2. (3)
Application
and Operating
System
Updates
“It used to be that we imagined
that our mobile phones would be
for us to talk to each other. Now
our mobile phones are there now
to talk to us”. Sherry Turkle.
(4)
Screen Lock
(9)
Remote Wipe
3. COUNTER
MEASURE
3
9
4
GOOD BAD
Fixes a flaw or
vulnerability in the
OS, App Design, and
allows extended life
of phone
It’s a hassle.
Wastes time, data,
etc. Can be used
as profit driven
avenue by dev
Blocks unauthorized
users from
accessing your
phone
Depending on
option selected
may give false
sense of security
Allows the owner to
do master reset of
his device if lost or
stolen
Cellphone must be
registered on DM,
harder to find if
done, may not
erase SD card
4. LOCATION OF IN-DEPTH GUIDE
How To Defend Your Cellphone from Hackers
– A Comprehensive Guide, 2nd Installment”
NOTE: JUST FOLLOW – “STEPS TO HARDEN YOUR SYSTEM”