Ten tips on mobile security to help you stay away from Edison"

Source: Internet
Author: User

Password to protect your device

Recently, Android apps have frequently exposed various security threats, such as leaking user privacy, fees, and traffic consumption in the background. Another phenomenon that cannot be ignored is the loss of mobile phones. Nowadays, mobile phones basically have functions such as taking photos, taking videos, surfing the Internet, sending and receiving emails, and a PC. Many users' privacy information is stored on mobile phones, and the loss of mobile phones can surprise all users. Here we provide 10 suggestions on how to ensure mobile security:

  First, no matter how annoying you are, you must use a password to protect your device.

Passwords can play a certain role in security, regardless of the simplicity and complexity. If your mobile phone or tablet is picked up by an ordinary person, your information will not be opened easily at least immediately. As long as it is not a simple password on the road such as 1234 and 0000, it is not easy for people to try it out manually.

  Second, only install applications from trusted sources.

What is the most trusted? Apple's mobile phones and tablets are of course in Apple's stores. Android mobile phones and tablets are relatively secure if you can access Google's app store google player. Of course, A recent report said that some apps in the Google App Store may leak privacy. However, compared with third-party application markets with various forms and varying sizes, Google's official application center is quite secure.

  Third, please back up your data in time.

On the Android tablet, many manufacturers provide their own backup tools or online backup services. We recommend that you use the PC synchronization tool to back up your data to your local device. If you really don't want to back up your data in PC, you must back up your data to the cloud. But it is important that you do not forget to handle the backup on the cloud after changing your mobile phone. Including your contacts, Precious photos and videos taken on your mobile phone, etc. No matter which method you use, you need to back up your device and do not forget to retrieve or destroy the backup after you change the device, in case someone else obtains your cloud backup from a second-hand device.

  4. Update your operating system in time.

This is because security updates are often used in operating system updates. The operating system is only a special application, and of course there will be vulnerabilities. System vendors provide security updates in a timely manner. security risks can be avoided only when patches are installed in a timely manner. In addition, try to use the latest application software, because most of the new software updates application vulnerabilities. Of course, if your hardware is not enough to install the latest update, it is a pity, but it is generally recommended to install the OS update in a timely manner.

  5. Do not crack your device.

Because if your device is cracked, whether it is cracked by yourself or you use a third-party program to Root it on Android, it can be said that your device security is no longer in your hands, and this device is "not owned by you. Some people, a group of people, a company, or a large ad alliance later may share information about your device. If this is not necessary, or for another input method, I think there is really no need to crack my own device.

Remember to log out of your account

  Sixth, remember to log out on your mobile phone if you are doing online banking or shopping activities.

Some programs won't log out after they are logged in. Apple's mobile phone is in the background and there is no possibility of logging out, so it is always in the login status. In this way, if you encounter an application with potential threats, you can easily obtain your password through the cache. Therefore, no matter what application you use, you must log out of the application after use. It not only avoids the acquisition of dangerous applications, but also ensures that your online banking and other passwords will not be lost even after your device is lost.

  7. Enable WiFi, location service, and Bluetooth only when needed. By default, it is disabled.

Now wireless technology is widely used, and it is also a good opportunity for people with poor intentions. Now there are some wireless traps. Once you log in, you can say that the information on your device is sent out with both hands. Services for it and Bluetooth also have some threat factors. amap and Baidu suggested that users only turn them on during navigation and turn them off when they don't need them.

  8. Avoid replying to account passwords or other information in text messages and emails.

We recommend that you compress and encrypt the confidential file if you send confidential information to others. Because today's emails are easily intercepted. Once the confidential information is intercepted, your confidential information will no longer be confidential. Similarly, if you need to provide a password to someone else, we recommend that you use the phone number. Whether using emails or text messages, it is not as secure as the phone.

  9. Do not click a link in a suspicious email or text message.

Emails have always been a weak point in security and are easy to break through. Therefore, emails have always been favored by hackers. Although emails have a long history, they are still not ignored by hackers. Email connection is a threatening factor. Please do not click it rashly. In addition, mobile phone text messages can also push some elements such as links. Do not click these links easily on your phone, causing unnecessary troubles.

  10. Install a mobile security application that you trust.

No matter how careful people are, there will be negligence. At this time, it is necessary to give your security to a trusted security application. Of course, you don't have security applications or anti-virus software, so you don't have to worry about it. You also need to be careful. In addition, k also needs to pay attention to public opinions and check whether your anti-virus software is trustworthy, because some anti-virus software monitors and steals user information while protecting them, we recommend that you select a trustworthy security software.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.