Wednesday, January 20, 2016

Panda Security: Tips for safer Android – Analítica.com

more cautious with the safety of our mobile devices Being small size of these computers we carry every day in your pocket, is a very good way to start this year. The Technical Support Panda Security , prepared a list of tips to resguardes valuable information stored, you access and share through your computer with Android operating system.

Unlock Code

By default, your Android device can be unlocked by performing a simple gesture with his finger on the screen. In case you lost or stolen equipment, be sure to put the hardest things a potential attacker: set a PIN , password or unlock pattern sufficiently complex (not worth any ; most are fairly predictable). If it seems complicated than enter it every now enable and configure Smart Lock , which lets you leave the unlocked computer when you’re in a safe environment (for example, at home or at work).

Get ready for the worst

If the day is lost or stolen your device arrives, you’d better count on Android Device Manager installed and properly configured. This program will let you know where the phone and lock if, unfortunately, is walking away or in the hands of a stranger. You can also erase data remotely, but make sure before you have …

Backup

It is essential to ensure that recover all the information and applications you had installed in case of theft or loss of the terminal, but also if the computer breaks down or is compromised by some kind of malware. Photos, videos, songs and other files can be backed up with their own Google tools . For everything else, often enough …

A good antivirus

This is the number one security measure and the biggest barrier you can put between your equipment and cybercriminals . A security solution full and quick updates can protect your smartphone even the latest threats and little known. In addition, as indicated in the previous section, will include functions for backup and other basic to safeguard your device.

Applications from reliable sources

Try to download applications only from the official stores safer: Google Play, Amazon’s own platform and device manufacturer (Samsung, Sony, Motorola …) Keep the “unknown sources” option turned off at all times unless you want install an app in whose provenance fully trust. If you do, again uncheck the box as done.

Verification of applications

Even if you keep your remote smartphone apps from unknown sources, it is convenient to keep alive the Android application verification , which is responsible for frequently check the activity of your device to detect any anomaly and prevent damage. If you encounter something dangerous, this function will recommend uninstall the application or removed from your device immediately.

Watch for permissions

Whenever you install a new app on your device, a list of permissions requested to fulfill its mandate will be displayed: access to the camera, to your list of contacts, Internet … Unfortunately, we tend to accept without worry take a good look, so we can sneak anything. You really need a flashlight consult the GPS to know your location? If something is not right, beware. Luckily, from Marshmallow Android version (6.0), a new management system will enable the permissions to grant or deny the requests case by case, application by application, in a safer and intuitive way.

Encryption

All information in some terminals with Android, as the Nexus 6 and 9, is encrypted by default. In the other, from the version of Jelly Bean (4.1) operating system can be activated in the security settings to add an additional difficulty if an offender (virtual or physical) access your device.

Verification in two steps

Your Google account is the epicenter of all terminal activity with Android so keep her safe is essential to ensure your device. If you have not already done so, activates the mechanism Double check to ask for a code every time someone tries to access a profile from a machine that is not usual.

Stay away from public wifis (or at least use a VPN)

70 euros and 20 minutes is all you need for a striker (without much knowledge of computers) to steal information from your device over an insecure public network. Use wisely the free access of cafes, libraries and airports, never the use to handle sensitive information (passwords, financial data …) and used whenever possible a virtual private network (VPN) to navigate through them.

LikeTweet

No comments:

Post a Comment