• Skip to main content
  • Skip to footer

ATTOG Technologies

Specializing in Small Business IT Security

  • Training and Coaching
    • Online Privacy and Security Training and Coaching
    • Virtual Meeting
    • eLearning
  • Services
    • Email and Marketing
      • Google Workspace Setup and Configuration
      • DMARC Setup and Configuration
      • Email Marketing Setup and Configuration
    • Small Business Support
    • Home User Support
    • Maintenance Plans
      • DMARC Monitoring
      • Network and Server Monitoring
    • Web Design
  • White Papers
  • PGP Key Generator
  • Blog
  • Contact Us
  • Login
  • Cart

Privacy and Security News and Tips 20160705

July 5, 2016 by ATTOG Technologies Leave a Comment

On the soft bed of luxury many kingdoms have expired. — Andrew Young

Weekly Tip

Protecting your Personally Identifiable Information

As time progresses and smartphone technology advances, we become ever more reliant on the power and presence of the computer we carry in our pockets. With everything it does and contains it is truly indispensable in so many ways that if we were to lose it or have it compromised we would be in dire straights.
Beyond the standard ideas of a secure pin or passcode of at least six characters and locking your device when you are not using it, there are other things to consider. One piece that many people do not think about is the authenticity and reliability of the software they install. Do you? All of the different phone platforms have an app store, and their own standards and rules for getting an app in the store. This does not always protect you as the user, and some platforms allow you to add apps from alternative sources. All of this opens us up to the chance of getting infected with malware. An application I have been happy with and been using for years is Lookout. They were recently featured on 60 minutes in a great piece about cell phone hacking. They watch and protect against malware, offer a tracking and alert option, and also a backup option for your contacts, all in the free version (iOS and Android).

There are many options and settings for protecting your phones no matter the platform or data you store and consume, so make sure to research and determine your particular needs. Remember, it is your privacy and your security at stake so it is your responsibility to make sure that anyone that wants to affect that is hindered to the best of your ability or those you enlist to aid you in this important endeavor.

Interesting News

How to Crack Android Full Disk Encryption on Qualcomm Devices

Apple iOS App Store riddled with malware — XcodeGhost haunts hundreds of apps

BlackBerry to Stop Making Classic Smartphone, Shares Fall

Filed Under: Privacy, Security

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Footer

Recent Posts

  • Email Security Best Practices
  • Privacy and Security News and Tips 20160830
  • Privacy and Security News and Tips 20160726
  • Privacy and Security News and Tips 20160712
  • Privacy and Security News and Tips 20160705

Categories

Sign up for our newsletter

This field is for validation purposes and should be left unchanged.

  • Facebook
  • Twitter
  • LinkedIn
  • Yelp
  • Sitemap
  • Terms of Service
  • Privacy Policy
  • Accessibility Statement
  • Affiliate Disclosure
  • Pay An Invoice

Buy Me A Coffee

Copyright © 2009–2022 ATTOG Technologies ยท All Rights Reserved
Built and designed by 7th Circle Designs