Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

Are Your Mobile Security Settings Up to Par?

Are Your Mobile Security Settings Up to Par?

While you may not consider it at first, your mobile device has a sizeable amount of personally identifiable data on it - far more than should be left on an unsecured phone at any time. Fortunately, Google has added a considerable layer of protections to Android to assist users with their security. All a user has to do is know how to use them to their fullest potential.

Here, we’ll go over how to activate the built-in defenses to the Android system.

Confirm Google Play Protect is On
Google Play Protect is the security system that Android has to ensure that your mobile apps aren’t endangering your security, always scanning your device to spot threats. While it should be activated by default, it never hurts to check that this feature wasn’t switched off at some point. In Settings, go to the Security section and access Google Play Protect. If all the toggles are active, you have Google Play Protect on your side.

Activate Two-Factor Authentication
While this is actually a feature on your Google account and not native to your Android, it is still key enough to your Android’s security that it warrants inclusion. After all, we’ve established that your phone likely has a huge amount of sensitive data and personally identifiable information on it - adding another layer of protection only makes sense.

To activate two-factor authentication, access your Settings, and in the Google section, access Security and follow the steps provided to start up 2-Step Verification.

Limit Lock Screen Notifications
The fact that Android has the ability to display notifications on a user’s lock screen is extremely useful… until someone else sees something that they shouldn’t have as a notification pops up for an incoming message. Fortunately, the amount of information that these notifications display can be limited so that these messages remain more private. In your Settings, access Lock screen and press Notifications. From there, you can toggle whether or not your notifications show their content or just the application’s icon.

Pinning Your Screen
This one is a handy trick to know if you have a tendency to let other people use your phone with any regularity. If you’d rather not risk them digging into your other applications or files, you can ‘pin’ your screen to a particular application. This means that whoever is using your device is unable to use the other applications and functions that the phone has until you unpin it.

Pinning your screen is a fairly simple process, once you’ve activated this functionality. To do so, access your Settings, go to Biometrics and security, and press Other security settings. Scroll to the bottom of this page and make sure the Pin windows toggle is switched to on, then enter that menu item and turn the Ask for PIN before unpinning switch so it is also activated.

Once screen pinning is activated, you can then ensure that the app that you are allowing someone borrowing your phone to use is the only one they can use until the application has been unpinned. To pin usage down to a single app, open the application and press the Recent button. There will now be a pin icon on the screen, press it to pin that application. When you are ready to allow other apps to be used again, hold the Back and Recent buttons simultaneously. This will unpin your device, but also lock it, requiring your PIN to be input again before it can be used.

Keeping your phone safe can seem like a challenge at times, but properly utilizing its abilities can make it a lot easier. Tekie Geek can do the same for your business’ technology. Give us a call at (347) 830-7322 to learn more.

The Computer Processor May Not Be What You’d Expec...
How to Order the Items on Your To-Do List


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, January 16, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Data Security Innovation Monitoring Social Network Managed Service Provider computer support firms SharePoint Corporate Profile Digital Payment Computer Malfunction Cabling Virtual Desktop Evernote Audit it support Business Growth managed it services Technology Websites Alert Accountants Flash Computer Care Accidental deletion Spyware Mobility Excel Data Backup Scalability Error 3D Printing IT Support managed services IT consulting Staten island Printer Money malware Hard disk today ’s organizations IT consulting Company Culture Electronic Medical Records Privacy Robot Travel Specifications Vulnerabilities Tablets Passwords Hackers Office Tips Memory staten island managed services Television Redundancy Physical Security Username SaaS Tip of the week Managing Stress Data Tip of the Week Word Hack managed IT services staten island Recovery Google Calendar Spam Software Addiction Computers IT support Staten Island Devices Access Control Writing Device security Software as a Service computer repair Android Powerful Technology Solutions Machine Learning Going Green Server Identity Theft Hardware Solutions Desktop Tech Terms Nanotechnology Printers Saving Money tech support ransomware attacks Mobile Devices data loss Holiday Securty computer services Staten Island Tablet The Internet of Things Unified Threat Management Communication datto IT services New York City Visible Light Communication Windows 10 Hiring/Firing Automation Smartphone Outlook Networking Employer-Employee Relationship Directions CryptoLocker Telephone Systems Hacker Tracking Meetings Multi-Factor Security Chromebook Mobile Device Operating System IBM Worker Information Technology Virtual Reality IT Consultant Screen Reader Bandwidth Productivity IT consulting Staten Island Project Management Lenovo Upgrade Efficiency Hardware Touchscreen Search Administration Healthcare Notifications Google Play Download Webcam Virus Business Health IT email scam Banking IT consulting firm Save Money Reliable Computing Outsourced IT Cryptocurrency Microsoft Managed IT Services Hard Drive CCTV Hacking Work/Life Balance Data Breach Facebook Business Computing End of Support File Sharing Security Quick Tips Settings Business Mangement Business Continuity Staten Island IT consulting Cost Management computer repair Staten Island Social Media Browser Update Bluetooth Vendor Data storage Taxes Business Management Hacks Employer Employee Relationship tech support Staten Island Help Desk Management Language computer support Legislation Internet Social Engineering Modem Google Docs Windows XP Business Metrics Fileless Malware Productivity Telephone communications Bookmark VoIP IT support NYC Antivirus Mobile Security Congratulations Term BDR Tech Term Mouse Windows 8 Cybersecurity Downtime Vendor Management Business Cards Wi-Fi Black Market News Emergency Disaster Business Technology Staten Island computer support Regulations Trends Fake News Multi-factor Authentication Processor Comparison Proactive IT Collaboration managed IT services NYC Customer Service History Mobile Technology HTML Telephony Cloud Flexibility Running Cable Vendor Mangement Access Lithium-ion battery Best Practice Politics Bitcoin Laptops DDoS Security Cameras Budget Managed IT Proxy Server Windows 10 Unified Threat Management Network Security Microsoft Excel computer services Downloads Rental Service Safety Thank You Gamification Relocation Tactics IT support firms Regulation Phishing Remote Computing Computer Training Monitors Hosted Solutions IT services Staten Island CrashOverride Network Database Malware Staten Island tech support Two-factor Authentication IT Services Sports Navigation Education Cortana Network Management Backup and Disaster Recovery data recovery Processors Freedom of Information BYOD YouTube Domains Blockchain Software License Browsers Displays Health Streaming Media Google Wallet Windows Law Enforcement Conferencing Scam Website Microchip Artificial Intelligence User Tips Data Protection Google IT services NYC Office Big Data Staffing Text Messaging Uninterrupted Power Supply Solid State Drive WiFi computer support Staten Island Society Equifax How To Patch Management IT support Data Analysis Password Workers Knowledge Network Congestion Apple Automobile data recovery Staten Island Wireless Technology Bring Your Own Device Smartphones Google Drive IT support New York City Users Workplace Tips Mobile Device Management Backup Twitter Vulnerability Computing Infrastructure Emails Apps Data Management Content Cache User Tip Information Ransomware Upload IT consulting NYC Wireless Headphones Documents IT consulting company Motion Sickness Virtual Assistant Saving Time Digital Time Management Cybercrime LiFi VPN Supercomputer Managed Service Drones tech support Staten Isalnd Office 365 IT support Staten Islans Content Filtering Telephone System Miscellaneous IT Management Microsoft Office end-user files Remote Monitoring Public Cloud Hard Drive Disposal Google Maps Private Cloud Applications Document Management Botnet Cleaning malware worms Startup Web Server Social Tech Legal PDF computer support NYC Entertainment Hosted Solution Analytics Advertising Gadgets SSID managed services Staten Island Laptop Internet of Things Cloud Computing In Internet of Things Wireless Augmented Reality Service Level Agreement Computing Retail Disaster Recovery Distributed Denial of Service Small Business Staten Island IT support Customer Resource management Tech Support Email Virtualization Samsung Compliance Deep Learning Router Piracy Firewall Workstations eWaste App Managed IT Services Paperless Office Start Menu Administrator Unified Communications G Suite Maintenance VoIP Encryption Government Best Practices Experience Music Printing Gmail IT consulting firms Cloud computing Staten Island

Newsletter Sign Up