11/10/2022 0 Comments Youtube an inconvenient truth![]() ![]() This is especially important if you haven't set a longer passcode.Īlso, regularly back up your phone. Additionally, make sure your device is set to erase its contents after 10 bad password attempts at maximum. ![]() Delays mean someone who snatches your phone can get to your data if they bring up the screen in time. Second, set your device to require a password immediately after it’s been locked. If you're using facial recognition or a fingerprint unlock on your phone, this shouldn't be too inconvenient. For better security, use a password or a passcode that's at least six characters long-and preferably longer. Your phone should be locked with the most secure method you're comfortable with-as long as it's not a 4-digit PIN, which isn't exactly useless but is definitely adjacent to uselessness. They also have a habit of falling out of our direct physical control by being lost, stolen, or idly picked up by others while we’re not attending to them.ĭefending against casual attempts to get at personal data on a smart phone (as opposed to attempts by law enforcement, sophisticated criminals, or state actors) is fairly straightforward.įirst, if you're not at home, you should always lock your device before you put it down, no exceptions. Smart phones and tablets carry a significant portion of our digital identities. Just how much of an attack surface you present depends on many factors, but you can significantly reduce opportunities for malicious exploitation of these things with some basic countermeasures. AdvertisementĮach of these items offers an “attack surface"-an opportunity for someone to exploit that component to get to your personal data. We’re going to cover the first few here more will be covered in part two. A sample list might include your phone and other mobile devices, personal computer, home network, social media accounts, online banking and financial accounts, and your physical identification and credit cards. The first question above is all about taking inventory of the bits of your digital life that could be exploited by a criminal (or an unscrupulous company, employer, or the like) for profit at your expense or could put you in a vulnerable position.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |