Commentary

September 13, 2013

Data thieves use smartphones to gain personal info

Smartphones can perform many of the functions of a personal computer. Keep it secure from data thieves with these tips:

• Set a secret pin and password to prevent unauthorized access to the phone’s home screen to prevent others from using it. Set your smartphone to lock after five minutes when idle.

• Do not modify the smartphone’s security setting. Modifying the built-in security setting is called “jail breaking.” This undermines the phone’s security and it makes the phone easier to attack.

• Back up and secure data stored on your phone such as contacts, documents and photos. Store these files on a computer, removal storage card or in the Cloud, where they can easily be restored if the phone is lost, stolen or erased.

• Only install applications, or apps, from trusted sources after ensuring it is legitimate. Apps downloaded from unreliable sources may contain malware that can and will steal personal information.

• Understand an apps’ permissions regarding personal information or ability to change their performance functions before accepting them. Check your phone’s privacy settings for each app.

• Install security apps that enable remote location and data wiping in the event a phone is lost or stolen. A good security feature available on smartphones is the ability to remotely locate and erase all the data stored on the phone, even if it’s GPS is off. These apps can also help you find your phone.

• Accept smartphone software updates and patches; it needs to be updated and patched to keep it secure and working correctly. Always let your phone provider update your phone.

• Your phone is an easy target for cybercriminals on Wi-Fi networks. Use a phone provider’s trusted Wi-Fi source to reduce the chance of putting data at risk. Never provide login or personal account information on public Wi-Fi networks.

• Wipe personal data and return the old phone to its original factory setting before donating, reselling or recycling it.

• Report a stolen smartphone. The wireless service providers have a stolen phone database. If your phone is stolen, report the theft to your local law enforcement authorities and then register the stolen phone with your wireless provider to allow the provider to prevent the phone from being reactivated and placed back on the cell network.




All of this week's top headlines to your email every Friday.


 
 

 

2014 Army Earth Day message

On April 22, the United States Army joins the Nation in celebrating Earth Day. Army Earth Day provides us an opportunity to renew our commitment to stewardship of the environment and the lands where our Soldiers, Families and Civilians train, live and work. Army Earth Day aims to inspire awareness and appreciation of the environment....
 
 

National Child Abuse Prevention Month, 2014

In the United States of America, every child should have every chance in life, every chance at happiness, and every chance at success. Yet tragically, hundreds of thousands of young Americans shoulder the burden of abuse or neglect. As a Nation, we must do better. During National Child Abuse Prevention Month, we strengthen our resolve...
 
 
U.S. Army

Military Intelligence – this week in history April 11, 2014

U.S. Army Ground surveillance radar operators were an integral part of the CEWI Battalion’s intelligence support to the division. 522nd MI (CEWI) Battalion passes tactical intelligence test April 7, 1977 Army Intelligence rec...
 

 

“Speak Up! A Voice Unheard is an Army Defeated”

In April, the Army and the Nation it serves, observes Sexual Assault Awareness Month. Under this year’s theme, “Speak up! A voice unheard is an Army defeated,” we reinforce our determination to take the offensive in the fight against sexual assault. We stress the critical role of every member of the Army Family to prevent...
 
 
FLIPL-1_2014.2

Financial Liability Investigation of Property Loss: What Soldiers, Civilians should know

Army-issued equipment such as the helmet and pair of boots pictured can result in a Soldier’s financial liability if not returned properly. Lost, damaged or stolen Army property can be subject to Financial Liability Investiga...
 
 

Women’s History Month: Celebrating Women of Character, Courage and Commitment

“The best protection any woman can have … is courage.” ~ Elizabeth Cady Stanton a leader of the Women’s Rights Movement Women have achieved incredible progress that seemed unimaginable not so long ago in American history. They persevered through social and cultural challenges and overcame past legal restraints to create a new legacy of achievement...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


Directory powered by Business Directory Plugin