Learn the ins and outs of these things for the safe use of a smartphone


In today's world of smartphones many important details are stored, it is necessary to pay enough attention to its safety

Around two and a half billion people worldwide use Android smartphones or tablets. Hackers are also keeping an eye on Android because of its large scope. Android's ecosystem as a whole has evolved in such a way that security issues for our phones may arise due to flaws in the operating system or various apps.

The biggest risk lies with our own. If we do not understand the various security systems of Android and do not take advantage of it, then in total we are at a disadvantage.

If you are using an Android smartphone or tablet, here are some things to understand. Apart from some of these things, most aspects also apply to the iPhone.

Screenlock
The first step in keeping a smartphone safe is screenlock. We are constantly logged in to all the apps we have installed in the smartphone. So if our phone falls into the hands of a stranger or unreliable person even for a short time, he can misuse our phone in many ways. Even if we don't keep the phone locked and forget the phone or it is stolen somewhere, a big crisis can arise. Various online payment apps require an additional password to transact, but if the smartphone is not locked and the app is not locked, another person can open the app and view the details.

Apart from that, since our social media account and mail service are also open, if another person assumes, our importance can also change. Once this happens, it becomes very difficult for us to get re-entry in our various online accounts. So even if it sounds boring, the phone should be locked with a PIN password or pattern. These three things should also be kept as complex as possible so that the other person cannot easily imagine it. Now almost all phones offer special recognition, fingerprint scanning or iris scanning, which can also be taken advantage of. In addition to the screen lock, such an arrangement offers extra security.

Options for locking the phone can be found in Settings in Security.

Smartlock

It is very difficult to maintain a balance of safety and convenience in the use of smartphones. The Android device has a 'Smartlock' feature to keep our smartphone unlocked if certain conditions are met so that we don't have to unlock it frequently. This feature is convenient, but security is compromised. ‘Ignorance is Bliss’ for you if you don’t know about SmartLock! With the help of Smartlock, the location settings of the phone can be turned on and the phone can be set to be unlocked when you are in a trusted place i.e. office or home. It can also be set to be unlocked when the phone is in the pocket or unlocked when the phone is near a Bluetooth handset or Bluetooth enabled laptop or car's Bluetooth enabled system. Smartlock also has the facility to unlock the phone by recognizing the voice or face. All these conveniences do not provide complete security to the phone. If you know about Smartlock and use one of these methods to avoid the hassle of unlocking the phone frequently, it is imperative to prioritize safety over convenience. Not like using Smartlock.

Two-step verification

Almost all major web services now offer two-step verification. In this method, after giving the password of our account, OTP will come to our registered mobile number, the setting that can be logged only after giving it, gives great security to our account. This feature can be turned on by going to the Security section of various web services.

This facility is very useful, but its subtle aspects need to be understood. We can get OTP in phone in different ways. OTP can be obtained mainly via SMS, voice call, instant prompt (in which we just have to say yes in the flashing message on the screen of the phone) and authentication app. Of all these methods, the one with the authentication app is the safest and works even without an internet connection. You can choose more than one such method to get OTP. In any case, when your phone is not in hand, it is advisable to give the number of another trusted person's phone so that such a code can be obtained. In addition, every service provides the facility to print 10 additional OTPs that seem to work when we are unable to get OTP for any reason. Taking such a print, it is necessary to save it somewhere safe.

It's like taking advantage of two-step verification for Google, Facebook, Instagram, Twitter, etc. and every account that matters to you.

Password Manager
Nowadays it is impossible for anyone to remember the exact password of all the services if not everyone can remember how many online accounts they have! In this case the password manager can be useful to us.

Google, Firefox and many other services offer password managers. Such a service suggests strong and extremely complex passwords when we open an account in various webservices or apps. It is impossible to remember such a password, but there is no need to remember it as it is done by the password manager himself. If you want to use Google's password manager service, go to passwords.google.com or go to password settings in Chrome browser settings. Here, whenever you visit a login page, a new password is suggested for it and a setting can be made to save the password we have given.

After that, the Password Manager service fills in our username and password when we go to the login page of another web service, on any device that we are logged into Google Account. Some sites or apps also have auto fill feature. This eliminates the hassle of remembering passwords for different services.

Again, a balance of convenience and safety becomes essential here. Thanks to the Password Manager service, all our passwords are saved in Google's account and available on different devices. This makes it inevitable to lock smartphones and Google accounts. Because if that one lock is broken then all our passwords can fall into the hands of someone else!

Therefore, it is necessary to take two steps. The first step is to protect our smartphones and Google Accounts with all available security measures (especially PIN and two-step verification). The second step is to take advantage of the password manager service for a service that is not very important!

If you do not know the intricacies of this service, never save the password of an important service like bank in it.

Download only from the Play Store
This is a very simple step to keep the phone safe. The app can also be downloaded and installed on Android smartphones by clicking on a link found in a way other than the Play Store. Following the banning of the Chinese app in India, its download link has started circulating on social media, which can be dangerous in many ways. Therefore, if you want to download any app, you should definitely download it from Google's official Play Store.

The Progressive Web App (PWA) is an exception. This new type of app doesn't really have to be downloaded or installed just by using the settings of the website or the Chrome browser that the icon of that website is added to our smartphone as a shortcut and then the website is much like a native app. A visit to a website that facilitates PWA can be found at the bottom with the suggestion 'add to homescreen'.

Download from an unknown source
As mentioned above, the app can be downloaded and installed from unknown sources in Android. This is a dangerous thing for the average user. Before doing so, of course, our attention is drawn to the operating system and the dangers involved. This feature is changing as the version of Android changes. Try 'Unknown Sources' in Settings to make sure this feature is turned off in your phone.

Permission
Various apps in the smartphone can use a lot of details in our phone and resources like camera, mic etc but for that it has to get our permission first. In a hurry to install the app, we are giving such approvals in the blink of an eye. Allowing unfamiliar apps to read SMS can sometimes be very expensive. So from time to time keep checking how many permissions you have given to various apps by reaching the app permission setting in your phone's settings.

Unnecessary app
In pursuit of the above, it is important to keep the use of additional apps in our phones as limited as possible. There is also a risk of installing an app with a malicious code in the phone while trying to install an unknown app from the Play Store. So avoid experimenting with apps. Modified versions of well-known apps like WhatsApp are also available on the Play Store and promise to offer many more features than the original app. It is like avoiding the use of such apps. Take a look at the app installed in your phone from time to time and uninstall the apps you don't use now - there will be space in the phone too!

Find My Device
When the phone is lost, its location can be known by a feature called 'Find My Device', which can play a ring on the flower volume even if the volume is off. If necessary, all the data in the phone can be erased and factory reset. These features can be availed by searching 'Find My Device' by logging-in to another device from the same Google account you are logged in to. Apart from Google, various phone manufacturing companies also offer such facilities. You can check whether you have this service turned on by finding 'Device Admin Apps' in the phone's settings. In addition, you have not given the rights as the admin of the phone to any unknown service in this way and it can also be checked.

for more details kindly go to https://ift.tt/3bgFIf3

Comments

Popular posts from this blog

Moon Mission: Where on the Moon - Where will water be found? Map prepared by NASA

Google created this special doodle on World Earth Day, knowing the importance of today

Increase in character limit of tweets, now users can tweet in 10,000 characters

The facility of posting in threads is coming from Facebook

One year into the ONDC system: How far has the e-Cormus initiative come?

Gaganyaan's four astronauts are 400 km from Earth. He will go far and see the universe

Will it be possible to ride a bike in the air in the next two to three years?

The Carmen line crossed by Bezos is the line of sight between Earth and space

IIT researchers develop real-time underwater marine robot, eases deep-sea surveillance

Attention, your old Google account may be deleted!