Cell Phone Security

By
June Adams
January 4, 2022
Share on:

As scammers get more sophisticated, be sure to protect yourself and your access points, such as your smartphone.

Start by making sure your phone is encrypted. Most phones, such as iPhones, Google Pixels and post-2018 Samsung phones are encrypted by default. Should you have a different model, search online for instructions on how to encrypt your phone.

Be sure to have a secure passcode for your phone. 6-digit passcodes are better than the standard 4-digit. Face or fingerprint recognition is secure as long as you use the phone’s built-in systems rather than a third-party. Utilize your smartphones’ “find phone” feature if it has one. Your smartwatch can also be utilized to locate a misplaced phone.

As your data can be intercepted on Wi-Fi networks that are not encrypted, it’s best to disable the Connect Automatically feature on your smartphone. This usually requires the simple UNCHECKING of a box. If storing payment methods electronically on your phone, only keep debit cards. Most vendors require a PIN to be entered when debit cards are used, adding an extra layer of protection. Lastly, should you be switching to a new phone, factory-reset the old phone after the switch, regardless of who will be receiving the old phone.

Ultimately, treat your phone with the same security as you treat your wallet, if not better.

You may also like:

By Trilogy Financial
July 26, 2023

Scammers are pretending to be bank customer service representatives reaching out regarding fraud prevention. Their goal is to get you to reset your login credentials and gain access to your account.

How it works
  1. Scammers, posing as customer service representatives, will call and keep the victim on the phone for multiple hours to “resolve” a fraud issue.
  2. The scammer urges quick action to prevent alleged hackers from draining the victim’s account.
  3. The victim is asked for sensitive information like login credentials and verification answers.
  4. The scammer logs in to the victim’s account to initiate unauthorized payments, bypassing security restrictions via a direct call to the real Fraud Support, all while the true customer is on hold.
Quick Tips
  • Check your account activity frequently and monitor for suspicious transactions.
  • When asked for information that seems unusual, hang up and call the phone number on the back of your bank card or account statement.
  • Read text and email communications fully and pause before responding.
  • Remember that banks and credit card companies will never ask you for your password or your card/account number over the phone.

 

By Trilogy Financial
January 15, 2020

Get Started on Your Financial Life Plan Today