5 tips to protect your android device

Owners of smartphones often forget that their devices are actually mini computers that needs to be protected just as she laptops or desktops. We bring you a few tips on how to protect data on devices with Android.

Devices such as smart phones and tablets on some versions of Android are the most widespread in the world. However, very little attention paid to protecting these devices from malicious software, viruses and Trojans.

Most computer users know that the computer should have at least an antivirus program, and preferably a firewall (firewall). However, there are few adhere to the same rules on their tablets and smartphones, and they’re kind of computers.

Therefore, owners of Android devices, attention!

5 tips to protect android device

1) Be careful what you click on and install!

Owners of Android-powered devices are used to download applications via Google Play. But unlike Apple’s App Store, applications security in the Google store is not so high.

Hackers often disguised their applications in popular programs or games, and thus gain access to devices of unsuspecting owners.

Read well the description of the application and pay attention to her publisher. Also, see that all these applications seeking permission from you.

Is it really necessary that Tetris has access to your directories and GPS?

2) Update on time!

Most Android devices has an automatic update of the operating system and applications. However, some users simply ignore notices about the new version of the program, because they feel that they do not need. But new versions deliver enhancements and fixes from previous versions.

Therefore, connect to WiFi periodically and make sure the latest version of operating software is available for your device.

3) Protect your data!

The fact is that people lose their mobile phones or they are stolen. But that does not mean that you should entertain the thief with your pictures from the party or beg him to return at least the card with a phone number. It is better to install an application that allows you to delete and store data remotely.

SeekDroid AntiTheft allows to delete data remotely and locating mobile phone. Even provides the ability to track numbers that are called.

Lookout Mobile Security allows you to lock the device remotely, data storage, and has a built-in anti-virus program.

4) Can you keep a secret?

In movies about secret agents all the data are usually encrypted. Play around with the undercover agent and protect sensitive data from prying eyes. Newer versions of Android enable encryption by selecting the Preferences. This will make it difficult to extract data from the device if it is stolen or lost.

For additional security, install applications like Droid Crypt or AnDisk encryption to further protect data.

5) Lock your device!

Although it may sound trite, lock screen devices can provide effective protection. Android offer several options for the lock screen – drawing the sample, entering passwords or entering a PIN.

Drawing the sample, even though it seems like the best protection, is actually the worst, because when you unlock, it remains tracks on the screen which it is possible to detect a pattern.

PIN and password are slightly better options, but only if the password is longer than four characters and use a combination of numbers and letters.

Devices with Android version 3.0 and higher have the ability to set up protection against incorrect typing a password. After a certain number of incorrect password entries (the user selects that number), the device will automatically delete its contents. Time to lose data, but at least you can be sure you will not fall into the wrong hands.

Regardless of which device you have, make sure of what you are doing with it and where. This will reduce the possibility of infection, theft or loss of data.

Share this post with your friends who have android device 🙂


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: