ICFiles
SOC 2

content

Secure File Transfer Soc 2 starts at $1 per month

Join Us

 

ICFiles Logo

 

Technology: Protect Yourself From Cell Phone Hackers

What's New in Technology

November 2011

Get this Article  Get this Article & Suite of Tools

Technology: Protect Yourself From Cell Phone Hackers

Cell phone hacking caused the downfall of The News of the World, Britain’s largest and most famous tabloid. This scandal has alerted cell phone users to the mayhem that hackers can create. An ever-increasing problem for the telecommunications industry, cell phone hacking no longer happens only to people in the public eye. More and more ordinary citizens are falling prey to fraudsters who regard mobile communications as a fruitful opportunity for scams. As many cell phone users have discovered, it is often a relatively simple matter to hack a cell phone.

How do hackers crack our cell phone passwords? Often we make it fairly easy for them by using the same password at other – less secure – sites. The hackers break into these easier targets and then try the passwords on bigger sites. Sometimes hackers launch a full frontal attack – programming computers to bombard sites with just about every word in the dictionary until they hit the right combination.

As many people discovered in the wake of The News of the World scandal, often it takes only a modicum of tech savvy for a crook to get access to the information stored in your phone. Here are a few tips to help safeguard your data.

  • Protect your phone and keypad with passwords that are strong. Make them long and difficult for thieves to guess. Use different passwords from those you use for your financial accounts, and never program passwords into your cell phone. If you use Gmail, make use of Google’s two-step verification procedure. This means you need to supply an access code (from your mobile phone) if you try to access your account from any place other than your own computer. The access code needed for your computer is a password that you change every 30 days. Though no solution is fail-safe, this two-step verification process can protect you from the thousands of remote attacks hackers launch every day.  
  • Develop a practical way to manage the many passwords you need to access the various online sites. Use letter/number combinations that are meaningful to you, but not so obvious that a hacker can guess them correctly. Avoid words that might be guessed in a major attack – using a misspelled word or gibberish will give you a stronger password. Keeping a hard copy of your passwords in a desk drawer is a bad idea, and keeping them stored on your cell phone is even worse. Have different passwords for all the sites you use that hold important, confidential data. Make sure your voicemail password is strong, too. Perhaps you think crooks can’t cause much harm with access to your messages, but don’t be so sure. Fraudsters have gained access to bank accounts this way.
  • Some phones will lock out any entry after the phone has been idle for awhile. Check to see if your phone has this feature. If your phone is stolen, this lock out will stop a thief from accessing your data.
  • Don’t keep important data in your smart phone for indefinite periods of time. When hackers take over or compromise an email account, the data is lost to the user – often permanently. Sometimes resetting your password and logging back into your account doesn’t let you access the information you left there earlier. It’s gone. If you have important correspondence, attached files or photos on your smart phone, save backup copies somewhere else.
  • Be smart about downloads. Only use downloads from a reputable seller. Beware of pop-ups or unsolicited notices warning you of an impending problem. Download a so-called antivirus solution, and chances are good that the download will infect your phone.

Vigilance is the best way to protect yourself. Don’t get lazy about passwords or complacent about backing up data you keep on your cell phone. Above all, take advantage of all the safeguards and password protection programs that are made available to you.

Get this Article  Get this Article & Suite of Tools

 

These articles are intended to provide general resources for the tax and accounting needs of small businesses and individuals. Service2Client LLC is the author, but is not engaged in rendering specific legal, accounting, financial or professional advice. Service2Client LLC makes no representation that the recommendations of Service2Client LLC will achieve any result. The NSAD has not reviewed any of the Service2Client LLC content. Readers are encouraged to contact their CPA regarding the topics in these articles.

Protected by Copyscape Plagiarism Finder

Dynamic Content Powered by Service2client.com
SEO Content Powered by DynamicPost.net

 

ICFiles
SOC 2

content

Secure File Transfer Soc 2 starts at $1 per month

Join Us

 

content

 
website bundles

MyWeb, WordPress
1 Click Hosting
Install free themes

websites

Hosting Bundles

 
 
Electronic Commerce

Copyright © 2024 Service2Client, LLC All Rights Reserved.
Terms of Service  |  Privacy Policy

CPA Website Content Powered by Service2Client.com


 

CLOSE