Resources | Our Blog: Newsledger | White Papers | Budgetary Commentary | FAQS |

How to secure privacy on your smartphone?

September 27th. 2016
The computing power of the modern smartphones is comparable with some computers. It is not difficult those days to do almost everything on your phone that you could on your desktop or laptop. It is not surprising then to see much more issues caused by smartphone spyware and viruses.
How to secure privacy on your smartphone?
For most smartphone users, there is more private information on their smartphones than on their desktops or laptops. So it goes without saying that privacy on the smartphones is one of the biggest concerns.
So how the spying apps get on your phone? It could be much easier than most people realize. Very recently Lookout – the mobile security company -  identified Overseer, a piece of spyware they found in four apps live on the Google Play store. One of the apps was an Embassy search tool intended to help travelers find embassies abroad. The malware was also injected as a trojan in Russian and European News applications for Android. Google promptly removed the four affected apps, but what kind of certainty do we have, that more applications like that are not spread on the Google’s Play Store and the Apple's App Store?
So how can anyone detect the existence of malicious software on their smartphone? The easiest way is to install one of many Mobile Security Apps and let it scan your phone for any suspicious apps. Examples would include Lookout Security & Antivirus app, Malwarebytes Anti-Malware, Norton Security and Antivirus, Kaspersky Antivirus & Security, McAfee Security & Power Booster, ESET Mobile Security and Antivirus or any other security app that you know and trust.
It is a good idea to run full security scan on your smartphone any time you notice an unusual or strange behavior from your phone, noise during phone calls, higher than expected data usage, unusual battery drain, unexplained reboots and shut downs, strange popups and when you phone is unusually slow for no good reason.
Finally, there is no excuse those days not to have a pin on your phone – and do not use short and easy to remember sequences i.e. 1212, 1234 and so on. Lost or stolen phone can be easily exploited if not properly protected. In most cases hackers would have only ten guesses of your pin before phone wipes itself clean.


Copyright: tiero / 123RF Stock Photo




T1 Checklist T1 Checklist
Community Action 
2005 - 2014 - Past Blog Posts 

At S+C Partners, we take a holistic view of client relationships by providing a full range of services including assurance, tax, advisory and information technology to support our clients’ financial commitments, minimize tax liabilities, optimize profitability and automate business processes.

Home | Legal and Privacy | Sitemap | Contact | Google+
All content © 2018 S+C Partners LLP