By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Start Your Business Magazine
  • Store
    Merchandise
    Subscribe
  • Features

    Grow, expand and leverage your business..

    Grow your start up business with our experts and industry insiders…

    Get Started

    Quick Links

    • Agenda
    • Business Books
    • Marketing
    • Technology
    • Wellbeing
    • Finance
    Reading: Stop Hackers

    Our Newsletters

    Our website stores cookies on your computer. They allow us to remember you and help personalise your experience with our site..

    Read our privacy policy for more information.
  • Book
  • Trending
    agenda

    5 ways to reduce the hidden mental load of business travel

    According to recent research, 55 percent of business travellers believe frequent travel can lead…

    agenda

    Why you shouldn’t be giving out your personal number for work

    Professionals in the UK are being warned about the risks associated with…

    blog

    Workforce planning expert shares tips for peak season 

    The end of the year is fast approaching, with Black Friday and…

  • Topics

    Topics

    • Agenda
    • Blogs
    • Book Review
    • Business Advice
    • eCommerce
    • SME Update
    Reading: Stop Hackers
    • Events
    • Business Experts
    • Featured
    • Franchise
    • Growing Business
    • Health
    Reading: Stop Hackers
    • Finance
    • Franchise Experts
    • How To
    • Interviews
    • Just for fun
    Reading: Stop Hackers
    • Lifestyle
    • Making money
    • Manufacturing
    • Marketing
    • Money
    • Property
    Reading: Stop Hackers
    • Starting Up
    • Taxation
    • Technology
    • Wellbeing
    • Women in Business
    Reading: Stop Hackers
Reading: Stop Hackers
Connect
Start Your Business MagazineStart Your Business Magazine
Aa
  • Magazine
  • SEO – Backlinks
  • Book: Start Your Business
Search
  • Agenda
  • Book Review
  • Blogs
  • Finance
  • Growing Business
  • How To
  • Interviews
  • Marketing
  • SME Update
  • Starting Up
  • Technology
  • Wellness
  • Contact
Have an existing account? Sign In
Follow US
  • RSS
  • Terms And Conditions
  • Privacy Policy
  • Contact
  • Licensing
  • SEO
Copyright © 2014-2023 Ruby Theme Ltd. All Rights Reserved.

Stop Hackers

Start Your Business
Technology
Share
8 Min Read

Five ways to keep your personal from hackers

New research reveals that nearly half (49%) of UK adults have not installed or didn’t know whether their mobile phone has security software1.  So keeping personal data safe from hackers has never been more important.

Contents
Five ways to keep your personal from hackersBe cautious of public Wi-FiTurn off ‘sharing’ settings when not in useOnly download legitimate appsBe wary of app permissionsAvoid using auto-login

In the wrong hands, stolen data can be used by hackers for illegal activity such as applying for loans or credit cards under a victim’s name, or bank accounts being accessed and money withdrawn4.

To help keep data safe, leading insurance provider, Insurance2go , shares five ways mobile phone users can help to protect personal data stored on their device.

Be cautious of public Wi-Fi

Using public Wi-Fi is great for those who have a low data allowance, or are running out of mobile data. However, public networks often don’t provide a secure connection, making it easy for hackers to use them to access personal data.

Hackers targeting public Wi-Fi hotspots are able to use what is known as a ‘man-in-the-middle’ attack6, which is when a hacker intercepts financial information, passwords and log-in information through a public network.

Always avoid using mobile banking apps or making online purchases whilst logged onto a public Wi-Fi network. For those who do need to use public Wi-Fi, use a Virtual Private Network (VPN) app. A VPN can protect data from getting into the wrong hands by encrypting online data and keeping personal information secure when using a public Wi-Fi connection6.

Turn off ‘sharing’ settings when not in use

Smartphone features that share a location should be used with caution and always turned off when not in use. Features such as Bluetooth, Wi-Fi, location services, mobile data and Near Field Communication (NFC) are susceptible to hacking, especially Bluetooth location services as they transmit a device’s location and presence.

Hackers can easily get hold of personal information and data through features that mark a phone as ‘visible’5, so always make sure to disable such features when they are not needed.

Only download legitimate apps

Downloading illegitimate apps is another way to open your personal data up to hackers. Often, apps hosted on some websites or third-party app stores can contain malware and can access data once downloaded6. It’s recommended that users only download apps from the official app stores, so App Store for iOS users, Google Play for Android users or the AppGallery for Huawei owners.

Be wary of app permissions

When an app is first downloaded, it often asks for ‘permission’ to access certain features or information held on a mobile phone. From the camera roll, to your speaker, location or phone contact list, apps can ask for a range of permissions in order for certain functions to work.

Be cautious of what information an app is requesting access to and question whether the app actually needs that information. For example, a photo editing app doesn’t need contact list information in order to function correctly, so take the time to properly think about whether or not that information is needed7.

Viral video app, TikTok, recently came under fire for security issues in the US, with reports claiming that the Pentagon warned U.S. military personnel in January to delete TikTok from their phones and India, last month, banned Tik-Tok amongst other apps, over security and privacy concerns10. so it’s always important to review what permissions are being asked for by an app.

Avoid using auto-login

Whilst it’s recommended to have a variety of passwords for online accounts rather than the same password, auto-login gives hackers easy access to personal data by simply opening up an app or webpage. For those likely to forget multiple passwords, note them down in a secure, password protected note on a phone, or in a notebook that is kept secure and stored away.

And it’s not just using your mobile phone that can open your personal data up to hackers. What happens if your mobile phone is lost or stolen? Insurance2go  shares some useful tips for people who might find themselves in this scenario and want to keep their personal data safe:

  1. Firstly, report the phone as missing to the network provider, who can suspend or disconnect the service to the phone. This can help stop any authorised use of the phone if it falls into the wrong hands.
  2. If the mobile phone is known to be stolen, inform the police who will be able to provide a crime number, which can be used if the user needs to inform an insurance provider.
  3. Most smartphones now have a built in ‘kill switch’, which can allow a user to remotely deactivate a device if it’s lost or stolen. In order to work, the feature needs to be enabled. For iPhone users, the ‘Activation Lock’ can be enabled within the ‘Find My’ app to help keep data safe. Firstly, go to the ‘Find My’ app > Tap the devices tab and choose which device is lost or stolen, then tap Activate under ‘Mark as Lost’ and follow the prompts on screen. Android users can enable the kill switch with ‘Find My Device’. Go to Settings > Google > Security, then turn on ‘Remotely locate this device’ and ‘Allow remote lock and erase’.
  4. Finally, immediately change passwords for any accounts or apps that can be accessed on the mobile phone. Prioritise any important accounts first, such as online banking and other associated accounts.

Richard Gray, Head of Marketing and Digital, at Insurance2go said: “Our mobile phones are home to lots of stored data and without correctly protecting your personal information, it could easily land in the wrong hands.

“‘SIM-jacking’ is a common method where hackers are able to use stolen data to obtain a Porting Authorisation Code (PAC). This can then be used to switch the victim’s phone number to another phone on another network, helping them gain access to a range of personal data and information, often including banking details.

“Protecting data stored on a mobile phone is extremely important. Hackers are often creating new ways to get a hold of our data, so we hope that by sharing our tips, we can help people avoid getting caught out by fraudsters.”

To find out more about VPNs and how to protect data whilst on a public Wi-Fi, please visit: https://www.Insurance2go .co.uk/about/news-blog/blog/everything-you-ve-ever-wanted-to-know-about-vpns

 

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Start Your Business June 3, 2021
Share this Article
Twitter LinkedIn Reddit Email Copy Link
  • RSS
  • Terms And Conditions
  • Privacy Policy
  • Contact
  • Licensing
  • SEO

Get the latest from us delivered straight to your inbox

Start Your Business Magazine: The Ultimate Business Start Up Guide provides information advice and guidance for entrepreneurs and new business start ups. Get the latest from us delivered directly to your inbox.

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site..

Read our privacy policy for more information.

Copyright 2023 Gambit Interactive Media Limited – All Rights Reserved.

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. Cookies are used for ads personalisation We do this to improve browsing experience as well as show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?