identify A Fake App In Playstore
How To Identify A Fake App In Playstore
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
AMMU
AMMUAMMU
AMMU
 
Cybersecurity tips
Cybersecurity tipsCybersecurity tips
Cybersecurity tips
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethics
 
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMEN
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
 
Phone Safety presentation
Phone Safety presentationPhone Safety presentation
Phone Safety presentation
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – and
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
 
Avoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile WebAvoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile Web
 

Andere mochten auch

Windows Phone 8 application security
Windows Phone 8 application securityWindows Phone 8 application security
Windows Phone 8 application security
Andrey Chasovskikh
 

Andere mochten auch (7)

Windows Phone 8.1 et la sécurité
Windows Phone 8.1 et la sécuritéWindows Phone 8.1 et la sécurité
Windows Phone 8.1 et la sécurité
 
Windows Phone 8 Security Deep Dive
Windows Phone 8 Security Deep DiveWindows Phone 8 Security Deep Dive
Windows Phone 8 Security Deep Dive
 
Windows Phone 8 application security
Windows Phone 8 application securityWindows Phone 8 application security
Windows Phone 8 application security
 
Approaching the unknown - Windows Phone application security assessment guide
Approaching the unknown - Windows Phone application security assessment guideApproaching the unknown - Windows Phone application security assessment guide
Approaching the unknown - Windows Phone application security assessment guide
 
Smartphone security
Smartphone security Smartphone security
Smartphone security
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 

Ähnlich wie 8 steps to smartphone security for android

Mobile Security
Mobile SecurityMobile Security
Mobile Security
Kevin Lee
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
todd581
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
glendar3
 

Ähnlich wie 8 steps to smartphone security for android (20)

Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Mobile security
Mobile security Mobile security
Mobile security
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
 
Steps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossSteps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or Loss
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx
 
Smartphone apps
Smartphone appsSmartphone apps
Smartphone apps
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Cyber Security for REALTORSÂź
Cyber Security for REALTORSÂźCyber Security for REALTORSÂź
Cyber Security for REALTORSÂź
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
16 tips to thwart mobile security threats
16 tips to thwart mobile security threats16 tips to thwart mobile security threats
16 tips to thwart mobile security threats
 
Android tips and tricks 2014
Android tips and tricks 2014Android tips and tricks 2014
Android tips and tricks 2014
 
List 10 Points to Ensure your Digital Privacy!
List 10 Points to Ensure your Digital Privacy!List 10 Points to Ensure your Digital Privacy!
List 10 Points to Ensure your Digital Privacy!
 

Mehr von iYogi

6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in
iYogi
 
Worm
WormWorm
Worm
iYogi
 
Fathers of Technology
Fathers of TechnologyFathers of Technology
Fathers of Technology
iYogi
 

Mehr von iYogi (20)

Commoditization of technology
Commoditization of technologyCommoditization of technology
Commoditization of technology
 
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like YouBenjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
 
Jimmy wales ppt
Jimmy wales pptJimmy wales ppt
Jimmy wales ppt
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in
 
iYogi reviews via art elaine
iYogi reviews via art  elaineiYogi reviews via art  elaine
iYogi reviews via art elaine
 
Worldwideweb
WorldwidewebWorldwideweb
Worldwideweb
 
iYogi Wow Tech Facts: TYPEWRITER
iYogi Wow Tech Facts: TYPEWRITERiYogi Wow Tech Facts: TYPEWRITER
iYogi Wow Tech Facts: TYPEWRITER
 
Worm
WormWorm
Worm
 
iYogi review by lynn c
iYogi review by lynn ciYogi review by lynn c
iYogi review by lynn c
 
iYogi reviews via art by marilyn b
iYogi reviews via art by marilyn biYogi reviews via art by marilyn b
iYogi reviews via art by marilyn b
 
Electronic brains
Electronic brainsElectronic brains
Electronic brains
 
iYogi reviews via art: Leslie c
iYogi reviews via art: Leslie ciYogi reviews via art: Leslie c
iYogi reviews via art: Leslie c
 
iYogi review by peggy l
iYogi review by peggy liYogi review by peggy l
iYogi review by peggy l
 
iYogi review by Sandy w
iYogi review by Sandy wiYogi review by Sandy w
iYogi review by Sandy w
 
Dianna l
Dianna lDianna l
Dianna l
 
iYogi customer review
iYogi customer reviewiYogi customer review
iYogi customer review
 
Customer feedback 1
Customer feedback 1Customer feedback 1
Customer feedback 1
 
Fathers of Technology
Fathers of TechnologyFathers of Technology
Fathers of Technology
 
Consumer Adoption Of Freemium Products And Services - iYogi
Consumer Adoption Of Freemium Products And Services - iYogiConsumer Adoption Of Freemium Products And Services - iYogi
Consumer Adoption Of Freemium Products And Services - iYogi
 

KĂŒrzlich hochgeladen

KĂŒrzlich hochgeladen (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

8 steps to smartphone security for android

  • 1. 8 Steps to Smartphone Security for Android
  • 2. Securing a Smartphone is as important as securing your PC, or perhaps more important, as most of our personal information is now on our Smartphones. If you have a Android phone, then here are 10 ways to secure your Smartphone. These Smartphone security tips will keep all malicious activities at bay. 1.Set PINs and passwords To avoid unauthorized access to your android phone, set a password or Personal Identification Number (PIN) on your phone’s home screen, as a first line of defense. You should also configure your phone to automatically lock after 5 minutes or when your phone is idle. Activate the SIM password capability that is now available on almost all android Smartphones. 2. Do not modify security settings It is not the best practice to alter security settings as per your convenience in your android Smartphone. Tampering with your phone’s factory settings, jail-breaking or even rooting your android phone will undermine its security features, making it vulnerable to attacks. 3. Backup and secure your data It is important that you backup all data that is stored on your phone like contacts, documents and even photos. These files can be stored on your computer, or on a detachable storage card or even in the cloud. By taking this backup, you will be able to conveniently restore information to your phone if there is any software problem or your phone is damaged. 4. App installation Apps make us all very excited. But it is extremely important that you download apps only from trusted app stores or sources. You should also do some research to make sure that the app is
  • 3. legitimate. Check reviews, see from what app store are you purchasing the app and compare the app sponsor’s official website with the app store link to check consistency. Downloading apps from untrusted websites can contain malware. Once installed it can steal your personal data, corrupt files and install viruses. Be very careful in granting access to personal information via apps. Along with this, also install android security apps that enable remote location and wiping. Your android has the capability of being tracked from a remote location. You can even erase all the data stored on your android phone in case it is misplaced or stolen. 5. Accept updates and patches to your android software Just as we require software updates in our PC, we also need to enable automatic updates on our android Smartphone. By keeping your OS current, you reduce the risk of exposure to different cyber threats. 6. Be careful of Wi-Fi networks Accessing a public Wi-Fi network can prove to be a potential threat to your android Smartphone. It is better that you limit your usage of public hotspots and only avail Wi-Fi from a reliable network operator. Be very cautious if you are asked to enter account or log in information. 7. Wipe your android clean If you are planning to donate, resell or recycle your android phone, then remember to wipe data clean before doing that. Your android phone has your personal data and you definitely don’t want it to get into unknown hands. To protect privacy, best to erase data off your smartphone and then reset your android to factory settings.
  • 4. 8. Report a stolen smartphone Most major wireless service providers, along with FCC have created a stolen phone database. If your android is stolen then you should report the theft to your local law enforcement authorities and then register the stolen android phone with your wireless provider. This will create an alert and will allow remote ‘bricking’ of the phone, so that it can’t be activated on any wireless network without your permission. With a bit of caution from your side, you can keep your android smartphone safe and secure.