[{"@context":"https:\/\/schema.org\/","@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/the-ping-personal-cell-phone-security\/#BlogPosting","mainEntityOfPage":"https:\/\/univista.com\/posts\/the-ping-personal-cell-phone-security\/","headline":"The Ping: Personal Cell Phone Security","name":"The Ping: Personal Cell Phone Security","description":"ShareTweet It is probably safe to say that the majority of us carry around some type of smart device. Whether it is an iPhone, Galaxy, Pixel, Note, or Jitterbug, these devices play a huge role in our daily lives. We use these \u201cphones\u201d more for interacting with the internet than to talk, on the phone, [&hellip;]","datePublished":"2019-04-26","dateModified":"2019-04-29","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/corie-bogan\/#Person","name":"Corie Bogan","url":"https:\/\/univista.com\/posts\/author\/corie-bogan\/","identifier":5,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2019\/04\/hand-iphone-macro-40011-1.jpg","url":"https:\/\/univista.com\/wp-content\/uploads\/2019\/04\/hand-iphone-macro-40011-1.jpg","height":1365,"width":2048},"url":"https:\/\/univista.com\/posts\/the-ping-personal-cell-phone-security\/","about":["android","bluetooth","internet","iPhone","malware","network","safety","Security","smart devices","The Ping","update","virus","vulnerability","wifi"],"wordCount":617,"keywords":["2fa","apple","cybersecurity","data breaches","hackers","iphone","malware","multi-factor authentication","Risk","Security","upgrade","upgrades"],"articleBody":"ShareTweet                                        It is probably safe to say that the majority of us carry around some type of smart device. Whether it is an iPhone, Galaxy, Pixel, Note, or Jitterbug, these devices play a huge role in our daily lives. We use these \u201cphones\u201d more for interacting with the internet than to talk, on the phone, to real live people. We routinely access almost all of our personal information including email, social media, and even confidential information such as banking or business from them. Not to mention our phones often act as the \u201cremote control\u201d that gives us the ability to control the smart devices in our IoT (Internet of Things) network (i.e. lightbulbs, garage doors, security systems, etc.). What\u2019s true is that most of us have setup a screen unlock code or pattern to access our devices, apps, and data in an effort to secure our information. We also rarely let it out of our sight in order to feel like the information is safe, but that\u2019s really not the case.Just like any other IoT device, cell phone security is a must. \u201c82% of respondents predict unsecured IoT devices will likely cause a data breach in their organization. 80% say such a breach could be catastrophic\u201d &#8211; Raytheon. The chances of your data being accessed without authorization is higher than ever and growing every day. The possibility of someone using that information maliciously is almost inevitable. We have seen it happen. Here are some of the Do\u2019s and Don\u2019ts of cell phone security, how to better protect your information, and a few tips to maintain control of the data on your device in the event it is stolen or lost:Do\u2019s Always keep your phone operating system (OS) and Apps up-to-date. New features and security updates are rolled out all the time.Only purchase\/download apps from your manufacturer\u2019s designated \u201cstore\u201dThis is particularly important for Android, as Apps can be installed by clicking internet links. If you want to use an app, search for it in Google Play.Install anti-malware and keep it updated!Especially if you have an Android device!Turn on face recognition\/thumbprint for screen lock security; passcodes are easy to crack or \u201cvisually steal.\u201dA short lock out time of one to two minutes can help make the lock more effective.Check your Bluetooth settings; make your device non-discoverable if possible.Go through your \u201cSecurity Settings\u201d and spend the time to get familiar with what you can turn on and off.Passwords: make them complex and change them often.For more information on how to make a complex password, check out our article The Ping: Security in Public PlacesConsider using 2FA for your sensitive data apps.Learn more here \u2192 The Ping: 2FAProtect yourself in the event your phone is lost or stolen:Backup your device often and enable remote wiping functionality.Consider enabling a SIM card lock.Don\u2019tsNever use a jailbroken\/rooted phone. The main concern here is the lack of security updates. It\u2019s like buying a car or a house without locks on the doors.Don\u2019t access confidential information on a public WiFi. Consider a personal VPN if you will often be connected to public WiFi hot spots.Don\u2019t reuse passwords for multiple apps.As always, we know we\u2019ve thrown a good bit of information at you. If you want to discuss specifics and how to check some of these settings on your own device feel free to give us a call at 512-832-6209 or email support@univista.com. &nbsp;We\u2019re all connected and in it together!Your UniVista Team*Celebrating 20 Years of Customer Satisfaction*ShareTweet                                        "},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Posts","item":"https:\/\/univista.com\/posts\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"The Ping: Personal Cell Phone Security","item":"https:\/\/univista.com\/posts\/the-ping-personal-cell-phone-security\/#breadcrumbitem"}]}]