SlideShare uma empresa Scribd logo
1 de 8
7 SECURITY TIPS FOR
ANDROID
by The Pryz Manor
USE UNIQUE
PASSWORDS
This is the golden rule for online safety. If someone uncovers your
Facebook password, you don’t want them to automatically gain access to
your bank, email and Amazon accounts.
jakeliefer/flickr
AVOID OPEN
Wi-Fi
A Wi-Fi hotspot without a password is an easy opportunity for hackers to
collect data traveling to or from your phone. You can ‘forget’ previously
used Wi-Fi hotspots in settings > wireless & networks > Wi-Fi.
anonymous9000/flickr
SET A SCREEN LOCK
Set up a PIN, password, or pattern screen lock in the settings screen. Just
go to settings > personal > security > screen lock.
booleansplit/flickr
Help a stranger return your phone by displaying your email address (or
other contact info) on the lock screen. Just go to settings > security >
owner info and input the message you’d like to display.
HELP THEM HELP
YOU
sashafatcat/flickr
Always read the permissions when downloading or updating an app.
Make sure the permissions requested by the developer match the app’s
features e.g. an alarm clock app shouldn’t need the permission to make a
phone call.
LOOK
CLOSELY
pasukaru76/flickr
There are a bunch of apps you can use to view the last known location of
your phone. One of these, Plan B, can even be downloaded and set up after
losing your phone.
USE A TRACKING
APP
calsidyrose/flickr
Encryption will make your personal data unreadable to anyone who
doesn’t have your password. Go to settings > security > encrypt
phone and follow the instructions provided.
ENCRYPT
YOUR PHONE
zoonabar/flickr

Mais conteúdo relacionado

Destaque

Next Repubblica delle Idee, Palermo 18 ottobre 2014
Next Repubblica delle Idee, Palermo 18 ottobre 2014Next Repubblica delle Idee, Palermo 18 ottobre 2014
Next Repubblica delle Idee, Palermo 18 ottobre 2014agnese addone
 
Zindagi Trust Manzur Colony Karachi
Zindagi Trust Manzur Colony KarachiZindagi Trust Manzur Colony Karachi
Zindagi Trust Manzur Colony Karachidfcpakistan
 
Kit per aprire un CoderDojo - per i Digital Champion
Kit per aprire un CoderDojo - per i Digital ChampionKit per aprire un CoderDojo - per i Digital Champion
Kit per aprire un CoderDojo - per i Digital Championagnese addone
 
Una Champion in Dipartimento
Una Champion in DipartimentoUna Champion in Dipartimento
Una Champion in Dipartimentoagnese addone
 
Napisz+notes.ppt
Napisz+notes.pptNapisz+notes.ppt
Napisz+notes.pptsongaja
 
Pозвиваючі сайти для дітей
Pозвиваючі сайти для дітейPозвиваючі сайти для дітей
Pозвиваючі сайти для дітейvladabobko
 
Irlanda marzo 2013
Irlanda marzo 2013Irlanda marzo 2013
Irlanda marzo 2013peralbo1
 
Introduzione a CoderDojo
Introduzione a CoderDojoIntroduzione a CoderDojo
Introduzione a CoderDojoagnese addone
 

Destaque (10)

Next Repubblica delle Idee, Palermo 18 ottobre 2014
Next Repubblica delle Idee, Palermo 18 ottobre 2014Next Repubblica delle Idee, Palermo 18 ottobre 2014
Next Repubblica delle Idee, Palermo 18 ottobre 2014
 
Frag
FragFrag
Frag
 
Zindagi Trust Manzur Colony Karachi
Zindagi Trust Manzur Colony KarachiZindagi Trust Manzur Colony Karachi
Zindagi Trust Manzur Colony Karachi
 
Kit per aprire un CoderDojo - per i Digital Champion
Kit per aprire un CoderDojo - per i Digital ChampionKit per aprire un CoderDojo - per i Digital Champion
Kit per aprire un CoderDojo - per i Digital Champion
 
Una Champion in Dipartimento
Una Champion in DipartimentoUna Champion in Dipartimento
Una Champion in Dipartimento
 
Napisz+notes.ppt
Napisz+notes.pptNapisz+notes.ppt
Napisz+notes.ppt
 
Pозвиваючі сайти для дітей
Pозвиваючі сайти для дітейPозвиваючі сайти для дітей
Pозвиваючі сайти для дітей
 
Irlanda marzo 2013
Irlanda marzo 2013Irlanda marzo 2013
Irlanda marzo 2013
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Introduzione a CoderDojo
Introduzione a CoderDojoIntroduzione a CoderDojo
Introduzione a CoderDojo
 

Último

英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineeringssuserb3a23b
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 

Último (20)

英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineering
 
Odoo Development Company in India | Devintelle Consulting Service
Odoo Development Company in India | Devintelle Consulting ServiceOdoo Development Company in India | Devintelle Consulting Service
Odoo Development Company in India | Devintelle Consulting Service
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 

7 Security Tips for Android

  • 1. 7 SECURITY TIPS FOR ANDROID by The Pryz Manor
  • 2. USE UNIQUE PASSWORDS This is the golden rule for online safety. If someone uncovers your Facebook password, you don’t want them to automatically gain access to your bank, email and Amazon accounts. jakeliefer/flickr
  • 3. AVOID OPEN Wi-Fi A Wi-Fi hotspot without a password is an easy opportunity for hackers to collect data traveling to or from your phone. You can ‘forget’ previously used Wi-Fi hotspots in settings > wireless & networks > Wi-Fi. anonymous9000/flickr
  • 4. SET A SCREEN LOCK Set up a PIN, password, or pattern screen lock in the settings screen. Just go to settings > personal > security > screen lock. booleansplit/flickr
  • 5. Help a stranger return your phone by displaying your email address (or other contact info) on the lock screen. Just go to settings > security > owner info and input the message you’d like to display. HELP THEM HELP YOU sashafatcat/flickr
  • 6. Always read the permissions when downloading or updating an app. Make sure the permissions requested by the developer match the app’s features e.g. an alarm clock app shouldn’t need the permission to make a phone call. LOOK CLOSELY pasukaru76/flickr
  • 7. There are a bunch of apps you can use to view the last known location of your phone. One of these, Plan B, can even be downloaded and set up after losing your phone. USE A TRACKING APP calsidyrose/flickr
  • 8. Encryption will make your personal data unreadable to anyone who doesn’t have your password. Go to settings > security > encrypt phone and follow the instructions provided. ENCRYPT YOUR PHONE zoonabar/flickr