SlideShare une entreprise Scribd logo
1  sur  4
8
 Steps to
Smartphone
 Security
for Android
Securing a Smartphone is as important as securing your PC, or
perhaps more important, as most of our personal information is
now on our Smartphones. If you have a Android phone, then here
are 10 ways to secure your Smartphone. These Smartphone
security tips will keep all malicious activities at bay.

1.Set PINs and passwords
To avoid unauthorized access to your android phone, set a
password or Personal Identification Number (PIN) on your
phone’s home screen, as a first line of defense. You should also
configure your phone to automatically lock after 5 minutes or
when your phone is idle. Activate the SIM password capability
that is now available on almost all android Smartphones.

2. Do not modify security settings
It is not the best practice to alter security settings as per your
convenience in your android Smartphone. Tampering with your
phone’s factory settings, jail-breaking or even rooting your android
phone will undermine its security features, making it vulnerable to
attacks.

3. Backup and secure your data
It is important that you backup all data that is stored on your
phone like contacts, documents and even photos. These files can
be stored on your computer, or on a detachable storage card or
even in the cloud. By taking this backup, you will be able to
conveniently restore information to your phone if there is any
software problem or your phone is damaged.

4. App installation
Apps make us all very excited. But it is extremely important that
you download apps only from trusted app stores or sources. You
should also do some research to make sure that the app is
legitimate. Check reviews, see from what app store are you
purchasing the app and compare the app sponsor’s official
website with the app store link to check consistency. Downloading
apps from untrusted websites can contain malware. Once
installed it can steal your personal data, corrupt files and install
viruses. Be very careful in granting access to personal information
via apps.
Along with this, also install android security apps that enable
remote location and wiping. Your android has the capability of
being tracked from a remote location. You can even erase all the
data stored on your android phone in case it is misplaced or
stolen.

5. Accept updates and patches to your android software
Just as we require software updates in our PC, we also need to
enable automatic updates on our android Smartphone. By
keeping your OS current, you reduce the risk of exposure to
different cyber threats.

6. Be careful of Wi-Fi networks
Accessing a public Wi-Fi network can prove to be a potential
threat to your android Smartphone. It is better that you limit your
usage of public hotspots and only avail Wi-Fi from a reliable
network operator. Be very cautious if you are asked to enter
account or log in information.

7. Wipe your android clean
If you are planning to donate, resell or recycle your android
phone, then remember to wipe data clean before doing that. Your
android phone has your personal data and you definitely don’t
want it to get into unknown hands. To protect privacy, best to
erase data off your smartphone and then reset your android to
factory settings.
8. Report a stolen smartphone
Most major wireless service providers, along with FCC have
created a stolen phone database. If your android is stolen then
you should report the theft to your local law enforcement
authorities and then register the stolen android phone with your
wireless provider. This will create an alert and will allow remote
‘bricking’ of the phone, so that it can’t be activated on any
wireless network without your permission.
With a bit of caution from your side, you can keep your android
smartphone safe and secure.

Contenu connexe

Tendances

Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethics
Syed Zeeshan Ali
 
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
Svetlin Nakov
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
Torian Group
 
Phone Safety presentation
Phone Safety presentationPhone Safety presentation
Phone Safety presentation
remiwanless
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – and
RandyBett
 

Tendances (19)

Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Security risks with fake apps
Security risks with fake appsSecurity risks with fake apps
Security risks with fake apps
 
How To Identify A Fake App In Playstore
How To Identify A Fake App In PlaystoreHow To Identify A Fake App In Playstore
How To Identify A Fake App In Playstore
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
AMMU
AMMUAMMU
AMMU
 
Cybersecurity tips
Cybersecurity tipsCybersecurity tips
Cybersecurity tips
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Computer security and ethics
Computer security and ethicsComputer security and ethics
Computer security and ethics
 
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
Compromising Mobile Banking Apps (Nakov @ DigiPay 2020)
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMEN
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
 
Phone Safety presentation
Phone Safety presentationPhone Safety presentation
Phone Safety presentation
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – and
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
 
Avoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile WebAvoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile Web
 

En vedette

Windows Phone 8 application security
Windows Phone 8 application securityWindows Phone 8 application security
Windows Phone 8 application security
Andrey Chasovskikh
 

En vedette (7)

Windows Phone 8.1 et la sécurité
Windows Phone 8.1 et la sécuritéWindows Phone 8.1 et la sécurité
Windows Phone 8.1 et la sécurité
 
Windows Phone 8 Security Deep Dive
Windows Phone 8 Security Deep DiveWindows Phone 8 Security Deep Dive
Windows Phone 8 Security Deep Dive
 
Windows Phone 8 application security
Windows Phone 8 application securityWindows Phone 8 application security
Windows Phone 8 application security
 
Approaching the unknown - Windows Phone application security assessment guide
Approaching the unknown - Windows Phone application security assessment guideApproaching the unknown - Windows Phone application security assessment guide
Approaching the unknown - Windows Phone application security assessment guide
 
Smartphone security
Smartphone security Smartphone security
Smartphone security
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 

Similaire à 8 steps to smartphone security for android

Mobile Security
Mobile SecurityMobile Security
Mobile Security
Kevin Lee
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
todd581
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
glendar3
 

Similaire à 8 steps to smartphone security for android (20)

Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Mobile security
Mobile security Mobile security
Mobile security
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
 
Steps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossSteps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or Loss
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx
 
Smartphone apps
Smartphone appsSmartphone apps
Smartphone apps
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
16 tips to thwart mobile security threats
16 tips to thwart mobile security threats16 tips to thwart mobile security threats
16 tips to thwart mobile security threats
 
Android tips and tricks 2014
Android tips and tricks 2014Android tips and tricks 2014
Android tips and tricks 2014
 
List 10 Points to Ensure your Digital Privacy!
List 10 Points to Ensure your Digital Privacy!List 10 Points to Ensure your Digital Privacy!
List 10 Points to Ensure your Digital Privacy!
 

Plus de iYogi

6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in
iYogi
 
Worm
WormWorm
Worm
iYogi
 
Fathers of Technology
Fathers of TechnologyFathers of Technology
Fathers of Technology
iYogi
 

Plus de iYogi (20)

Commoditization of technology
Commoditization of technologyCommoditization of technology
Commoditization of technology
 
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like YouBenjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
 
Jimmy wales ppt
Jimmy wales pptJimmy wales ppt
Jimmy wales ppt
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in
 
iYogi reviews via art elaine
iYogi reviews via art  elaineiYogi reviews via art  elaine
iYogi reviews via art elaine
 
Worldwideweb
WorldwidewebWorldwideweb
Worldwideweb
 
iYogi Wow Tech Facts: TYPEWRITER
iYogi Wow Tech Facts: TYPEWRITERiYogi Wow Tech Facts: TYPEWRITER
iYogi Wow Tech Facts: TYPEWRITER
 
Worm
WormWorm
Worm
 
iYogi review by lynn c
iYogi review by lynn ciYogi review by lynn c
iYogi review by lynn c
 
iYogi reviews via art by marilyn b
iYogi reviews via art by marilyn biYogi reviews via art by marilyn b
iYogi reviews via art by marilyn b
 
Electronic brains
Electronic brainsElectronic brains
Electronic brains
 
iYogi reviews via art: Leslie c
iYogi reviews via art: Leslie ciYogi reviews via art: Leslie c
iYogi reviews via art: Leslie c
 
iYogi review by peggy l
iYogi review by peggy liYogi review by peggy l
iYogi review by peggy l
 
iYogi review by Sandy w
iYogi review by Sandy wiYogi review by Sandy w
iYogi review by Sandy w
 
Dianna l
Dianna lDianna l
Dianna l
 
iYogi customer review
iYogi customer reviewiYogi customer review
iYogi customer review
 
Customer feedback 1
Customer feedback 1Customer feedback 1
Customer feedback 1
 
Fathers of Technology
Fathers of TechnologyFathers of Technology
Fathers of Technology
 
Consumer Adoption Of Freemium Products And Services - iYogi
Consumer Adoption Of Freemium Products And Services - iYogiConsumer Adoption Of Freemium Products And Services - iYogi
Consumer Adoption Of Freemium Products And Services - iYogi
 

Dernier

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

8 steps to smartphone security for android

  • 1. 8 Steps to Smartphone Security for Android
  • 2. Securing a Smartphone is as important as securing your PC, or perhaps more important, as most of our personal information is now on our Smartphones. If you have a Android phone, then here are 10 ways to secure your Smartphone. These Smartphone security tips will keep all malicious activities at bay. 1.Set PINs and passwords To avoid unauthorized access to your android phone, set a password or Personal Identification Number (PIN) on your phone’s home screen, as a first line of defense. You should also configure your phone to automatically lock after 5 minutes or when your phone is idle. Activate the SIM password capability that is now available on almost all android Smartphones. 2. Do not modify security settings It is not the best practice to alter security settings as per your convenience in your android Smartphone. Tampering with your phone’s factory settings, jail-breaking or even rooting your android phone will undermine its security features, making it vulnerable to attacks. 3. Backup and secure your data It is important that you backup all data that is stored on your phone like contacts, documents and even photos. These files can be stored on your computer, or on a detachable storage card or even in the cloud. By taking this backup, you will be able to conveniently restore information to your phone if there is any software problem or your phone is damaged. 4. App installation Apps make us all very excited. But it is extremely important that you download apps only from trusted app stores or sources. You should also do some research to make sure that the app is
  • 3. legitimate. Check reviews, see from what app store are you purchasing the app and compare the app sponsor’s official website with the app store link to check consistency. Downloading apps from untrusted websites can contain malware. Once installed it can steal your personal data, corrupt files and install viruses. Be very careful in granting access to personal information via apps. Along with this, also install android security apps that enable remote location and wiping. Your android has the capability of being tracked from a remote location. You can even erase all the data stored on your android phone in case it is misplaced or stolen. 5. Accept updates and patches to your android software Just as we require software updates in our PC, we also need to enable automatic updates on our android Smartphone. By keeping your OS current, you reduce the risk of exposure to different cyber threats. 6. Be careful of Wi-Fi networks Accessing a public Wi-Fi network can prove to be a potential threat to your android Smartphone. It is better that you limit your usage of public hotspots and only avail Wi-Fi from a reliable network operator. Be very cautious if you are asked to enter account or log in information. 7. Wipe your android clean If you are planning to donate, resell or recycle your android phone, then remember to wipe data clean before doing that. Your android phone has your personal data and you definitely don’t want it to get into unknown hands. To protect privacy, best to erase data off your smartphone and then reset your android to factory settings.
  • 4. 8. Report a stolen smartphone Most major wireless service providers, along with FCC have created a stolen phone database. If your android is stolen then you should report the theft to your local law enforcement authorities and then register the stolen android phone with your wireless provider. This will create an alert and will allow remote ‘bricking’ of the phone, so that it can’t be activated on any wireless network without your permission. With a bit of caution from your side, you can keep your android smartphone safe and secure.