%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 14 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240519062000+00'00') /ModDate (D:20240519062000+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4973 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 71.926 521.469 674.808 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 72.301 520.719 674.058 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(KEEP YOUR CELL PHONE SECURE)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(These days your smartphone is just as powerful as your laptop or pc a few years back. You store more personal and work )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(information on your device and it's always connected to the internet.)] TJ ET BT 61.016 533.055 Td /F3 9.0 Tf [(It's exactly this convenience that puts you as a smartphone user at risk.)] TJ ET 0.373 0.169 0.255 rg BT 347.369 533.055 Td /F3 9.0 Tf [(Cooltech)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 347.369 531.904 m 382.883 531.904 l S 0.400 0.400 0.400 rg BT 382.883 533.055 Td /F3 9.0 Tf [(, iAfrica's tech section, has a few ideas to )] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(minimise risk and ensure your personal information stays, well, personal and safe from malware and cybercriminals and )] TJ ET BT 61.016 511.077 Td /F3 9.0 Tf [(other security risks.)] TJ ET BT 61.016 491.088 Td /F4 9.0 Tf [(Set up a password)] TJ ET BT 61.016 471.099 Td /F3 9.0 Tf [(Your first line of defense is to simply set up a password on your phone. Most cellphone providers allow you to type in a pin )] TJ ET BT 61.016 460.110 Td /F3 9.0 Tf [(number each time you switch on your phone or after a period on inactivity.)] TJ ET BT 61.016 440.121 Td /F4 9.0 Tf [(Install security software)] TJ ET BT 61.016 420.132 Td /F3 9.0 Tf [(Since smart phones are no longer just for storing phone numbers and sms's, but also bankdetails, they're also an easy )] TJ ET BT 61.016 409.143 Td /F3 9.0 Tf [(and perfect target for cybercriminals.)] TJ ET BT 61.016 389.154 Td /F3 9.0 Tf [(Consider installing anti virus software to protect your device against malware. F-Secure, Norton and other large security )] TJ ET BT 61.016 378.165 Td /F3 9.0 Tf [(software vendors each have their own version for the main smartphone platforms.)] TJ ET BT 61.016 358.176 Td /F4 9.0 Tf [(Activate the remote wipe function)] TJ ET BT 61.016 338.187 Td /F3 9.0 Tf [(The biggest risk is the the theft or loss of your device. Rather than worry about a stranger snooping through your )] TJ ET BT 61.016 327.198 Td /F3 9.0 Tf [(information, activate the remore wipe function.)] TJ ET BT 61.016 307.209 Td /F3 9.0 Tf [(This function will allow you, by means of an internet connection, to delete your photos, business contacts and e-mails )] TJ ET BT 61.016 296.220 Td /F3 9.0 Tf [(when you suspect you might not be able to recover your phone.)] TJ ET BT 61.016 276.231 Td /F3 9.0 Tf [(Some manufacturers like BlackBerry and Apple offer the remote wipe function and location applications for their latest )] TJ ET BT 61.016 265.242 Td /F3 9.0 Tf [(devices, while third party applications are available for other platforms.)] TJ ET BT 61.016 245.253 Td /F4 9.0 Tf [(Download safe and approved applications)] TJ ET BT 61.016 225.264 Td /F3 9.0 Tf [(The temptation to download a free, unofficial application on your iPhone or Android instead of purchasing one through )] TJ ET BT 61.016 214.275 Td /F3 9.0 Tf [(iStore, is big, but do you really want to take the risk and expose your phone to malware. Rather stick legitimate sources )] TJ ET BT 61.016 203.286 Td /F3 9.0 Tf [(where proper quality control is done and applications don't come with added nasty surprises.)] TJ ET BT 61.016 183.297 Td /F4 9.0 Tf [(Backup your data)] TJ ET BT 61.016 163.308 Td /F3 9.0 Tf [(As we've already established, a substantial amount of your life is on your smart phone - e-mail, phone contacts, )] TJ ET BT 61.016 152.319 Td /F3 9.0 Tf [(documents, photos and much more. Just as you back up your computer \(hopefully!\), do the same with your cell phone so )] TJ ET BT 61.016 141.330 Td /F3 9.0 Tf [(you won't lose everything if you lose your phone. Many smartphones allow you to make a thorough backup from your )] TJ ET BT 61.016 130.341 Td /F3 9.0 Tf [(device to your pc or at least sync the most important data and settings to an online service. Many smartphones allow you )] TJ ET BT 61.016 119.352 Td /F3 9.0 Tf [(to make a comprehensive backup of your device to a computer, or to sync your most critical data and settings to an online )] TJ ET BT 61.016 108.363 Td /F3 9.0 Tf [(service.)] TJ ET BT 61.016 89.874 Td /F3 9.0 Tf [(Posted in:Communication,Connectivity,Security | Tagged:Cell Phone,Security | With 2 comments)] TJ ET q 139.500 0 0 225.000 140.540 274.879 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 347.3687 532.2226 382.8827 541.3801 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://technology.iafrica.com/) >> endobj 14 0 obj << /Type /XObject /Subtype /Image /Width 186 /Height 300 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 5258>> stream JFIF;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 80 C   %# , #&')*)-0-(0%()(C   (((((((((((((((((((((((((((((((((((((((((((((((((((," }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?(((((((((((((((^S^_Cmk i\" < ~o%ѴCW< Ol@@Q_OE|+|<,+0veK:nc\e{]NFe:U#Gj1GSqI%Clæ^St=KMgfAJ P( ( ( ( ( (ʊ((Z3y:h^$崷GebK ־o-`JI]OPASn aZ͸FYRyZ(+쏇>s-Ʀ$ '.n<\P޶WË>==泔)Aϋ=∋{Y60f_̚;c;X\r(2/Mi⨆)!.PC'־/>YRXm?4EQEQEQEQEQEQE~oyC"jhm`GorY[h 6 <S|1+mމLg|pВv89WU`x-ݝοf۠y S{#o}s5Iudp_ÏN_4D*?:%UTPT ߴfJZK~e;O䥏@Q@R^' <:MюvO~h[%dG"Q~0ZYUz"64ۙy<>z ( ( ( (0?#_Եm?NcF Ta:m߅u[6ݑ<;uϠOF5*RgY쮢Yz2@((+lfUd*˔WWٷaKE}qz)(((y-Aj~G|SB\"Kj<ǵx5:ޗmi7Q]Xܠ)9Vj_ƚ.̓xyk`J[VSر(((|CythVkυߴFzZ#.azv&]ѯtN3%Mea29ZÍEФt -L23v@Y|*ᯈQO։lѰx^_6kqŴC_E-|n&MkZ"%R-weߍ:9n?sKo ?2k6;2HU[,a+߅:HwuM dXW\3(?ӢݒVP5츊HOQWmNi%#Io~+DhݒE*v@ ((WO ;ғη^—r\;;w}kmr_귳kvnXP8y ( ( ( :~ϧkXλdeܬ?zod_kYc.#_aʶ>׊mSZd` :?7_z@Xx" |D®B%!l_qG;R&GxR_,_\fO,zcu^@s\ď;)G%5e`F1@mQ@Q@/|?\+9VhzЎYn#91H8t>~:M/|d+Ypx)}Ҁ>٢((((((@m-೵$kQ@ (ڣDf,]˩c!ffc!U"oԍ[N;QOeuC4LH0FG=+ே4_xF>]*S?t2U5+#]_AWό$~"bDX٦pڿ@EPKE%Kk66wu%K aHjʯb j!4ZlKԏpG>P((((((((cU%QmOr?C?j>ە$w7<((fO  $ԉ&p'_6|_.#~GH#( h(((((((c1ےd~"JNc>1tz|2g( )h@idw٩e*{<Ӿll+s_pEPEPEPEPEPEPEPT5ӴJ1YzeTW/^(WJ#5~j]\Kws5̍,9GcNI>tRPEP_ĚGeto ?*Z ˶Kז9 Z(((((((+'{jִvS[/j( )+Wv:Ũ^M=6ҲJ+o4;WBGH:.4O:^6;`as[Q@Q@Q@Q@Q@Q@Q@Q@R@~m|[kO>-5K~W']~KfZ]0"߈P(3n5xf22Jˍ~WWZwھ(^2lFgE^((((((((o" [d}za Pze|Wbxcǖ4xx %=h)h )(a;+}淶C־Rc; ^}M(>BC@EPEPEPEPEPEPEP^W > Pk%Xʐ s=;J~"D/FE4MH[ʜ݈ ʞ4|SڽgmFQ>s^yu=WI=dYX;I&i˧j bh8*qztw KykH, @K^c,xfjt;e&?Z>V;<䬿SҀ>0V-+܅X!X.'8po t-2-tK{KdXF@|QjZׇu-*u@Y0~ph ( ( ( ( ( ( ( (QEQEQEQGz((( endstream endobj xref 0 15 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000332 00000 n 0000000369 00000 n 0000000504 00000 n 0000000586 00000 n 0000005611 00000 n 0000005723 00000 n 0000005830 00000 n 0000005946 00000 n 0000006066 00000 n 0000006194 00000 n 0000006276 00000 n trailer << /Size 15 /Root 1 0 R /Info 5 0 R >> startxref 11702 %%EOF Keep your cell phone secure « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Keep your cell phone secure

These days your smartphone is just as powerful as your laptop or pc a few years back. You store more personal and work information on your device and it’s always connected to the internet.

It’s exactly this convenience that puts you as a smartphone user at risk. Cooltech, iAfrica’s tech section, has a few ideas to minimise risk and ensure your personal information stays, well, personal and safe from malware and cybercriminals and other security risks.

Set up a password

Your first line of defense is to simply set up a password on your phone. Most cellphone providers allow you to type in a pin number each time you switch on your phone or after a period on inactivity.

Install security software

Since smart phones are no longer just for storing phone numbers and sms’s, but also bankdetails, they’re also an easy and perfect target for cybercriminals.

Consider installing anti virus software to protect your device against malware. F-Secure, Norton and other large security software vendors each have their own version for the main smartphone platforms.

Activate the remote wipe function

The biggest risk is the the theft or loss of your device. Rather than worry about a stranger snooping through your information, activate the remore wipe function.

This function will allow you, by means of an internet connection, to delete your photos, business contacts and e-mails when you suspect you might not be able to recover your phone.

Some manufacturers like BlackBerry and Apple offer the remote wipe function and location applications for their latest devices, while third party applications are available for other platforms.

Download safe and approved applications

The temptation to download a free, unofficial application on your iPhone or Android instead of purchasing one through iStore, is big, but do you really want to take the risk and expose your phone to malware.  Rather stick legitimate sources where proper quality control is done and applications don’t come with added nasty surprises.

Backup your data

As we’ve already established, a substantial amount of your life is on your smart phone – e-mail, phone contacts, documents, photos and much more. Just as you back up your computer (hopefully!), do the same with your cell phone so you won’t lose everything if you lose your phone.  Many smartphones allow you to make a thorough backup from your device to your pc or at least sync the most important data and settings to an online service.  Many smartphones allow you to make a comprehensive backup of your device to a computer, or to sync your most critical data and settings to an online service.

Tags: ,

2 Responses to “Keep your cell phone secure”

  1. Regan says:

    If the user’s device is Activated with the STB BESX Server and the device goes missing. He logs a call with the IT Helpdesk and we can do the remote wipe from the BESX Server.

  2. J P Barnard says:

    Alles goed en wel omtrent die uitveefunksie, maar BlackBerry met Enterprise Service het nie hierdie funksie nie. Hulle BlackBerry Security agent werk net met BlackBerry Internet Service.

    Het julle ‘n oplossing daarvoor?

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.