PCWorld (USA)

8 simple ways to protect your smartphone from hackers

Keep your device secure with these easy-to-follow steps.

- BY MARSHALL GUNNELL

Being the victim of phone hacking is a nightmare. The worst case of phone hacking is that the threat actor gains access to your online accounts, such as your social media, email, online shopping accounts, or worse, your banking informatio­n. This would force you to go through the headache of changing a ton of passwords ( fave.co/3ymsytw), having to lock your credit ( fave.co/3ol9eck), contacting your bank and online shopping vendors (Amazon, ebay, and so on), and trying to pinpoint everything else the hacker had access to ( fave.co/3ony59r).

It’s always better to be proactive instead of reactive. Don’t wait until you get hacked to care about your privacy and security. Take steps to protect yourself now.

Here are eight simple precaution­s you can take to remain safe from would-be hackers.

1. USE A PASSCODE LOCK OR FACE OR TOUCH ID

When people think of getting hacked, the first thing that comes to mind is someone in a remote location executing a bunch of code to gain access to your device. This may sometimes be true, but the reality can sometimes be much more boring than that. Hacking simply means that someone gains unauthoriz­ed access to data on your device. This means if someone gets physical access to your phone and accesses your data without your consent, then by definition you have been hacked.

Your mobile device’s first line of defense is your passcode lock or face or touch ID. While this technology isn’t 100 percent foolproof, having a password or other authentica­tion measure enabled will certainly keep a large percentage of people out if they somehow get a hold of your phone. While it may seem like a minor inconvenie­nce to add a lock on your phone, it’s nothing compared to the inconvenie­nce of being hacked.

2. FREQUENTLY BACK UP YOUR PHONE

Keeping frequent backups of your phone is good for several reasons. Even if your phone doesn’t get lost or stolen, having a complete backup of your phone makes the transition to a new phone so much easier.

But if your phone does get lost or stolen, you can wipe the data on that phone remotely while having the peace of mind that you still have access to all of your data. Remember, if you don’t have at least three copies of your data, then it doesn’t really exist. Here’s how to back up your iphone ( fave.co/3ip2217) and your Android phone ( fave.co/3iyzvye).

3. DON’T STORE PASSWORDS (OR OTHER SENSITIVE INFORMATIO­N) ON YOUR PHONE

In general, it’s best not to store passwords or other sensitive informatio­n, such as credit card details or personally identifyin­g informatio­n, on your phone. If your phone gets hacked and the threat actor has access to that informatio­n, it will cause more than just a

headache—it could completely destroy your credit and drain your bank account.

If you do want to store passwords on your phone, make sure you’re using a password manager ( fave.co/3lrkfrz). If you’re tight on cash, you can even get one for free ( fave. co/3nt9ndq). Password managers require a master password to access all of your account credential­s, so create a strong master password and make it something you can remember. Most important, don’t store that master password on your phone.

4. ONLY DOWNLOAD APPS FROM AN OFFICIAL APP STORE

This mostly applies to Android users, as Apple’s app-vetting process is much stricter than Google’s. Additional­ly, you can download third-party apps with Android, allowing for the potential to download a malicious app.

Also, be mindful of what permission­s you grant apps. Some apps request access to your camera, microphone, photos, and so on. While they may have legit uses for this, it opens you up to fraud if you mindlessly give access to everything any old app requests.

5. KEEP YOUR PHONE AND APPS UPDATED

While it can be easy to postpone updates, a lot of these updates provide critical security patches and/or enhancemen­ts. If there are known vulnerabil­ities in an OS or app, you can bet that threat actors are going to take advantage of them. Keeping your apps and phone systems up to date will keep you one step ahead of the would-be hackers.

Additional­ly, if you’re not actively using an app, it’s good practice to delete them.

6. ALWAYS USE TWOFACTOR AUTHENTICA­TION

Two-factor Authentica­tion, also called 2FA, is an authentica­tion method that enhances the security of your accounts. Instead of just requiring a password to get into your account, you’ll need to provide a secondary method of identity verificati­on.

2FA comes in many forms, such as SMS, authentica­tor apps ( fave.co/3jemfgu), Bluetooth, and even physical security keys.

Each type of 2FA provides a varying level of security. Understand­ing the fundamenta­ls will help you decide which method is best for your situation. When it comes to your phone, though, you really can’t beat a physical security key ( fave.co/3pnckdi).

7. USE A VPN

When browsing the web on public Wi-fi, always use a virtual private network (VPN) ( fave.co/3ftttms). A VPN masks your IP and encrypts any data you send, making it difficult for threat actors to intercept or understand. This makes doing things like purchasing something online a bit more secure. But that just means they can’t access your personal informatio­n. Can they actually hack your phone if you’re not using a VPN? Yes.

Without a VPN, your IP address is out there in the open. One method of hacking, known as Remote Hacking, is when a threat actor gains access to your IP address and uses it as a backdoor into your smartphone (or any other device you may be using). With a VPN, you’re using the IP address of the VPN server you’re connected to instead of your device’s real IP address, protecting you from remote hacking.

8. HAVE A PLAN B IF YOUR PHONE GETS STOLEN OR HACKED

In the unfortunat­e event that your phone does get hacked or stolen, it’s important to have a plan in place so that you can quickly neutralize any damage the hacker may be able to cause.

First, don’t wait to learn how to remotely wipe your phone until your phone gets stolen. The quicker you wipe your informatio­n, the better. Once you’ve wiped the phone, it’s now time to locate it. You can use iphone’s Find My iphone or Google’s Android Device Manager to find your device even after you’ve wiped the phone or if it’s been factory reset by the thief or hacker.

The next thing you want to do is contact your local authoritie­s to report the theft. Be thorough in your descriptio­n to the police, and take note of any important informatio­n you may later need to report to your insurance company or phone manufactur­er, such as the officer assigned to your case, the case number, and so on. If your phone was hacked but you still have physical access to it, you can report the crime to the Internet Crime Complaint Center (IC3, fave.co/3yt4z5q) if you’re based in the U.S.

If you believe the hacker may have had access to your personal informatio­n, such as banking or credit card informatio­n, immediatel­y contact your bank to freeze your account and all associated cards to prevent any unauthoriz­ed purchases. Also freeze or lock your credit so the threat actor can’t open any accounts in your name.

Lastly, take a deep breath. Everything is going to be OK.

 ?? ??
 ?? ?? 1.
1.
 ?? ?? 5.
5.

Newspapers in English

Newspapers from United States