Commentary

September 13, 2013

Data thieves use smartphones to gain personal info

Smartphones can perform many of the functions of a personal computer. Keep it secure from data thieves with these tips:

• Set a secret pin and password to prevent unauthorized access to the phone’s home screen to prevent others from using it. Set your smartphone to lock after five minutes when idle.

• Do not modify the smartphone’s security setting. Modifying the built-in security setting is called “jail breaking.” This undermines the phone’s security and it makes the phone easier to attack.

• Back up and secure data stored on your phone such as contacts, documents and photos. Store these files on a computer, removal storage card or in the Cloud, where they can easily be restored if the phone is lost, stolen or erased.

• Only install applications, or apps, from trusted sources after ensuring it is legitimate. Apps downloaded from unreliable sources may contain malware that can and will steal personal information.

• Understand an apps’ permissions regarding personal information or ability to change their performance functions before accepting them. Check your phone’s privacy settings for each app.

• Install security apps that enable remote location and data wiping in the event a phone is lost or stolen. A good security feature available on smartphones is the ability to remotely locate and erase all the data stored on the phone, even if it’s GPS is off. These apps can also help you find your phone.

• Accept smartphone software updates and patches; it needs to be updated and patched to keep it secure and working correctly. Always let your phone provider update your phone.

• Your phone is an easy target for cybercriminals on Wi-Fi networks. Use a phone provider’s trusted Wi-Fi source to reduce the chance of putting data at risk. Never provide login or personal account information on public Wi-Fi networks.

• Wipe personal data and return the old phone to its original factory setting before donating, reselling or recycling it.

• Report a stolen smartphone. The wireless service providers have a stolen phone database. If your phone is stolen, report the theft to your local law enforcement authorities and then register the stolen phone with your wireless provider to allow the provider to prevent the phone from being reactivated and placed back on the cell network.




All of this week's top headlines to your email every Friday.


 
 

 
Stephanie Caffall

Women’s history showcased during special event Wednesday

Stephanie Caffall Fort Huachuca’s Thunder Mountain Activity Centre was the site of an event titled, “Weaving the Stories of Women’s Lives” Wednesday in celebration for National Women’s History Month. After the reading...
 
 
DoD

DOD warns troops, families to be cyber crime smart

WASHINGTON — Defense Department employees and their families should be vigilant when guarding personal and work information from expanding cyber-criminal activity, and to know how to recognize scammer tactics, according to DOD’s chief information officer. Terry Halvorsen issued a DOD-wide memorandum March 18 about the growing threat of cybercrime “phishing” and “spear phishing” in e...
 
 

Army health leaders advocate for importance of nutrition

WASHINGTON — During National Nutrition Month in March, “we encourage each of you to renew a commitment to achieving your personal Performance Triad goals,” said Army Surgeon General Lt. Gen. Patricia Horoho. This year’s theme is “Bite into a Healthy Lifestyle,” she said. The Performance Triad focuses on the importance of sleep, activity and nutrition...
 

 
Natalie Lakosil

Convoy exercise helps ready 111th MI Bde. for emergencies

Natalie Lakosil Soldiers from the 111th Military Intelligence Brigade take a short rest in lower Garden Canyon before returning to the motor pool as part of a convoy training exercise Wednesday. The exercise helps the brigade s...
 
 

Fort Huachuca Criminal Punishment Bulletin – February

For the month of February, in addition to Court-Martial and U.S. Federal Court Proceedings, 31 Soldiers were disciplined under Article 15, UCMJ; and 25 Soldiers were administratively separated, including 2 for misconduct. The following are notable recent criminal proceedings: A specialist assigned to the 40th Expeditionary Signal Battalion was tried at a General Court-Martial. The...
 
 
Natalie Lakosil

111th MI Bde. NCO, Soldier, Platoon Sgt. of Quarter winners selected

Natalie Lakosil Sgt. Jason Grider, Alpha Company, 309th Military Intelligence Battalion, inspects uniforms during the in-ranks inspection portion of the 111th Military Intelligence Brigade Non-commissioned Officer of the Quarte...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


Directory powered by Business Directory Plugin