Wednesday, August 20, 2014

Four security features that you should turn on your … – The Confidential

Years ago, when a user mislaid your mobile phone only risked losing contact list or SMS I had stored. Currently, smartphones collect all kinds of personal information such as photos, videos, spreadsheets, pdfs, presentations and working papers. Data, which in many cases are a great value.

The truth is that many users who have lost their terminal on occasion, directly or stolen. To avoid losing data, it is best to back up regularly in the cloud. But apart from this, from LifeHacker give us some tips to improve security in Android phones.

Where is my Android?

The Google operating system, like the rest, has available multiple payment applications useful not only to find the phone, but also to manage it from a distance. But the Mountain View also have the free Android Device Manager.

This application allows you to locate lost devices (provided they are associated with the Google account), reset the PIN lock screen and even erase all data.

In the Device Manager terminals appear to be associated with the account. From there you can geotag where deemed appropriate, make it sound (handy for those cases that have been lost somewhere in the house), lock and delete the information if it is believed to have been stolen.

The latest update also offers the possibility, in case of loss, add a button that facilitates making a call to the mobile business.

Enables two-step verification

Google also offers the possibility of installing similar two verification steps to using many banks. After installation, the login procedure will be something different. First you need to enter the traditional password, but then a code will be sent via text message, voice call or mobile app, and only served once asked.

When you log can indicate a return to not request a code for that specific computer When logging can indicate not reapply for a code for that specific computer.

“Most users only have one layer of security, which is your password.’re not aware of the importance of your own because you can with it access multiple personal details as our email , Google Play or social networks. With the two-step verification if a hacker get to cross the security layer of the first password yet need your phone to access your account, “said a Teknautas Carlos García de la Barrera, Head of Systems Lextrend.

Encrypt the phone if you keep confidential material

Another option is to encrypt your phone. Since Settings Security and Encrypt device can be encrypted accounts, downloaded applications and multimedia data, among other files. Once encrypted mobile, the user will need an additional password to decrypt it each time you turn it on.

This option may be of interest to those who stored on your phone sensitive and private data, or those others working and need to protect confidential data.

To do so requires that the battery exceeds 80% or is connected to the network. Note that it takes to be about an hour and can impair the performance of some older models. Should also make a backup before doing so.

Locks the screen and add your personal information step

It may seem obvious, but as Consumer Reports , quoted by LifeHacker , 39% of users in the USA does not install a password on your mobile phone. Doing so is very simple. We only need to go to Settings Security and then Screen lock . Depending on which Android phone you have, you can do differently. Either by classical password, strokes, facial or fingerprint identification in the case of Samsung Galaxy S5

It is also worth adding our personal information on the lock screen. It is not normal, but there may be some citizen who finds a smartphone that is not yours and want it back. How to find out who owns if it is locked? If you add your contact information on the screen you can contact easily.

To do this you should go to Settings Security Security screen and Owner Information . “Make sure we add the necessary information so that we can contact. Nor passed. Theirs is to add an alternative or business phone, and our name. Need not compromise your privacy or security. Ie do not put your address to see if in addition to losing the phone you’re going to steal what you have at home, “he concluded Barrier.

LikeTweet

No comments:

Post a Comment