The loss or compromise of your phone or tablet can place your personal data in jeopardy. Safeguarding your mobile device is as critical as protecting your computer or even your wallet. Unauthorized access to your phone can potentially expose:
Your email and social media profiles
Messages and contact list
Photos, videos, and notes
Financial and banking information
Data within your apps
Your browsing history
Below is a guide to fortifying your phone or tablet, most of which can be done at little or no cost.
Lock your Phone with Passphrase, Password, PIN or Biometrics
Use robust access control measures like passphrases, PINs, or biometric methods such as facial recognition or fingerprint scans. Avoid easily guessable options like simple swipe patterns or your birthdate. Set your device to auto-lock after a brief period of inactivity, ideally within five minutes and always keep your device in a secure location or on your person.
Encrypt Your Data
Even with a locked screen, unencrypted data can still be accessed. Most recent versions of iOS and Android offer built-in encryption features. Make sure to turn these on to secure your data using your access control method.
Phone Remote Tracking
Enable tracking features like Apple's Find My iPhone or Google's Find My Device to locate or remotely wipe your device if it's lost or stolen.
Regularly backing up your phone's data is crucial for data recovery in case the device is lost, stolen, or damaged. Ensure that copies of essential information are stored on a minimum of two separate devices.
For additional guidance, refer to our backup tips. Utilizing cloud storage services can offer an extra layer of protection for your backups, allowing you to access your data from multiple devices. Automated backup solutions can simplify the process, ensuring that your data is saved without requiring manual intervention.
Enable automatic updates for your operating system and installed apps. Updates often patch security vulnerabilities. Make sure your device is connected to Wi-Fi and charging during the update process. For older devices that no longer receive updates, consider upgrading to a newer, more secure model.
Check that apps are made by a reputable company before downloading and installing on your phone. Only download apps from an official app store. Review the permissions and settings on your apps and remove apps that asks for excessive or suspicious permissions. For example, apps that request access to your photos or microphone where it is not required. App permissions can be viewed in your settings menu. Set your phone to require approval before apps are installed. Parental controls can also be used for this purpose. Remove apps when you no longer need them.
Using public Wi-Fi at places like coffee shops, airports, hotels, and libraries may be convenient but it's not without risks. The data you send and receive could easily be captured by malicious actors. Whenever possible, rely on your cellular data or a trusted Wi-Fi network instead. Disable the automatic connection feature for public Wi-Fi on your device; you can manage this in your phone’s Wi-Fi settings.
If you absolutely must use a public Wi-Fi network, be aware that the data you transmit may not be secure. This includes sensitive information such as emails, passwords, credit card numbers, and banking details. Additionally, cybercriminals could reroute your connection to harmful websites.
For added security, consider using a VPN on your device while accessing public Wi-Fi. If that's not an option, stick to your cellular data or wait until you can connect to a trusted network. Before you connect to a public hotspot, verify its official name with the staff at the location.
Don't forget to disconnect from public Wi-Fi networks when you're done using them and remove their details from your device.
Be cautious of unusual calls, emails, and messages that may be attempts to scam you or gain unauthorized access to your device and personal information. Scammers often employ tactics like pressuring you to act quickly or falsely alerting you to issues with your device or account. Always be wary of emails or messages that prompt you to click on a link or download an attachment.
If you're uncertain about the legitimacy of a call, email, or message, verify its authenticity by reaching out to the individual or organization using a different contact method. For instance, if you get a questionable message regarding package delivery, get in touch with the delivery service via their official website or customer service line. Avoid using the contact details or links provided in the suspicious message, as they may be part of a scam.
Make sure you remove all personal information from your phone before selling or giving it away. For example, by doing a factory reset. This will wipe your information and restore the device to its original settings.
For more advice, read our topic "Securely Dispose Your Device" on How To Secure Your Device.
If you come across an unfamiliar cord or USB device, resist the urge to connect it to your phone, as it could be carrying malware. Disable Bluetooth and Wi-Fi functionalities when they're not in use to enhance your security.
Exercise caution when scanning QR codes. Malicious actors can create QR codes that direct your phone to unsafe websites, install harmful apps, or connect to insecure Wi-Fi networks. It's safer to scan QR codes displayed in well-visible areas within a business establishment, as they are more likely to be authentic. If you have doubts, confirm with an employee. Also, pay attention to any notifications on your phone that detail what actions the QR code will initiate.
If you plan to travel internationally, consult the Smartraveller website to learn how to protect your electronic devices while you're away.
Most phone companies provide simple security guidance on their website. For example, Apple’s security and privacy advice for iPhones and Google’s security tips for Android devices. Read through this security guidance every few months, or when you get a new device, to make sure you’re protected.
Marie from WA once lost her mobile phone, which was unlocked and not protected by a PIN or password. Marie kept all of her account passwords in a notes app on her phone, giving the thief easy access to her online accounts. She also had photos on her phone of her driver’s licence.
While the phone was returned a few hours later, Marie did not realise until the next day that the thief had transferred all of her money to a cryptocurrency website, losing close to $4000.