Many of us see our smartphones as extensions of ourselves, keeping us connected to the most important things and people in our lives; our personal contacts, emails and photos, and maybe even our credit card numbers, bank statements and health information.
Of course, the convenience of storing so much valuable personal information on one little device can come at a price: Losing a phone can have unwelcome consequences, ranging from simple property loss to full-scale identity theft or financial fraud.
Fortunately, smartphones can be primed with more built-in protections than many other valuables, and with a little careful planning, even a loss or theft can be manageable. Here are some tips on what to do:
Securing Your Phone Before You Lose It
Minimize the risk to your physical device in advance by installing a phone-recovery app. CTIA, a non-profit association for the wireless industry, provides a list of smartphone security apps designed to do everything from remotely locking and wiping your phone in the event of theft, to tracking your device and backing up contacts. There’s even an app that will email you a photo of someone attempting to log in with the wrong password.
The Federal Communications Commission also recommends you keep these smartphone security tips in mind:
- Set and use your personal identification number (your “PIN”) and passwords. A PIN on your home screen is a first line of defence, the FCC says. Also, use different passwords on the different apps, websites and accounts you access via your smartphone. This can help prevent a thief who gets a hold of one password from accessing all your various accounts.
- Don’t alter your phone’s recommended security settings. This can undermine your phone’s built-in security features, the FCC says. But do install security updates and software patches regularly, which can help reduce your exposure to constantly evolving threats.
- Back up your data regularly — either on your computer, a removable storage device, or the cloud.
- Be judicious with apps. Only install apps from trusted sources — which you can help ascertain by checking reviews, confirming the legitimacy of the app store, etc.