Commentary

September 13, 2013

Data thieves use smartphones to gain personal info

Smartphones can perform many of the functions of a personal computer. Keep it secure from data thieves with these tips:

• Set a secret pin and password to prevent unauthorized access to the phone’s home screen to prevent others from using it. Set your smartphone to lock after five minutes when idle.

• Do not modify the smartphone’s security setting. Modifying the built-in security setting is called “jail breaking.” This undermines the phone’s security and it makes the phone easier to attack.

• Back up and secure data stored on your phone such as contacts, documents and photos. Store these files on a computer, removal storage card or in the Cloud, where they can easily be restored if the phone is lost, stolen or erased.

• Only install applications, or apps, from trusted sources after ensuring it is legitimate. Apps downloaded from unreliable sources may contain malware that can and will steal personal information.

• Understand an apps’ permissions regarding personal information or ability to change their performance functions before accepting them. Check your phone’s privacy settings for each app.

• Install security apps that enable remote location and data wiping in the event a phone is lost or stolen. A good security feature available on smartphones is the ability to remotely locate and erase all the data stored on the phone, even if it’s GPS is off. These apps can also help you find your phone.

• Accept smartphone software updates and patches; it needs to be updated and patched to keep it secure and working correctly. Always let your phone provider update your phone.

• Your phone is an easy target for cybercriminals on Wi-Fi networks. Use a phone provider’s trusted Wi-Fi source to reduce the chance of putting data at risk. Never provide login or personal account information on public Wi-Fi networks.

• Wipe personal data and return the old phone to its original factory setting before donating, reselling or recycling it.

• Report a stolen smartphone. The wireless service providers have a stolen phone database. If your phone is stolen, report the theft to your local law enforcement authorities and then register the stolen phone with your wireless provider to allow the provider to prevent the phone from being reactivated and placed back on the cell network.




All of this week's top headlines to your email every Friday.


 
 

 
Natalie Lakosil

Memorial Day ceremonies honor those who lost their lives for our country

Natalie Lakosil Maj. Gen. Robert Ashley, commanding general, U.S. Army Intelligence Center of Excellence and Fort Huachuca, and Command Sgt. Major Jeffery Fairley, USAICoE command sergeant major, salute the first wreath laid fo...
 
 

Presidential Proclamation — National Mental Health Awareness Month, 2015 NATIONAL MENTAL HEALTH AWARENESS MONTH, 2015 BY THE PRESIDENT OF THE UNITED STATES OF AMERICA

A PROCLAMATION This year, approximately one in five American adults — our friends, colleagues, and loved ones — will experience a diagnosable mental health condition like depression, anxiety, bipolar disorder, schizophrenia or post-traumatic stress, and many others will be troubled by significant emotional and psychological distress, especially in times of difficulty. For most of these...
 
 
Natalie Lakosil

USAG welcomed its new command sergeant major Wednesday

Natalie Lakosil Col. Thomas A. Boone, U.S. Army Garrison commander, right, passes the noncommissioned officers’ sword symbolizing the change of responsibility for USAG to the incoming USAG command sergeant major, Command Sgt....
 

 
Courtesy Photo

JITC gains new senior enlisted leader, one retires

Courtesy Photo From left, Sgt. Maj. Lewis Brown, outgoing senior enlisted leader for the Joint Interoperability Test Command, stands with Sgt. Maj. Antonio Vizcarrondo, U.S. Marine Corps, senior enlisted advisor for the Defense...
 
 
D. Myles Cullen, DOD

Dempsey emphasizes trust at West Point graduation

D. Myles Cullen, DOD Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, delivers the commencement address at the U.S. Military Academy at West Point, N.Y., Saturday. WEST POINT, N.Y. — The chairman of the Joint Chief...
 
 

Cyber readiness inspection takes place on FH next week

The Defense Information Systems Agency, or DISA, will conduct a command cyber readiness inspection, CCRI, at Fort Huachuca Monday through June 5. The inspection is mandated by the chairman of the Joint Chiefs of Staff instruction, CJCSI 6211.02D, targets all installation secure internet protocol router network (SIPRNET) points of presence, and may include military, civilian,...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


Directory powered by Business Directory Plugin