As smartphone users, we live in dangerous times. The value of phones continues to rise, making them targets for thieves. In 2015, the FCC estimated that one million phones were stolen each year, and with several devices starting to hit the $ 1,000 mark now, these numbers are sure to rise. What do you do if you fall victim to phone theft?
Replacing the phone, although costly, is easy to do – but your precious data is still vulnerable. If thief is savvy enough, they can access the personal information on a stolen phone and potentially empty your bank account, steal your identity, or worse. Thankfully, we can protect ourselves.
Since you can never know when your phone might be stolen, you'll need to take a proactive approach to lock down your data now. By following these tips, you can minimize the chances of accessing your data while increasing the odds of locating your stolen device. Although we live in dangerous times, we have strong tools to protect ourselves.
Step 1: Install an Anti-Theft App
With the rise of smartphone, many security-focused companies started to expand their efforts from remote threats to those nearby. This led to the creation of several anti-theft programs that combine different technologies to assist users if their device is stolen.
Typically, these programs will include remote tracking so that you can locate your device and relay that information to the proper authorities . Remote wiping is another great feature that allows you to access the data and prevent unwarranted access. If you conduct regular backups, you will not be able to access any data, but will not have access.
Google provides these two features and the ability to help you locate your phone as part of their Find My Device service, which is baked into all modern Android phones. This year, Google combined this program with an antivirus suite to create Play Protect, which acts as a security platform for Android smartphones.
If anything happens to Your phone, you can use the Find My Device app on another phone (or from the desktop) to see its location on Google Maps. But there's a problem here: Your GPS has to remain on this feature. However, having your GPS always will drain your battery faster, and it's a security risk in the sense that someone could track you using the same technology. Also, if your phone is turned off, tracking does not work.
For these reasons, we recommend using Cerberus to supplement Google's default anti-theft measures. This all-in-one anti-theft solution provides all the basic functionality found in Find My Device, but expands it significantly
With Cerberus, You can remotely turn on GPS so that you can track the device. You can prevent someone from shutting down your device by tricking them with a fake shutdown menu. While they believe they've got detection, your phone would really be tracking and tracking. You can find the app so that they won't know Cerberus is installed.
Cerberus has a web app that allows you to remotely remotely phone, and when you first sign up, you'll receive an email with SMS commands that you can use to remotely control your phone.
But one of the best features is the ability to take a picture or video of the perpetrator without their knowledge. It also has SIM checker that will inform you if the thief changes your SIM card and it supports IFTTT to set up a series of commands that activate another program based on previous actions. Cerberus also has many features to help you unfortunately you have to experience this situation.
Cerberus is $ 5.52 a year, but has a seven-day free trial. We strongly recommend you use this program. By itself, it can be the difference between retrieving your phone or losing everything.  Step 2: Secure Your Lock Screen
One of the most effective deterrents against unwanted access to your data is a secure lock screen. This starts with enabling one of the authentication methods to enter your device. Do not forgo the lock screen by using just a swipe up or having none. By implementing any authentication, it will have some difficulty entering your phone.
As the absolute minimum, we recommend using the fingerprint scanner to enter your device. Fingerprint scanners provide the best balance between security and speed, as most scanners can detect your finger within a fraction of a second. As long as the thief doesn't force you to unlock your device, once they get rid of your phone, they won't be able to access any of your data unless you get your fingerprint.
However, fingerprint scanners are a flawed security method since consciousness isn't required for access. For example, if you are sleeping on the subway and someone steals your phone, they can use your fingerprint while you sleep to access your phone and turn off the security. That is why, for maximum protection, we recommend a password.
A strong password (with over eight characters and a combination of uppercase, lowercase, numbers, and special symbols while having no relation to you or known words) is the best way to impede access, as it requires you to be conscious to implement and is hard to replicate by simple observation. A strong password can be accessed without gaining access – although we recommend changing all passwords after 90 days for the best security.
Step 3: Enable Secure Start-Up
With Android 4.4 KitKat, Google introduced full disk encryption to the platform. What this provided was a virtual safe that locked away all the data stored locally on your device, preventing anyone from accessing it. This encryption was optional, requiring the user to enable it. It prevented access to your phone after it was shut down (or restarted) by requiring the same passcode from your lock screen to decrypt the device for use. [Edit] Google changed this with Android 7.0 Nougat to a file-based encryption to protect users from themselves. This is because some users would restart their phones and unknowingly be locked out of their device for hours, not receiving notifications because the lock screen password had not been entered yet. Now you can remove the default requirement of a passcode that you restart your device, but you can re-enable it. That way, if it thief turns off your phone to hide his or her location, when they turn it on, they will not be able to access its data without your passcode.
To enable this feature, head to your phone's main Settings menu and select the "Security" option (it might be combined with another feature such as "Fingerprints & Security," depending on the skin). Choose the "Secure start-up" option, then enable the "require X to turn on phone" setting (X representing the lock screen security you are using, whether PIN, password, or pattern). You will be prompted for this passcode, and then you're done.
A secure lock screen with secure start-up offers great protection against thieves accessing your data. However, one of the leading principles in cybersecurity is layered security. By having protection at various levels, your data stands a better chance of not being accessed. For additional layer of protection, we recommend securing apps individually.
Not all apps containing precious data that could compromise us if accessed by another individual. AppLock to provide additional protection
With AppLock, you can secure individual apps from being accessed without proper authentication. AppLock allows you to use either a pattern, PIN, or fingerprint to secure individual applications. [Applock] AppLock also can prevent certain actions from being executed without a passcode, such as installing or uninstalling apps, receiving calls, or toggling connectivity radios. It allows you to schedule protection based on the time of day or location if you choose
Even without requiring proper authentication, the notifications presented on your lock screen can contain valuable data. Although convenient, notifications such as text messages can be read from the lock screen without ever having a passcode.
To disable this, head to the Settings menu and select "Notifications" (for some skins, you'll need to search for "notifications" instead). Select the "Lock screen" option and choose "Hide sensitive only." The lock screen will show all new notifications, but it will block the contents of messages, preventing anyone from reading them without unlocking the device.
It is convenient to use our favorite apps without having to login in each time. Yet, if they are unlocked for you, they would be unlocked for a thief if they were able to gain access to your device. Hence, always log out of all important apps, such as banking or e-commerce. This way, your data is protected with layered security. Also, if possible, do not autofill your user name, as this can be used to retrieve your password. Hackers have used usernames to call up customer support to gain access to accounts.
To take things a step further, use a password manager to create secure passwords for all your accounts. If you try to make a secure password for all of your accounts, you'll probably forget them – especially if they follow the good password guidelines.
Password managers, such as LastPass, assist with this by only requiring you to know one strong password. LastPass can generate passwords for all your other accounts and store them in an encrypted database. The password can be as complex and long as necessary since you are not required to remember it.
There may be more smartphones stole each year, but The tools available now allow you to better protect your data and minimize the damage. This article was produced during Gadget Hacks 'special coverage on smartphone privacy and security. This article was produced during Gadget Hacks' special coverage on smartphone privacy and security. Check out the entire Privacy and Security series