How To Tighten Security On Your Android Phone

Do Not Save All Of Your Passwords

Many users tend to save their passwords to online services and siteson their device, never once thinking about what it would mean to a person who got their hands on the phone. Avoid having all important passwords saved in your device particularly when it comes to banking or payment apps.

Encrypt your smartphone

Android users can opt in for encryption, a method to protect information stored on a device by scrambling it to make it unreadable without a key. To check if your handset is encrypted, open the "Settings" app and select "Security" from the options menu. Then, select the section called "Encryption" to see the status of your smartphone. If you see something along the lines of "encrypt device" then it means your Android phone is not encrypted yet.

Enable Two-factor Authentication on everything

Two-factor authentication, also called two-step verification, requires two authentication methods, like passwords, PIN numbers, fingerprints or physical access to your cell phone. This method of securing your accounts works on many services, and you may already have used it with your online banking platform. 2FA, as it is sometimes known, even works with various social media platforms to prevent other people from hijacking your online identity. Facebook, Twitter and LinkedIn all have the feature. Major payment platforms like PayPal and cloud storage services like Dropbox also usually support 2FA. And, very importantly, you should enable it on your Google Account as well.

Use Android In-built Security

If you are running on Jelly Bean, you can have a screen lock and encryptionenabled to further enhance your security. There are many types of screen locks available for you to choose from such as passwordpinpattern andface unlock, available in your Android settings. Even when setting pins or pattern locks, try not to make it easy for hackers to guess your password.

The importance of app permissions

Before you begin installing an app from Google Play, a list of requested permissions will pop up to show you what permission the app requires. Apps require permissions to do things but not all of them are necessary.

Always read through the permissions to make sure they make sense andcorrespond to what the app actually does eg. an alarm app does not require a permission to access your text messages. This is a real important step because not all apps in the Play Store are safe.

Securing Your Network

One of the most important thing in protecting your Android is to secure your network. Try to avoid using public WiFi whenever you want to do something important like doing your banking online. As long you are sharing the same network with the public, they can easily sniff out your packets and translate it into actual data of your private information i.e. your passwords.

Create Multiple User Account To Protect Privacy

If you own an Android tablet and have to share it with a sibling, a spouse, or your kids, having multiple user accounts will help each of you protect your privacy. In Jelly Bean for tablet, there is an option for you to create multiple user accounts. You can create another general account for anyone who wants to use your device. The option is under the Settings > Users section.

Prepare A Backup Of Your Data

A backup of your precious data is a must-have in the day and age of smartphones. Picture the worst case scenario where your Android device has been stolen or hacked. The last thing you can do is perform a remote wipe.Without a backup, you will lose all your information in your device.

Even if you could retrieve your stolen phone, chances are that hackers that have managed to access your device will render it useless. If you have a backup however, you can still restore your Android device back to its original state. You can choose to backup important information to the Cloud, your desktop or even to a flash drive, for insurance.

Update your device and apps regularly

Most updates for phones and apps sort out kinks and security bugs so it is in the user's best security interest to stay on top of any available updates. 

Post a Comment

0 Comments