Woman looking at phone
03/21/19

Helpful Tips To Secure Your Phone

Keep your phone updated:

Just like your computer, the first step to protecting your phone from attacks is making sure you consistently update your operating system. Most people procrastinate implementing updates since they feel it may change the ways they are used to working on the phone. However, these updates to the phone operating system often include important security patches that were previously checked and handled, so it is critical that your operating system is at all times up to date so it is able to handle cybercrime threats.

Do not click on unfamiliar links:

Phishing attacks may be very efficient because of their simplicity and lack of knowledge by users. Last year, attacks were carried out via links that were sent in WhatsApp, email or SMS, with hackers pretending to be from official sites or offer special promotions from known retailers. We have also seen phishing attacks in the form of extortion attempts based on a hack that didn’t actually happen. The safest way to avoid these types of attacks is to avoid clicking on unfamiliar links. What is too good to be true, probably is.

Use caution when downloading Apps and updating existing Apps:

Apps should only be downloaded through the official App Stores. Even then, safety is not 100% guaranteed. If an application you have previously downloaded is requesting strange permissions, think twice about whether the permission is actually needed. It is recommended that from time to time you review your “permission menu” and privacy settings in your phone. Even Apps you previously downloaded may receive updates that turn them into malicious Apps phishing for your information. Go into your privacy settings and review your permission list for each App to verify they all make sense. If you see an App you don’t use, just delete it.

Lock your device:

Smart phones offer a variety of locking mechanisms. These locking mechanisms are critical when your phone reaches the wrong hands. When a thief experiences too much difficulty with a locked phone, they may move on to the next victim.

Install additional protection:

One last step after you have done the above is to consider installing additional security layers, such as VPNs and other Mobile Security features.

Helpful Tips To Secure Your Phone
03/21/19

Helpful Tips To Secure Your Phone

Keep your phone updated:

Just like your computer, the first step to protecting your phone from attacks is making sure you consistently update your operating system. Most people procrastinate implementing updates since they feel it may change the ways they are used to working on the phone. However, these updates to the phone operating system often include important security patches that were previously checked and handled, so it is critical that your operating system is at all times up to date so it is able to handle cybercrime threats.

Do not click on unfamiliar links:

Phishing attacks may be very efficient because of their simplicity and lack of knowledge by users. Last year, attacks were carried out via links that were sent in WhatsApp, email or SMS, with hackers pretending to be from official sites or offer special promotions from known retailers. We have also seen phishing attacks in the form of extortion attempts based on a hack that didn’t actually happen. The safest way to avoid these types of attacks is to avoid clicking on unfamiliar links. What is too good to be true, probably is.

Use caution when downloading Apps and updating existing Apps:

Apps should only be downloaded through the official App Stores. Even then, safety is not 100% guaranteed. If an application you have previously downloaded is requesting strange permissions, think twice about whether the permission is actually needed. It is recommended that from time to time you review your “permission menu” and privacy settings in your phone. Even Apps you previously downloaded may receive updates that turn them into malicious Apps phishing for your information. Go into your privacy settings and review your permission list for each App to verify they all make sense. If you see an App you don’t use, just delete it.

Lock your device:

Smart phones offer a variety of locking mechanisms. These locking mechanisms are critical when your phone reaches the wrong hands. When a thief experiences too much difficulty with a locked phone, they may move on to the next victim.

Install additional protection:

One last step after you have done the above is to consider installing additional security layers, such as VPNs and other Mobile Security features.

Recent Posts
Archives
Start protecting your identity today! Signing up is quick & easy
Remember, 1-in-4 Americans are the victim of identity theft. It's not a matter of if you'll become a victim. It's when...

1It is not possible to prevent all identity theft or cybercrime, or to effectively monitor all activity on the internet. IDSeal cannot and does not guarantee complete protection against cybercrime or identity theft. IDSeal does not monitor the activities of all financial institutions, or all activities of any particular financial institution. Review the IDSeal Terms and Conditions for specific details regarding IDSeal services.

2The Identity Theft Insurance is underwritten and administered by American Bankers Insurance Company of Florida, an Assurant company under group or blanket policy(ies). The description provided in the Summary of Benefits is a summary and intended for informational purposes only and does not include all terms, conditions and exclusions of the policies described. Please refer to the actual policies for terms, conditions, and exclusions of coverage. Coverage may not be available in all jurisdictions. Review the Summary of Benefits.

3Recurring pricing shown excludes applicable sales tax. By enrolling as an IDSeal member under any plan, you authorize IDSeal to charge your payment method (credit/debit card) on a recurring basis for the fees associated with your membership plan. Review the IDSeal Terms and Conditions for important information regarding your membership, including your membership term, and your right to cancel; and review the IDSeal Privacy Policy for information regarding how IDSeal collects and processes your information.

4The credit scores provided are VantageScore 3.0 credit scores based on data from Equifax®, Experian® and TransUnion®. Any one bureau VantageScore mentioned is based on Experian data only. Please see the IDSeal Terms and Conditions for more information on credit scores.

5IDSeal Pro-Tec provides tools and resources to protect your data and identity, but no one can prevent all cybercrime or identity theft. Your own efforts are important to prevent unauthorized access to your personal information.

Terms and Conditions | Privacy Policy | Terms of Use | Accessibility Statement | Upgrade