Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

Tekie Geek has been serving the Staten Island, Brooklyn, Queens, Bronx, New York City, Long Island and New Jersey area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Protecting Your Mobile Device in 2 Easy Steps

Tip of the Week: Protecting Your Mobile Device in 2 Easy Steps

Mobile devices are one of the greatest tools available for business use today. However, because society has come to rely so much on mobile devices, these devices have become a treasure trove for cybercriminals to obtain information from. For this week’s tip, we’ll go over some simple ways to protect yourself from such threats.

Do You Really Need to Connect?
Wi-Fi and Bluetooth connectivity give our phones a heightened level of utility, but this benefit can also come with severe risks. Mobile devices, for the sake of simplicity and convenience, are ready and willing to connect with any Wi-Fi or Bluetooth signal they can. Unfortunately, this puts them at risk of being hijacked by any threat that may be lurking on the signal.

To mitigate this risk, make sure that you aren’t connecting to Wi-Fi or Bluetooth signals that aren’t secure and trustworthy. In fact, when not using them, keep these connections disabled just in case.

The same goes for public charging stations. These can also be used to spread threats, so it is better to rely on a portable charger or a wall outlet to power your device.

Furthermore, if you are connecting to something, make sure you aren’t sharing more than you need. For instance, if you need to rent a car while on a business trip, there’s nothing wrong with using Bluetooth to make hands-free calls. However, if prompted, there is no reason to sync your contacts with the car’s storage, effectively handing them to the next person that rents that car. Being cautious as you connect will only help you to stay safe in the long run.

Keep it Locked Up
The contents of your phone shouldn’t be available to just anyone who picks it up. Whether you have access to sensitive business information through the device, or you have apps that help you manage the rest of your life, your information is at risk unless you have protections in place to keep it safe.

The simplest way to do so is to leverage the phone’s built-in security features. Whether your phone accepts PIN numbers, passcodes, or a pattern set it up so that only you know how to open it. Furthermore, with more devices today leveraging biometric and facial recognition technology, there are other means for you to secure your mobile device.

Security is a crucial consideration to keep in mind, whenever you’re using a mobile device. For more information on how you can keep your business resources safe from threats in and out of the office, reach out to Tekie Geek at (347) 830-7322.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 25 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Miscellaneous Memory Two-factor Authentication Encryption Virtualization Microsoft Excel Hosted Solutions Google Wallet Business Metrics Collaboration Websites Black Market Cabling Samsung Office Tips G Suite Specifications Knowledge Big Data Internet of Things Managed IT Services malware worms History Office 365 Hack Virtual Desktop SaaS Access Control Smartphones Web Server Business Mangement Robot Scalability Google Data Backup Virus Safety Remote Monitoring IT Management computer repair Information Technology Network Security Identity Theft Mobile Device Management PDF Website Laptop end-user files Tablets VoIP Staten Island computer support Monitors Cybercrime Business Cards Meetings Legal data recovery Vulnerability Small Business managed IT services NYC IT support Staten Islans Deep Learning malware Hard disk IT support Staten Island CryptoLocker Disaster Recovery VoIP Text Messaging Email Wireless Technology computer support firms Settings Microsoft Office managed services Staten Island Business Management Lenovo Business Quick Tips Cloud Computing Saving Money Computer Malfunction IT support firms Internet Downloads ransomware attacks Emergency Artificial Intelligence IT support email scam Drones Excel Staffing Vulnerabilities Touchscreen Lithium-ion battery Data Management How To Government Backup Hard Drive Virtual Reality Cybersecurity Innovation Holiday Business Technology WiFi managed IT services staten island Mobile Devices Paperless Office Data storage communications Search YouTube Business Continuity Spyware Computer Care Tip of the week Hard Drive Disposal Mobility computer repair Staten Island Unified Threat Management File Sharing Twitter IT Services Administrator BYOD Cost Management Audit Hiring/Firing Tech Terms Best Practices Compliance IT consulting firms Wireless Flexibility Company Culture Wi-Fi Piracy Microsoft Machine Learning Browser Technology CrashOverride Business Computing managed it services today ’s organizations Physical Security Workers computer support NYC Blockchain Software as a Service eWaste IT consulting Staten Island Outlook Displays Society staten island managed services Hacks IT support New York City Webcam Domains Printing Best Practice Business Growth Help Desk Television Google Drive it support Work/Life Balance Ransomware Processors Password Powerful Technology Solutions Employer Employee Relationship Mobile Device Staten Island tech support Hardware Solutions Cache Project Management Windows 8 Applications Managed IT Services Disaster Productivity Solid State Drive Start Menu Workplace Tips Document Management News Streaming Media Telephone Systems Managed IT Alert Automobile Botnet LiFi Law Enforcement Distributed Denial of Service Antivirus Unified Threat Management IT consulting firm IT services New York City Virtual Assistant Unified Communications Accidental deletion Health IT support NYC Scam Maintenance Training IT Consultant Cortana Redundancy Fake News Budget App Managed Service Provider computer services Cloud computing Staten Island Office IT Support Time Management Social Smartphone Education Automation Hosted Solution Recovery IT consulting Hacker Apps Google Calendar Laptops Tip of the Week Running Cable In Internet of Things Gmail The Internet of Things Documents Visible Light Communication Employer-Employee Relationship Remote Computing Tablet Communication Windows Data Breach Facebook computer services Staten Island Politics Software Data Protection Experience Telephony Uninterrupted Power Supply Supercomputer Cleaning Networking Software License Microchip Augmented Reality Mobile Technology Mobile Security Google Maps Word IT consulting Staten island Private Cloud Digital Payment Staten Island IT consulting Update IT services Staten Island Android Taxes Notifications Computer Bandwidth tech support Staten Island Securty Efficiency Rental Service Content Filtering Writing Phishing Motion Sickness Worker IT consulting company Bitcoin Chromebook Staten Island IT support Mouse Data Analytics IT consulting NYC IBM Save Money Reliable Computing datto Bluetooth IT services NYC Download Proactive IT Social Engineering Language Apple Gadgets Productivity Hacking data recovery Staten Island Thank You Congratulations Windows 10 BDR Tracking Hackers Money Security computer support Google Docs Server Customer Service Bring Your Own Device Corporate Profile Digital Upgrade managed services tech support Staten Isalnd VPN Vendor Mangement computer support Staten Island Hardware Privacy Freedom of Information SharePoint Flash User Tips Windows XP Social Media Banking Comparison Windows 10 End of Support Network Operating System Cloud CCTV Music Travel Network Congestion Relocation Computing Malware Tech Support Public Cloud Vendor Management data loss Spam Sports Administration Access Printer Outsourced IT Passwords Desktop Downtime Retail Cryptocurrency 3D Printing Firewall Data Security Computing Infrastructure Workstations Patch Management tech support Advertising DDoS

Newsletter Sign Up