Cell Phone Security

By
June Adams
January 4, 2022
Share on:

As scammers get more sophisticated, be sure to protect yourself and your access points, such as your smartphone.

Start by making sure your phone is encrypted. Most phones, such as iPhones, Google Pixels and post-2018 Samsung phones are encrypted by default. Should you have a different model, search online for instructions on how to encrypt your phone.

Be sure to have a secure passcode for your phone. 6-digit passcodes are better than the standard 4-digit. Face or fingerprint recognition is secure as long as you use the phone’s built-in systems rather than a third-party. Utilize your smartphones’ “find phone” feature if it has one. Your smartwatch can also be utilized to locate a misplaced phone.

As your data can be intercepted on Wi-Fi networks that are not encrypted, it’s best to disable the Connect Automatically feature on your smartphone. This usually requires the simple UNCHECKING of a box. If storing payment methods electronically on your phone, only keep debit cards. Most vendors require a PIN to be entered when debit cards are used, adding an extra layer of protection. Lastly, should you be switching to a new phone, factory-reset the old phone after the switch, regardless of who will be receiving the old phone.

Ultimately, treat your phone with the same security as you treat your wallet, if not better.

You may also like:

By
Jeff Motske, CFP®
October 8, 2018

Your Financial Future Family ties are amazing. These connections, based in DNA, history and genuine care, can prompt many to support their loved ones through times of need, be it emotional, physical and even financial. It is natural to want to support your family, but the players involved can double (or even triple or quadruple in cases of blended families), increasing the financial strain. Since these familial situations can snowball quite quickly, I urge you to focus first on your own financial independence and be sure not to let your parents and your children squeeze your financial future. While many hate to be a burden on their family, it’s actually quite common for people to financially assist other family members. According to Ameritrade’s Financial Support Study, one-fifth of Americans are Financial Supporters, meaning they provide financial support to a parent and/or an adult child.1 A survey conducted by GoBankingRates found that 63 percent of children plan to financially support their parents in some way once they retire.2 On the other end, parents are also financially supporting their grown children. Per Financial Planning OWS, 24% are helping with rent and 39% are paying cell phone bills.3

My primary advice is to always pay yourself first. Be sure to establish a healthy emergency fund and contribute to your retirement. It’s similar to what you hear on airplanes about placing the oxygen mask on yourself before placing it on others. You need to be sure that you are fiscally secure before you provide for those who are financially struggling. This is very sound, logical advice, which can be difficult to follow once emotions come into play.

Most of the decisions I see my clients struggle with are when the emotional and the financials are at odds. When your daughter wants to go to that expensive, out-of-state college that you didn’t save enough for, it’s tempting to try to make it work, whatever means necessary. Or perhaps your son is going through a costly divorce, and the only way you feel you can support him and ensure you see your grandkids is to borrow from your retirement to hire him a good lawyer. These are the moments when you need to be able to tell your child and yourself, “No”. In most cases, there are other options and alternatives in place. They may not be the dream situation, but they will still get the job done. Don’t sacrifice your future for your child’s dream, no matter how compelling. Don’t let emotions cloud good judgment.

On the other end of the spectrum, is a harsh reality. When dealing with parents who may not have planned sufficiently or are in the midst of a financial crisis, be sure that you are communicating as one adult to another. If possible, you may want to tackle those financial conversations early. Some of these difficult financial conversations with parents are tied to medical issues, so be sure to discuss before physical situations become dire.

When you find yourself in the midst of these difficult situations, please don’t forget about your support system. Your financial advisor can act as an unbiased referee in moments of disagreement or emotional struggle. They will likely remember the important financial issues that may slip your mind and will be ruled by numbers rather than nostalgia. At the moments when you need a pragmatic perspective to shine through the cloud of emotions, a trusted financial advisor can be invaluable.

In a time where many people find themselves part of the Sandwich Generation, taking on financial burdens can seem inevitable. Yet, so much can be avoided and accomplished when you act in advance. Start chatting with mom and dad while they’re still in good physical and financial health. Start saving for colleges as early as possible. When you’re proactive, you can prepare. When you’re reactive, people and finances can take a hit.

  1. https://s1.q4cdn.com/959385532/files/doc_downloads/research/TDA-Financial-Support-Study-2015.pdf
  2. https://www.gobankingrates.com/retirement/planning/kids-plan-financially-support-parents-retirement/
  3. https://www.forbes.com/sites/carolynrosenblatt/2018/07/09/aging-parents-helping-adult-children-financially-unhealthy-results/#321bb1e2ef39
By
June Adams
May 10, 2021

Weak passwords can compromise the best security tools and controls. With a never-ending list of applications and services that users and consumers access, people may have dozens of passwords to maintain at any given time. Often, the temptation to use familiar terms such as pet names, favorite teams or the names of children or friends can cause risk since much of those details can be discovered by a simple examination of social media.

Creating strong passwords offers greater security for minimal effort. Weak passwords can compromise the best security tools and controls. With a never-ending list of applications and services that users and consumers access, people may have dozens of passwords to maintain at any given time. Often, the temptation to use familiar terms such as pet names, favorite teams or the names of children or friends can
cause risk since much of those details can be discovered by a simple examination of social media.

Under Lock and Key
You can buy a small padlock for less than a dollar—but you should not count on it to protect anything of value. A thief could probably pick a cheap lock without much effort, or simply break it. And yet, many people use similarly flimsy passwords to “lock up” their most valuable assets, including money and confidential information. Fortunately, everyone can learn how to make and manage stronger passwords. It is an easy way to strengthen security both at work and at home.

What Makes a Password ‘Strong’?
Let’s say you need to create a new password that’s at least 12 characters long, and includes numerals, symbols, and upper- and lowercase letters. You think of a word you can remember, capitalize the first
letter, add a digit, and end with an exclamation point. The result: Strawberry1!

Unfortunately, hackers have sophisticated password-breaking tools that can easily defeat passwords based on dictionary words (like “strawberry”) and common patterns, such as capitalizing the first letter.
Increasing a password’s complexity, randomness, and length can make it more resistant to hackers’ tools. For example, an eight-character password could be guessed by an attacker in less than a day, but a 12-character password would take two weeks. A 20-character password would take 21 centuries. You can learn more about creating strong passwords in your organization’s security awareness training. Your organization may also have guidelines or a password policy in place.

Why Uniqueness Matters
Many people reuse passwords across multiple accounts, and attackers take advantage of this risky behavior. If an attacker obtains one password—even a strong one—they can often use it to access other valuable accounts.

Here is a real-life example: Ten years ago, Alice joined an online gardening forum. She also created an online payment account and used the same password. She soon forgot about the gardening forum, but someone accessed her payments account years later and stole a large sum of money.

Alice did not realize the gardening forum had been hacked, and that users’ login credentials had been
leaked online. An attacker probably tried reusing Alice’s leaked password on popular sites—and
eventually got lucky.

Guarding Your Passwords & PINS. Passwords and PINS protect sensitive data and it's critical to keep them safe. Try these best practices to stay protected.

1. Do not write them down – Many make the mistake of writing passwords on post-it notes and
leaving them in plain sight. Even if you hide your password, someone could still find it. Similarly, do
not store your login information in a file on your computer, even if you encrypt that file.
2. Do not share passwords – You cannot be sure someone else will keep your credentials safe. At
work, you could be held responsible for anything that happens when someone is logged in as you.
3. Do not save login details in your browser – Some browsers store this information in unsafe
ways, and another person could access your accounts if they get your device.
4. Use a password manager – These tools can securely store and manage your passwords and
generate strong new passwords. Some can also alert you if a password may have been
compromised.
5. Never reuse passwords – Create a unique, strong password for each account or device. This
way, a single hacked account does not endanger other accounts.
6. Create complex, long passwords – Passwords based on dictionary words, pets’ names, or other
personal information can be guessed by attackers.

 

 

 

Get Started on Your Financial Life Plan Today