Top Tips for Securing Your Smartphone

Mike Halsey MVP
Nov 26, 2011
Updated • Dec 27, 2012
Mobile Computing
|
7

The more we use our smartphones and the more personal and sensitive data we keep on them you'd think the greater target they are for thieves and hackers, right?  Well, the fact is that mobile phones are already the number one target for thieves at the very least.  Your new phone could be valuable and while it could be blocked by networks in your own country, that's not to stop the handset being sent abroad and used in a country where such blocking doesn't exist.

But surely you don't keep any sensitive information on your phone unless people really are interested in text messages from a loved one or emails from Groupon?  Here you'd be wrong again.  In this article I want to have a look through the different types of important information you keep on your smartphone, and look at ways you can keep it safe and secure.

So what information do you keep on your handset?

Contacts

You might not keep really sensitive details about yourself on your phones such as your Social Security number or bank details, but you do keep ever growing details about all your contacts.  These include their full names, address, email address and multiple phone numbers and, crucially information such their full date of birth (which is used in faking IDs and gaining access to accounts) and possibly family connections that are possibly giving up details such as their mother's maiden name.  In short you are being entrusted with a huge amount of information on a huge number of people, all of which can be used for identity theft.

Email

It might not be possible for someone to discover your email password or to change it from your handset, though a good hacker might still find a way, but depending on what emails you store locally in your inbox they might reveal all manner of additional detail about you perhaps including at least partial credit card details if you've been shopping online.

Documents

More and more of us are keeping documents on our phones and with the inclusion of support for services such as Windows Live SkyDrive in Windows Phone, it's becoming far easier to not know what important and sensitive documents you actually can access from your phone, maybe without even knowing the functionality is already there and switched on.  If you use DropBox on your phone for instance what documents are you storing in the cloud that can be easily and instantly accessed by someone who has physical access to your phone?

GPS Locations

As more and more of us use smartphones as GPS devices, what locations have you got stored in your phone?  Do you, for example have "Home" listed as a location?  If you do a thief could be directed straight to your home at the time when they know, if they've just stolen the handset, that you're out.

How can you secure your handset?

Use a Password Lock

The most basic and simple way to lock your phone is to put a passcode on it, be this a physical numerical code or a swipe pattern.  Make it a good one though, definitely not an obvious pattern or the same code as you use for the PIN number on your bank card.  Having a code or pattern that's a bit harder to do might be a little more inconvenient for you, but it comes with a great deal more peace of mind.

Write down your IMEI number

The phone's unique identifier code, it's 15 digit IMEI number can usually be found close to the SIM card slot and battery compartment in a phone.  Write down this IMEI number and keep it in a safe place at home in case you need to cancel the phone, it will make things quicker, or more important to report the phone as lost or stolen to the police.  Having the IMEI number will help make sure the handset can be quickly returned to you if it is found.  You can check the IMEI number on the phone itself by typing *#06# on the keypad.

Edit Your Lock Wallpaper to add an ICE number

An ICE (In Case of Emergency) number can quite possibly save your life if you are involved in an accident or incapacitated and the emergency services can't unlock your phone to call a relative or friend.  Unfortunately modern smartphones still don't include support for ICE numbers but if you manually edit in a graphics package onto the image you use for your lock screen, it can be a great help in having your phone returned to you if it is found.

Use Anti-Malware Software

Malware and viruses on smartphones are becoming ever more common and regardless of how secure the platform might be, or how much vetting all the apps might go through, there's no guarantee that malware won't slip through the net.  Check the reviews online to see if the anti-malware software you're buying is actually any good and preferably go for one of the big name companies such as AVG or Kaspersky for added peace of mind.

Use a Remote Management Service

Some smartphone platforms, including Windows Phone, come with a remote management service you can access online.  These services can allow you to remotely lock the phone, track it (even when locked) or even wipe it altogether and perform a hard reset if you suspect it is gone for good.  These services are accessed through any web browser and if your smartphone comes with such a service it is well worth signing up for it.

So what are your additional tips for keeping your smartphone, and its sensitive data safe and secure?  Write them in the comments here as we'd love to hear them.

Advertisement

Tutorials & Tips


Previous Post: «
Next Post: «

Comments

  1. Rush said on August 28, 2023 at 9:50 pm
    Reply

    If Nothing OS is nothing more that an overlay with Google still in the midst….then I ain’t interested.

    1. Seeprime said on September 12, 2023 at 4:12 pm
      Reply

      Another unrelated comment older than the article. Pathetic.

      1. Robenroute said on September 13, 2023 at 9:06 am
        Reply

        it is becoming mindbogglingly annoying indeed…

  2. ThisIsTheWayTheGhacksEnds said on September 13, 2023 at 9:09 am
    Reply

    Under: https://www.ghacks.net/2023/09/12/iphone-15-with-usb-c-port/

    Apple was forced to add USB-C to a phone and the maccultists start talking about “revolution” and “paradigm shift” (as if USB phones had never come out before). It’s so ridiculous it’s reminiscent of comedians doing the “stepped on a water hose” stunt – that was at least somehow funny a hundred years ago.
    Reading this on a site that used to be a technical resource is especially ridiculous.
    How pathetic

  3. Anonymous said on September 14, 2023 at 4:28 pm
    Reply

    “An iPhone 15 with a USB-C port will mean more than you think”

    That Apple can finally stop hindering progress if spanked hard enough ?

  4. Alex Hales said on September 21, 2023 at 12:51 am
    Reply

    I’m thrilled to see Instagram taking steps to enhance the user experience with features like Live Activities. This update is a game-changer, especially for those who frequently upload content on the platform.

    The ability to track upload progress in the background is a simple yet incredibly useful addition. It not only keeps users informed about the status of their uploads but also allows for a more seamless experience on the platform. No more constantly checking if your post has successfully uploaded or worrying about interrupted uploads due to a weak signal.

    As an active Instagram user, this feature is a relief. It showcases Instagram’s commitment to improving user satisfaction and addressing common pain points. It’s all about making the platform more user-friendly, and this feature certainly accomplishes that.

    I can’t wait to try out Live Activities and enjoy a stress-free posting experience. Kudos to Instagram for continually innovating and making our social media lives easier!

    Keep up the great work, Instagram, and thanks to ghacks for keeping us in the loop with the latest tech updates!

    I am additionally add one more think if you want to watch instagram stories anonymously to visit site storysnooper.com.

  5. Alex Hales said on September 25, 2023 at 6:02 pm
    Reply

    I found this post really insightful! It’s always intriguing to learn about the various ways we can navigate and understand social media platforms. The idea of checking someone’s Threads following list might seem like a niche topic, but in today’s digital age, it can be quite relevant.

    As someone who uses social media regularly, I appreciate the tips and guidance provided here. It’s not just about curiosity; it’s also about understanding our online connections better. This information can help us engage more effectively and stay updated with the content that interests us the most.

    The step-by-step instructions provided in the article are clear and easy to follow. It’s great that the author has taken the time to break down the process, making it accessible to both tech-savvy individuals and those who might not be as familiar with these platforms.

    I also appreciate the emphasis on privacy and ethics. It’s essential to remember that online interactions should always respect the boundaries and consent of others. The article’s focus on respecting others’ privacy is a reminder of the importance of responsible online behavior.

    Overall, this post is a valuable resource for anyone looking to understand more about the Threads following list on social media platforms. I’ll definitely be sharing this with my friends and followers who might find it useful. Keep up the great work, ghacks!

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

We love comments and welcome thoughtful and civilized discussion. Rudeness and personal attacks will not be tolerated. Please stay on-topic.
Please note that your comment may not appear immediately after you post it.