• Safety Rules When Using A Smartphone.


    7 Safety Rules When Using A Smartphone.


    One of the major problems of smartphones is the attitude of users to them. Despite the fact that smartphones are almost full replacement of laptop or home computer, many people treat it as a normal phone, which is fraught with possible negative consequences. In this article we will focus on 7 foolish things that we do on a smartphone.

    To better understand what stupid things you often do on your phone, try not to position it as your heaped up mobile and treat it as a smaller version of a laptop. Ask yourself this question before every action: would I do this on my laptop? Thus, the problem will become more apparent.
    1. We don’t put a password on a smartphone:
    For some reason all of us care about the safety of our laptops, but don’t pay enough attention to the smartphone. So why do we put passwords on a laptops? Just think, it’s much easier to get into the smart phone, because we often lay it on the table. Don’t forget about the attacker. A smartphone which is unprotected with password will cause greater temptation for a thief to steal, if he finds the lack of protection.

    2. We don’t come out of the account in the important services:
    Holy belief that our smartphone – it’s only our smartphone, and no one will ever be able to get to him creates such carelessness. It is unlikely that you leave your credit cards within reach of other people. You should understand that while you staying logged in financial and social services, you almost completely give all your finances and personal information to anyone who will take up your smartphone (especially in view of the first paragraph).

    Don’t allow such services save your entries in the mobile browser or app. Of course, you don’t really want to enter each time data when entering, but it’s the price for financial security and privacy of data.
    3. We allow our smartphone to connect automatically to any open Wi-Fi network:
    Perhaps it is convenient, but how should we know who administers the network and what are his intentions? The attacker can gain access to your data if he has appropriate software, which is freely available.

    4. We leave the turned on Bluetooth:
    There are methods of hacking smartphone via Bluetooth. Despite the fact that this method requires the immediate vicinity of the attacker to the victim, crowded places (such as shopping malls, airports and so on) can be an excellent habitat for such individuals.

    5. We keep very personal information on your phone:
    You must understand: the pictures which is “not for everyone”, e-mail and documents, financial data and any other information which represents value shouldn’t be stored on the smartphone in an accessible form.

    6. We don’t clean the history in the mobile browser:
    If the attacker will have strong desire to gain access to your data, than the presence of history in the browser will help him greatly.

    7. We don’t set on a smartphone application for remote formatting:
    If you lose your smartphone, or it was stolen just in order to sell, then such application will deprive the new owner access to your information.



  • Commentaires

    Aucun commentaire pour le moment

    Suivre le flux RSS des commentaires

    Ajouter un commentaire

    Nom / Pseudo :

    E-mail (facultatif) :

    Site Web (facultatif) :

    Commentaire :