Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

Are Your Mobile Security Settings Up to Par?

Are Your Mobile Security Settings Up to Par?

While you may not consider it at first, your mobile device has a sizeable amount of personally identifiable data on it - far more than should be left on an unsecured phone at any time. Fortunately, Google has added a considerable layer of protections to Android to assist users with their security. All a user has to do is know how to use them to their fullest potential.

Here, we’ll go over how to activate the built-in defenses to the Android system.

Confirm Google Play Protect is On
Google Play Protect is the security system that Android has to ensure that your mobile apps aren’t endangering your security, always scanning your device to spot threats. While it should be activated by default, it never hurts to check that this feature wasn’t switched off at some point. In Settings, go to the Security section and access Google Play Protect. If all the toggles are active, you have Google Play Protect on your side.

Activate Two-Factor Authentication
While this is actually a feature on your Google account and not native to your Android, it is still key enough to your Android’s security that it warrants inclusion. After all, we’ve established that your phone likely has a huge amount of sensitive data and personally identifiable information on it - adding another layer of protection only makes sense.

To activate two-factor authentication, access your Settings, and in the Google section, access Security and follow the steps provided to start up 2-Step Verification.

Limit Lock Screen Notifications
The fact that Android has the ability to display notifications on a user’s lock screen is extremely useful… until someone else sees something that they shouldn’t have as a notification pops up for an incoming message. Fortunately, the amount of information that these notifications display can be limited so that these messages remain more private. In your Settings, access Lock screen and press Notifications. From there, you can toggle whether or not your notifications show their content or just the application’s icon.

Pinning Your Screen
This one is a handy trick to know if you have a tendency to let other people use your phone with any regularity. If you’d rather not risk them digging into your other applications or files, you can ‘pin’ your screen to a particular application. This means that whoever is using your device is unable to use the other applications and functions that the phone has until you unpin it.

Pinning your screen is a fairly simple process, once you’ve activated this functionality. To do so, access your Settings, go to Biometrics and security, and press Other security settings. Scroll to the bottom of this page and make sure the Pin windows toggle is switched to on, then enter that menu item and turn the Ask for PIN before unpinning switch so it is also activated.

Once screen pinning is activated, you can then ensure that the app that you are allowing someone borrowing your phone to use is the only one they can use until the application has been unpinned. To pin usage down to a single app, open the application and press the Recent button. There will now be a pin icon on the screen, press it to pin that application. When you are ready to allow other apps to be used again, hold the Back and Recent buttons simultaneously. This will unpin your device, but also lock it, requiring your PIN to be input again before it can be used.

Keeping your phone safe can seem like a challenge at times, but properly utilizing its abilities can make it a lot easier. Tekie Geek can do the same for your business’ technology. Give us a call at (347) 830-7322 to learn more.

The Computer Processor May Not Be What You’d Expec...
How to Order the Items on Your To-Do List
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, March 22, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Save Money Emergency Data Analysis Compliance IT consulting NYC Administration Memory Server Hosted Solutions Staten Island IT consulting Gadgets today ’s organizations IT support New York City Downtime PowerPoint Company Culture Safety Banking Networking Data Breach CCTV Big Data Notifications Audit BDR Applications Internet of Things Accountants Tech Term Smartphone IT support Staten Island Advertising Error Twitter Unified Communications Screen Reader Social Network Managed IT Services Legal Content Filtering Maintenance computer repair Hard Drive Disposal Unified Threat Management Law Enforcement Virtual Desktop Motion Sickness Google Docs Printing Money Accidental deletion IT support firms Windows 10 Laptop Telephone System G Suite Time Management Displays Machine Learning Microsoft Office Conferencing Office Tips Freedom of Information Uninterrupted Power Supply Recovery Monitors Wireless Headphones Voice over Internet Protocol Solutions Workplace Tips IT support Staten Islans Microsoft Printers Computer Evernote Miscellaneous Addiction Term Regulation Encryption Vendor Mangement Knowledge Wireless Technology Security Network Mobile Device Small Business Managed Service Provider Staten Island tech support Bluetooth Tactics Multi-factor Authentication 3D Printing IT services Staten Island data recovery Access WiFi Apple Cleaning Business History Malware Workers Medical IT Mobile Technology Meetings Downloads Google IT consulting firm Travel Innovation datto Internet Scam Operating System Laptops IT Support Retail Hardware Solutions Startup Equifax Business Growth Mobile Devices end-user files Webcam Disaster Recovery IT consulting Staten island Wi-Fi Word Multi-Factor Security The Internet of Things Microsoft Excel File Sharing How To Monitoring Business Technology computer support Bitcoin IT support NYC staten island managed services Touchscreen Work/Life Balance Devices Robot Proxy Server Disaster IT Consultant Microchip Two-factor Authentication Public Cloud Telephone Tech Terms Email computer services Staten Island Digital Managed Service Mobile Security VoIP Outsourced IT Saving Money Tablets Chromebook IT consulting Staten Island tech support Outlook Electronic Medical Records managed services Staten Island Android Browser Health Web Server malware worms Project Management BYOD HTML Solid State Drive communications Communication Redundancy SSID Excel Streaming Media Government IBM Hard Drive Digital Payment Gamification Remote Computing Trends Google Play Efficiency Cloud Computing Drones Artificial Intelligence Text Messaging Specifications tech support Staten Isalnd Hosted Solution Users Employer Employee Relationship Managed IT Services Best Practices Windows 8 Corporate Profile computer services Entertainment eWaste Facebook Access Control Ransomware managed services Saving Time Hacks Social Office Lithium-ion battery Unified Threat Management Congratulations Business Computing Professional Services Society Budget Workstations Remote Monitoring Virus IT services NYC Google Calendar Reliable Computing Cost Management Google Drive Websites Apps Service Level Agreement Education Cooperation Computer Care Passwords Data Backup Scalability Staten Island IT support Browsers Modem Powerful Technology Solutions Fileless Malware Samsung Start Menu Windows 10 Comparison Hack Analytics Flexibility IT consulting company Smartphones Data Supercomputer Staffing Integration Phishing Virtualization Hacking Bandwidth User Tip managed it services Piracy data loss Identity Theft Upgrade Paperless Office Upload Office 365 Experience Managed IT Software User Tips Managing Stress SharePoint Privacy Domains Settings computer support firms Administrator Healthcare Productivity Cybersecurity LiFi Cryptocurrency IT consulting DDoS Lenovo Nanotechnology Network Congestion Hardware Search Bring Your Own Device Software as a Service Tech Support iPhone Information Technology Download Device security Deep Learning malware Hard disk Computing Infrastructure Telephony Document Management News email scam Music Information Customer Resource management Mouse Telephone Systems Holiday In Internet of Things Microsoft 365 Quick Tips Going Green SaaS Windows XP Help Desk Cache Navigation Employer-Employee Relationship Collaboration YouTube Update Tablet Sports Vulnerabilities IT support Virtual Reality Backup App Patch Management Vendor Management Management Writing Regulations Content Health IT End of Support Documents Username Politics managed IT services NYC CrashOverride Business Cards Botnet Hiring/Firing IT consulting firms Network Management Business Mangement Training Website Backup and Disaster Recovery Business Continuity Cloud Computers CryptoLocker Alert Distributed Denial of Service Thank You Antivirus Social Engineering Spam Securty Hacker Automation Productivity managed IT services staten island Customer Service Google Maps Legislation Cloud computing Staten Island Computing Gmail Mobile Device Management IT services New York City Data Security Firewall Relocation IT Services Running Cable Technology IT Management Business Metrics computer repair Staten Island Worker Vulnerability Vendor Best Practice Software License it support Rental Service ransomware attacks Business Management Augmented Reality Cabling Virtual Assistant Google Wallet Television Router Password Computer Malfunction Fake News Staten Island computer support Security Cameras Mobility VPN Directions computer support NYC Processors Social Media Proactive IT Language Processor Physical Security Printer Tech Cortana Windows Taxes Black Market Visible Light Communication Hackers Tracking Spyware Automobile Private Cloud Tip of the Week Blockchain Data storage Emails Desktop PDF Wireless Network Security Flash Bookmark Database computer support Staten Island Data Management Cybercrime Windows 7 Tip of the week VoIP Data Protection tech support Staten Island data recovery Staten Island

Newsletter Sign Up