Commentary

September 13, 2013

Data thieves use smartphones to gain personal info

Smartphones can perform many of the functions of a personal computer. Keep it secure from data thieves with these tips:

• Set a secret pin and password to prevent unauthorized access to the phone’s home screen to prevent others from using it. Set your smartphone to lock after five minutes when idle.

• Do not modify the smartphone’s security setting. Modifying the built-in security setting is called “jail breaking.” This undermines the phone’s security and it makes the phone easier to attack.

• Back up and secure data stored on your phone such as contacts, documents and photos. Store these files on a computer, removal storage card or in the Cloud, where they can easily be restored if the phone is lost, stolen or erased.

• Only install applications, or apps, from trusted sources after ensuring it is legitimate. Apps downloaded from unreliable sources may contain malware that can and will steal personal information.

• Understand an apps’ permissions regarding personal information or ability to change their performance functions before accepting them. Check your phone’s privacy settings for each app.

• Install security apps that enable remote location and data wiping in the event a phone is lost or stolen. A good security feature available on smartphones is the ability to remotely locate and erase all the data stored on the phone, even if it’s GPS is off. These apps can also help you find your phone.

• Accept smartphone software updates and patches; it needs to be updated and patched to keep it secure and working correctly. Always let your phone provider update your phone.

• Your phone is an easy target for cybercriminals on Wi-Fi networks. Use a phone provider’s trusted Wi-Fi source to reduce the chance of putting data at risk. Never provide login or personal account information on public Wi-Fi networks.

• Wipe personal data and return the old phone to its original factory setting before donating, reselling or recycling it.

• Report a stolen smartphone. The wireless service providers have a stolen phone database. If your phone is stolen, report the theft to your local law enforcement authorities and then register the stolen phone with your wireless provider to allow the provider to prevent the phone from being reactivated and placed back on the cell network.




All of this week's top headlines to your email every Friday.


 
 

 
haynes3_62415_lakosil

Family, faith, focus Resiliency helps Soldier heal from extensive combat wounds

Maj. Jeremy Haynes, Warrior Transition Brigade, Walter Reed National Military Medical Center, Maryland, and wife Chelsea speak with Capt. Kate Degategno, Alpha Company, 304th Military Intelligence Battalion, in Alvarado Hall, F...
 
 
U.S. Army Photo by Lisa Tourtelot

RWBAHC welcomes new top doc to command

U.S. Army Photo by Lisa Tourtelot Lt. Col. Edgar Arroyo, the new commander of Raymond W. Bliss Army Health Center, accepts the command colors from Maj. Gen. Thomas Tempel, the commanding general of Western Regional Medical Comm...
 
 
Photo by Capt. Bee Vengthisane

Signal Soldiers celebrate regimental birthday at Fort Hood

FORT HOOD, Texas– Signaleers from Fort Hood and other installations around the country, celebrated the 155th Signal Regimental Corps birthday June 22-25 here. Signal week is a time when Soldiers in the Signal Corps reflec...
 

 

Sparks fly when fireworks are lit — know safety rules

During tomorrow’s July 4th celebration, sparks will fly as people light fireworks. It’s wildfire season, and misuse of fireworks can start a fire which could have devastating effects on the community. When using approved fireworks, be cognizant of the surroundings. The National Fire Protection Association reported that in 2011, fires started by fireworks caused an...
 
 
U.S. Army photo

Military Intelligence – Moment in MI history

More aerial intelligence systems used during Vietnam War During the Vietnam War, the Army possessed three distinct aerial intelligence capabilities. The U-6 Beaver fixed-wing airborne radio-direction finding (ARDF) platform was...
 
 
305thCeremony_6.26

305th Military Intelligence Battalion Change of Command Ceremony

Incoming Commander, Lt. Col. Jorge A. Arredondo, takes command of the 305th Military Intelligence Battalion during the passing of the colors at the change of command ceremony Friday.   Fort Huachuca’s 305th Military Inte...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>