Skip to main content

How to Improve android security, tablet or mobile greatly


Smartphones have come to define us by being the portal to our online identity and as such should be treated with care and secured against any wrongdoing online (hacking) or offline (stolen). If you are not careful, losing your smartphone may mean more than just a loss in contacts and phone numbers. We’re talking about your social media accounts, your synced files, important documents, your emails, photos and messages.

Your entire information is traceable and downloadable and may be shared all over the World Wide Web if you are not careful enough.



(Image Source: HDW)
While we’d love it if people don’t mess around with other people’s personal information, putting morale aside, this is the virtual world where thieves and hackers hide behind anonymity and are hard to trace. There is no one better to protect your own data, than you. We hope these tips and tricks will be of help in that endeavor.

Recommended Reading: Top 10 Security Tools For Your Smartphone

1. Do Not Save All Of Your Passwords
Many users tend to save their passwords to online services and sites on their device, never once thinking about what it would mean to a person who got their hands on the phone. Avoid having all important passwords saved in your device particularly when it comes to banking or payment apps.



2. Use Android In-Built Security
If you are running on Jelly Bean, you can have a screen lock and encryption enabled to further enhance your security. There are many types of screen locks available for you to choose from such as password, pin, pattern and face unlock, available in your Android settings. Even when setting pins or pattern locks, try not to make it easy for hackers to guess your password.



3. Lock Your Apps
It is necessary to lock your apps, especially the ones holding private information that you wish nobody but you could see. This is a second layer of security to prevent anyone from using your lost device particularly if they have managed to bypass your locked Android.

You can use a free app like App Lock for this exact purpose. The idea here is not to lock every single app in your device, just really data-laden ones like your email apps or file managers.

While you at it, avoid using a combination of a pin or pattern lock that can be traceable from the smudges of your screen (Yes, it is traceable).



4. The Importance Of App Permissions
Before you begin installing an app from Google Play, a list of requested permissions will pop up to show you what permission the app requires. Apps require permissions to do things but not all of them are necessary.

Always read through the permissions to make sure they make sense and correspond to what the app actually does eg. an alarm app does not require a permission to access your text messages. This is a real important step because not all apps in the Play Store are safe.



While you’re at it, make it a habit to read the comments as well as the rating of the app that you are going to download. This helps you understand more about what the app really does without trying it out firsthand.



5. Securing Your Network
One of the most important thing in protecting your Android is to secure your network. Try to avoid using public WiFi whenever you want to do something important like doing your banking online. As long you are sharing the same network with the public, they can easily sniff out your packets and translate it into actual data of your private information i.e. your passwords.

You can protect your information by using apps like Hideninja VPN so that your outgoing connection is always encrypted, making it harder for anyone to sabotage your data. If you suspect that your device is being attacked, WiFi Protector can help fend off these attackers. To further enhance your network security you can apply settings from SecDroid but note that this app is only for rooted phones.



6. Use Mobile Security App
It will make your job easier to have an app that handles most of your security issue. Fi

Comments

Popular posts from this blog

Download: The Hobbit: The Battle of the Five Armies (2014)

UPDATED          The Company of Thorin has reached Smaug’s lair; but can Bilbo and the Dwarves reclaim Erebor and the treasure? And, if so, can they hold on to it?             Having reclaimed their homeland from the Dragon Smaug, the Company has unwittingly unleashed a deadly force into the world. Enraged, Smaug rains his fiery wrath down upon the defenseless men, women and children of Lake-town. Obsessed above all else with his reclaimed treasure, Thorin sacrifices friendship and honor to hoard it as Bilbo’s frantic attempts to make him see reason drive the Hobbit towards a desperate and dangerous choice. But there are even greater dangers ahead. Unseen by any but the Wizard Gandalf, the great enemy Sauron has sent forth legions of Orcs in a stealth attack upon the Lonely Mountain. As darkness converges on their escalating conflict, the races of Dwarves, Elves and Men must decide – unite or be destroyed. Bilbo finds h...

Nigerian schoolgirls' home town in despair after president cancels visit

Relatives of more than 200 Nigerian schoolgirls who have been missing for more than a month after being kidnapped by Islamic militants have voiced anger and despair after the country's president cancelled a visit to their home town, citing security concerns. As the international effort to find and rescue the girls gathered momentum, with military and intelligence resources from the US, UK, France, Israel and Canada pouring into Nigeria , and the #bringbackourgirls social media campaign exceeded 1m tweets, there was mounting criticism of President Jonathan Goodluck's slow response to the crisis. In Chibok on Friday, the home town of the missing girls, families said they had lost faith in the government to do everything possible to rescue their daughters, sisters and nieces. In Washington, a senior US official admonished Nigeria's failure to tackle the insurgency. Many relatives had gathered at the Chibok government girls secondary school, from which ...

HOW DO YOU WANT TO BE REMEMBERED?

Genesis 32:24-32 I read recently about a man who had passed away and what they wanted the funeral parlor to do with the body. This man was a big Pittsburgh Steelers fan, and this is how the family wanted him remembered. So they told the funeral director that instead of placing his body in a coffin, they wanted the man placed on a recliner, with a television playing Pittsburgh Steelers highlights. Next to him there was to be a table with an open can of beer and a package of cigarettes. This is how his family remembered him, and this is how the family wanted the rest of his friends and loved ones to remember him. This was the lasting impression that was imprinted on the minds of people who knew him. The question I have for you today is a simple one: How do you want people to remember you? One day all of us are going to die, and how would you want people to remember you? Some of us might die soon, and some of us might not die for a while, and we have all heard that statement about lasti...