{"id":5741,"date":"2021-08-30T16:04:12","date_gmt":"2021-08-30T21:04:12","guid":{"rendered":"https:\/\/cmitsolutions.com\/cincinnati-nky\/?p=5741"},"modified":"2023-05-02T11:52:16","modified_gmt":"2023-05-02T16:52:16","slug":"is-your-smartphone-safe","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/florence-ky-1041\/blog\/is-your-smartphone-safe\/","title":{"rendered":"How to Make Your Smartphone Safer: 6 Cybersecurity Tips"},"content":{"rendered":"<p>Our phones have almost become extensions of our bodies. Most of us either have them in hand or within reach 24 hours a day. According to a Reviews.org survey published in April 2021, <a href=\"https:\/\/www.reviews.org\/mobile\/cell-phone-addiction\/\" target=\"_blank\" rel=\"noopener\">we check our phones 262x per day which amounts to around every 5 minutes<\/a>. Further, a Stista survey earlier this year found that almost half of the respondents stated that they spend 5 to 6 hours per day on their phones, so that number is likely higher.<\/p>\n<p>While we are increasingly aware of cybersecurity protection for our computers and networks, most people do not look for ways to protect smartphones, even though they contain personal information often including medical records and finances.<\/p>\n<p>That is one of the reasons that cybercriminals are targeting mobile devices.\u00a0 They attempt to steal your valuable data and gain private information through hacking activities. \u00a0Recently we learned that an Android malware that was distributed through the Google Play Store was harvesting login credentials from banking and cryptocurrency applications.<\/p>\n<p>This bank fraud was carried out by initiating a hidden screen recording that began when mobile phone users entered their login information. Hackers used those credentials to withdraw money, and because they logged out of the app within minutes, the unsuspecting user did not immediately notice the unauthorized activity.<\/p>\n<p>How do you make your smartphone safer? Here are six tips.<\/p>\n<h2>1. Update Your Apps<\/h2>\n<p>Many apps on iOS and Android update automatically with critical security patches. \u00a0But there are some apps that require special permissions to download, and\/or will only download when your phone is fully charged and connected to Wi-Fi. \u00a0This results in putting off an update or forgetting to start installing one.<\/p>\n<p>This is one of the most important steps for mobile device security. \u00a0Cybercriminals are always coming up with new tricks and smartphone manufacturers and app stores are also trying to keep up by addressing security vulnerabilities regularly. Remember that all it takes is a few days of neglecting to install an update to put a treasure trove of your private information at risk.<\/p>\n<h2>2. Install Apps Only From Verified Sources<\/h2>\n<p>While updating existing apps on your phone is one thing, you need to be sure that all of your new app downloads come from official Google Play, Android, or Apple App Stores. These stores require app developers to meet certain criteria and standards before an app can be offered.\u00a0 However, malicious apps can still slip through the cracks, and misdirects can take you to a spoofed site that looks like a real app store.<\/p>\n<p>Thus, it is critical that you pay attention to the developer\u2019s name and read reviews before you download. Look for misspellings or suspicious links that might promote an add-on to a popular app, so you do not unwittingly install malware over existing valid apps.<\/p>\n<h2>3. Use Multi-Factor Authentication (MFA)<\/h2>\n<p>This is one of the safest ways to ensure smartphone security. \u00a0Even though MFA requires an additional step, such as a text code or personally identifiable ID entry, it is worth the effort for enhanced protection. \u00a0To ensure that this setting is activated, look under Settings\/ Password &amp; Security menu.<\/p>\n<h2>4. Review Your App\u2019s Privacy Settings<\/h2>\n<p>Each new app requests permission to access other parts of your phone such as your camera or location services. Don\u2019t blindly click your approval.\u00a0 Even a trustworthy app may want access to sensitive areas of your phone. If any request appears to be unsafe, do not download the app.<\/p>\n<h2>5. Delete Unused Apps<\/h2>\n<p>Never using an app has consequences as they languish deep on your home screen menu. Never logging in or never bothering to remove it can have serious consequences which may offer hackers access to your device, especially if the app has been discontinued or no longer has extended support. \u00a0By deleting these apps, frees up your phone\u2019s memory and strengthens your overall security. \u00a0Perform this easy exercise every few months to help maintain the health of your mobile device.<\/p>\n<h2>6. Don&#8217;t Use Public Wi-Fi<\/h2>\n<p>Working from home, from a cybersecurity standpoint, is a good thing and a bad thing.\u00a0 It\u2019s good because we are connecting to different Wi-Fi networks less often but bad because we might not be as vigilant about avoiding public ones when we do. \u00a0Unsecured Wi-Fi access can put sensitive information on your phone at risk, especially if you log in to banking apps, shop online, or check your email.<\/p>\n<p>If you have cell phone service and need to connect to the internet, it is best to use your carrier\u2019s network or set up a personal hotspot with a unique password. Virtual Private Networks (VPNs) can also provide an added layer of security.<\/p>\n<p>Smartphones are critical to our day-to-day lives.\u00a0 Treat them with the respect and caution that they deserve.<\/p>\n<p>If you\u2019re not certain about the status of your apps or are worried about security vulnerabilities for remote staff, CMIT Solutions of Cincinnati &amp; NKY has a variety of high-level security services and cybersecurity solutions for your business.<\/p>\n<p>Don\u2019t wait to be a victim.\u00a0 Be proactive.\u00a0 Protect your data and have peace of mind.<\/p>\n<p>Call CMIT Solutions of Cincinnati &amp; NKY at <a href=\"tel:513-594-9169\">513-594-9169<\/a> or <a href=\"https:\/\/cmitsolutions.com\/florence-ky-1041\/contact-us\/\">contact us here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our phones have almost become extensions of our bodies. Most of us&#8230;<\/p>\n","protected":false},"author":81,"featured_media":6042,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[83],"tags":[121],"class_list":["post-5741","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-smartphone"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-json\/wp\/v2\/posts\/5741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-json\/wp\/v2\/comments?post=5741"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-json\/wp\/v2\/posts\/5741\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-json\/wp\/v2\/media\/6042"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-json\/wp\/v2\/media?parent=5741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-json\/wp\/v2\/categories?post=5741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/florence-ky-1041\/wp-json\/wp\/v2\/tags?post=5741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}