Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

Are Your Mobile Security Settings Up to Par?

Are Your Mobile Security Settings Up to Par?

While you may not consider it at first, your mobile device has a sizeable amount of personally identifiable data on it - far more than should be left on an unsecured phone at any time. Fortunately, Google has added a considerable layer of protections to Android to assist users with their security. All a user has to do is know how to use them to their fullest potential.

Here, we’ll go over how to activate the built-in defenses to the Android system.

Confirm Google Play Protect is On
Google Play Protect is the security system that Android has to ensure that your mobile apps aren’t endangering your security, always scanning your device to spot threats. While it should be activated by default, it never hurts to check that this feature wasn’t switched off at some point. In Settings, go to the Security section and access Google Play Protect. If all the toggles are active, you have Google Play Protect on your side.

Activate Two-Factor Authentication
While this is actually a feature on your Google account and not native to your Android, it is still key enough to your Android’s security that it warrants inclusion. After all, we’ve established that your phone likely has a huge amount of sensitive data and personally identifiable information on it - adding another layer of protection only makes sense.

To activate two-factor authentication, access your Settings, and in the Google section, access Security and follow the steps provided to start up 2-Step Verification.

Limit Lock Screen Notifications
The fact that Android has the ability to display notifications on a user’s lock screen is extremely useful… until someone else sees something that they shouldn’t have as a notification pops up for an incoming message. Fortunately, the amount of information that these notifications display can be limited so that these messages remain more private. In your Settings, access Lock screen and press Notifications. From there, you can toggle whether or not your notifications show their content or just the application’s icon.

Pinning Your Screen
This one is a handy trick to know if you have a tendency to let other people use your phone with any regularity. If you’d rather not risk them digging into your other applications or files, you can ‘pin’ your screen to a particular application. This means that whoever is using your device is unable to use the other applications and functions that the phone has until you unpin it.

Pinning your screen is a fairly simple process, once you’ve activated this functionality. To do so, access your Settings, go to Biometrics and security, and press Other security settings. Scroll to the bottom of this page and make sure the Pin windows toggle is switched to on, then enter that menu item and turn the Ask for PIN before unpinning switch so it is also activated.

Once screen pinning is activated, you can then ensure that the app that you are allowing someone borrowing your phone to use is the only one they can use until the application has been unpinned. To pin usage down to a single app, open the application and press the Recent button. There will now be a pin icon on the screen, press it to pin that application. When you are ready to allow other apps to be used again, hold the Back and Recent buttons simultaneously. This will unpin your device, but also lock it, requiring your PIN to be input again before it can be used.

Keeping your phone safe can seem like a challenge at times, but properly utilizing its abilities can make it a lot easier. Tekie Geek can do the same for your business’ technology. Give us a call at (347) 830-7322 to learn more.

The Computer Processor May Not Be What You’d Expec...
How to Order the Items on Your To-Do List
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, November 19, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Drones Emergency Network Congestion Travel Google Displays Blockchain malware worms Meetings ransomware attacks The Internet of Things Money Facebook Multi-factor Authentication Content Filtering Regulation Tip of the week Spyware Data Protection Touchscreen Computing Virtual Assistant Productivity Telephone System tech support Staten Isalnd Malware Smartphones WiFi Desktop Screen Reader Gamification Windows Software License Save Money Paperless Office Customer Resource management Running Cable Windows 10 Chromebook Administration In Internet of Things Disaster Recovery Bookmark Business Growth Analytics Patch Management Cloud computing Staten Island IT consulting Staten Island Public Cloud Flexibility Monitors Cryptocurrency Gmail Vendor Management Operating System Outsourced IT Information Technology IT consulting firm IT support firms Wi-Fi Best Practice Monitoring Hosted Solution Training News Hack VoIP Digital Payment Comparison Phishing Company Culture Language Innovation Freedom of Information computer support firms Web Server Unified Communications Automation Network Security Redundancy Retail Passwords Wireless Computers IT consulting Visible Light Communication How To IT Support Saving Money Taxes Cybercrime Virtual Desktop Office Tips Quick Tips Text Messaging Internet of Things Botnet History eWaste Conferencing Knowledge Staten Island IT support Spam Hosted Solutions Hacker Data Backup Managed IT Services Accidental deletion Vendor Mangement Employer Employee Relationship Hackers computer repair computer services computer services Staten Island Backup and Disaster Recovery Sports Work/Life Balance Apps Advertising computer support NYC IT Management IBM 3D Printing Business Management Microchip Proactive IT Firewall Bitcoin CCTV Social Engineering data loss Management User Tip Piracy Document Management Service Level Agreement CryptoLocker Going Green DDoS Holiday Notifications Microsoft Excel Cloud Computing Government Securty Mouse Solid State Drive Office 365 Robot Username managed it services IT Services Workers Social Media Managed Service Physical Security Business Continuity Access Staten Island computer support Rental Service LiFi Settings Data Samsung CrashOverride Applications Flash HTML Regulations Managed IT Private Cloud Business Artificial Intelligence Powerful Technology Solutions Bring Your Own Device Tactics Managed Service Provider Windows 10 Word Audit Safety Google Wallet Staten Island tech support Downtime BYOD Scalability Data Management Download Content Unified Threat Management malware Hard disk Telephone Health IT Data Analysis Distributed Denial of Service Bandwidth Virtualization Banking Excel App Legal Augmented Reality IT services Staten Island Computer Care Scam Browsers Staten Island IT consulting Network Corporate Profile Upgrade End of Support Security Antivirus Time Management tech support Staten Island Bluetooth Business Metrics Social Worker Trends Mobile Security data recovery Staten Island Telephony Tech Terms Webcam Users Memory Employer-Employee Relationship Maintenance Data Security Outlook VPN Collaboration Managed IT Services Specifications Fileless Malware Business Computing Database Project Management Printer Compliance Google Docs Administrator Navigation Tip of the Week Big Data Social Network managed services Staten Island tech support Proxy Server Processors Workstations Domains computer support Supercomputer Budget Technology Two-factor Authentication User Tips Recovery Laptop Business Technology Error email scam Hardware Saving Time IT services NYC Automobile managed IT services NYC Wireless Headphones Devices Small Business Equifax Windows XP Reliable Computing Identity Theft Best Practices Websites IT consulting NYC Data Breach Uninterrupted Power Supply Software Mobile Device datto managed IT services staten island Browser Printing Productivity G Suite Tablet Printers Data storage Business Cards Communication Hardware Solutions it support managed services Legislation Remote Monitoring staten island managed services Microsoft Nanotechnology Cortana Remote Computing Apple Politics Downloads Vulnerability Accountants Unified Threat Management Microsoft Office Entertainment Business Mangement computer support Staten Island Processor Television Backup Android Alert Mobility PDF Startup Hacks Hacking Workplace Tips Cloud Access Control BDR Telephone Systems Upload Cybersecurity Laptops Google Calendar Virtual Reality Addiction Tablets Office Smartphone Website Computer Malfunction Network Management Encryption Cache Computer Lithium-ion battery Help Desk Deep Learning Streaming Media Hard Drive Password Congratulations Law Enforcement Relocation Software as a Service Tracking Managing Stress Update Electronic Medical Records Internet Cleaning Mobile Devices Society IT services New York City Machine Learning Staffing File Sharing IT Consultant IT consulting firms IT consulting company IT support YouTube Evernote Education Twitter Health Gadgets Wireless Technology Black Market Virus Device security communications Server Tech Support Vendor Cost Management Disaster Email Computing Infrastructure Motion Sickness Digital IT support Staten Island IT support NYC Music Windows 8 Start Menu Experience Lenovo computer repair Staten Island Miscellaneous Networking Mobile Technology IT support Staten Islans Search end-user files SaaS Writing Documents Fake News Emails Mobile Device Management Cabling Directions Information Ransomware VoIP Thank You Hard Drive Disposal Google Drive SharePoint Tech Term today ’s organizations Customer Service data recovery Efficiency Privacy Hiring/Firing Multi-Factor Security Vulnerabilities IT consulting Staten island Google Maps IT support New York City

Newsletter Sign Up