We keep more and more sensitive information on our mobile, so it is really important to protect it against theft or software weaknesses
The vast majority of us use our mobile for several hours a day. Whether it’s to make calls, to record videos, post content on our social networks… or much more private matters such as starting conversations or sending photos .
For this reason, more and more of us are concerned about our security and privacy. Our mobile usually collects very sensitive information that can range from our bank cards to sensitive images or videos, not counting passwords, emails, etc.
Although all this makes our day to day much easier, it also means that a theft or loss of the mobile can become a real problem. In the first place, because we will lose everything we have on it, especially those that are memories such as irrecoverable photographs or videos.
Secondly, because the information stored on our mobile can be dangerous if it falls into the wrong hands.
Whether it is because the terminal is stolen or because we are victims of a scam or virus , this should be our greatest concern -especially now that payment via mobile has become popular-.
At DownGamer, we have prepared this guide to improve security on our mobile and avoid or minimize any problem arising from losing it.
First of all: password
Although it may seem obvious, the first step to reinforce our security is to establish an access password. For years, both Android and iOS mobiles have offered different methods to shield unlocking:
- face recognition. The least common, since it is a technology present in high-end and premium models. It simply allows us to unlock the mobile with our face. Although it may seem like a reliable or safe method, among all the possible ones, it is surely the one that fails the most.
- Fingerprint. It is becoming more and more common for mobile phones to have a touch reader on the screen and we can unlock it with our finger. This method greatly speeds up the process compared to other methods.
- Pattern. Pattern is one of the most common unlock methods on Android. It can be 3×3 figures or, more safely, 5×5 points.
- Numeric PIN. Another of the most common unlocks is the PIN: a code of 4 or 6 numbers that works like the SIM. That is, we must enter it every time we want to access our mobile.
- Password. The classic: a complete password to access our mobile that combines letters, numbers and symbols. It is the safest, since it is the most complex of all.
It is very important to have at least one or two of these methods – combine, for example, fingerprint and numerical PIN – to prevent anyone from having access to our mobile.
Is an antivirus worth it?
The short answer: no. Although advertisements for mobile antivirus systems are common, the reality is that they do not usually offer a great service compared to what generally affects the performance of the terminal.
It is common for this type of application to consume a lot of RAM and battery memory , a sacrifice that is not usually necessary, since the operating systems themselves have their own very functional security systems.
For this reason, from DownGamer we recommend: first of all, keep our mobile updated . Many weaknesses in apps or operating systems are covered through regular updates or hotfixes , so you don’t have to avoid them or wait a long time.
Second, we must be careful with everything we see or download . Already at DownGamer we recommend the Brave mobile browser for its special emphasis on security, in addition to the fact that it has a native download and pop-up blocker .
In addition, we must avoid downloading APKs -applications outside the official Store- and pay attention to the permissions that the apps ask for. For example: if we install a wallpaper app, it would be rare for it to ask us for access to calls or contacts on our mobile. If this is the case, it is better to uninstall it.
It is also a good idea to activate, in the case of Android, Play Protect : a system that analyzes the apps installed on the mobile and those that we want to download in the future. If it detects something strange, you will be notified.
app lock
Are we afraid that, despite the password or PIN, they can access our mobile? Then we may want to install an application locker such as Norton App Lock or Ultra AppLock .
password managers
At Our blog we have already recommended some password managers in the past to further secure our information.
Some of us choose to save our passwords in the Google account or the browser, but this can be dangerous, especially if our mobile is stolen. A password manager stores, controls and encrypts all the passes, and even alerts us that one has been stolen.
Take care of our “trips” on the internet
Another detail that we do not usually pay attention to is our connections. Let’s talk about WiFi, Bluetooth, NFC… many of us simply connect to the Internet without first thinking about what and how we are connecting to.
Some tips before surfing the internet:
- VPN . At DownGamer we have already dedicated an article to talk about the risks of free VPNs -the paid ones are much safer-, but also about their benefits.
- “Secure Wi-Fi “. It is advisable to avoid public networks, since we are giving access to much of our data. Also, some scammers can create passwordless public networks and use them to collect app information, browsing history, etc.
- It is also important not to make purchases or sensitive actions when connecting to unknown or non-private networks.
- Disable unused connectivity. It is advisable to deactivate the connections that we do not use. That is, if we are not using Bluetooth, it is better to disable it. The same for GPS, NFC or WiFi.
Anti-theft apps
Finally, it is recommended to install some applications known as “anti-theft”. Depending on the app, these can locate our mobile -as long as the GPS is activated-, as well as lock the terminal, sound an alarm and even take pictures.
In the case of Android, there is the Android Device Manager app ( “Find my device “), which allows you to perform all these actions for free. From deleting the content of your mobile, to playing a strident sound.
We will only need to have our Google account linked to the phone number, since it is not mandatory to have it installed on the terminal. Regarding iOS, there is also “Search ” which is exactly the same: it allows us to locate the terminal, activate an alarm, block it or delete all the information.