%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240519002516+00'00') /ModDate (D:20240519002516+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4487 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 250.327 521.469 496.407 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 250.702 520.719 495.657 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(HOW SAFE IS INFORMATION ON YOUR DEVICE?)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(Smartphones frequently act as the control centres where we schedule meetings, send e-mails and socialise. To satisfy )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(these needs, they require personal information.)] TJ ET BT 61.016 533.055 Td /F3 9.0 Tf [(Our lives are documented and stored in e-mails, social networks and the apps we install on our phones. All this )] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(information syncs seamlessly with your work PC or your tablet. And after initial  set up, it might not even prompt you for a )] TJ ET BT 61.016 511.077 Td /F3 9.0 Tf [(password again. Wonderful news if you are terrible at remembering passwords. Also, wonderful news if you are the thief )] TJ ET BT 61.016 500.088 Td /F3 9.0 Tf [(who steals a smartphone.)] TJ ET BT 61.016 480.099 Td /F3 9.0 Tf [(What information would a clever criminal get his hands on if you lose your smartphone now? Banking information? A copy )] TJ ET BT 61.016 469.110 Td /F3 9.0 Tf [(of your ID or passport saved somewhere in your e-mail? All your holiday photos on Dropbox? )] TJ ET BT 61.016 449.121 Td /F3 9.0 Tf [(Here are a few tips to ensure he won't be able to get to it:)] TJ ET BT 78.360 429.148 Td /F3 9.0 Tf [(1.)] TJ ET BT 91.016 429.132 Td /F4 9.0 Tf [(Always enable the password option on your phone to lock your screen)] TJ ET BT 393.596 429.132 Td /F3 9.0 Tf [(. Most phones have various options - )] TJ ET BT 91.016 418.143 Td /F3 9.0 Tf [(typing in a password, a pin code or even swiping a sequence of dots. This is your first line of defence.)] TJ ET BT 78.360 407.170 Td /F3 9.0 Tf [(2.)] TJ ET BT 91.016 407.154 Td /F3 9.0 Tf [( )] TJ ET BT 93.518 407.154 Td /F4 9.0 Tf [(Don't select "remember password")] TJ ET BT 243.233 407.154 Td /F3 9.0 Tf [( on any of your apps or your e-mail applications. Yes, it is a nuisance to type )] TJ ET BT 91.016 396.165 Td /F3 9.0 Tf [(in your password, but do you really want someone else to read your e-mails? )] TJ ET BT 78.360 385.192 Td /F3 9.0 Tf [(3.)] TJ ET BT 91.016 385.176 Td /F4 9.0 Tf [(Turn off cookies and autofill. )] TJ ET BT 216.539 385.176 Td /F3 9.0 Tf [(This prevents your device from remembering your username and possibly even )] TJ ET BT 91.016 374.187 Td /F3 9.0 Tf [(your password at websites you regularly visit.)] TJ ET BT 78.360 363.214 Td /F3 9.0 Tf [(4.)] TJ ET BT 91.016 363.198 Td /F3 9.0 Tf [(If you need to access sensitive information, e.g. banking, )] TJ ET BT 319.634 363.198 Td /F4 9.0 Tf [(rather go to the)] TJ ET BT 385.640 363.198 Td /F3 9.0 Tf [( )] TJ ET BT 388.142 363.198 Td /F4 9.0 Tf [(website)] TJ ET BT 421.154 363.198 Td /F3 9.0 Tf [(, via a web browser, than using )] TJ ET BT 91.016 352.209 Td /F3 9.0 Tf [(an app.)] TJ ET BT 78.360 341.236 Td /F3 9.0 Tf [(5.)] TJ ET BT 91.016 341.220 Td /F4 9.0 Tf [(Set up your phone to be tracked)] TJ ET BT 228.545 341.220 Td /F3 9.0 Tf [( if you do lose it. \(Read our previous instructions on locating lost or stolen )] TJ ET BT 91.016 330.231 Td /F3 9.0 Tf [(devices )] TJ ET 0.373 0.169 0.255 rg BT 124.028 330.231 Td /F3 9.0 Tf [(here.)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 124.028 329.080 m 144.539 329.080 l S 0.400 0.400 0.400 rg BT 144.539 330.231 Td /F3 9.0 Tf [(\) A device can also be wiped remotely in some cases, which at least ensures that your information )] TJ ET BT 91.016 319.242 Td /F3 9.0 Tf [(doesn't end up being used, even though your actual device is.)] TJ ET BT 61.016 299.253 Td /F3 9.0 Tf [(Remember that you also need to remove ALL personal data \(for example e-mails, SMS's and telephone numbers\) and )] TJ ET BT 61.016 288.264 Td /F3 9.0 Tf [(anything which could connect you to the phone when you sell or dispose of it. )] TJ ET BT 61.016 268.275 Td /F3 9.0 Tf [(Posted in:Apps,E-mail,Security | | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 124.0277 329.3986 144.5387 338.5561 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/en/2014/12/tracking-your-android-phone/) >> endobj xref 0 14 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000305 00000 n 0000000334 00000 n 0000000469 00000 n 0000000551 00000 n 0000005090 00000 n 0000005202 00000 n 0000005309 00000 n 0000005425 00000 n 0000005545 00000 n 0000005673 00000 n trailer << /Size 14 /Root 1 0 R /Info 5 0 R >> startxref 5790 %%EOF How safe is information on your device? « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

How safe is information on your device?

Smartphones frequently act as the control centres where we schedule meetings, send e-mails and socialise. To satisfy these needs, they require personal information.

Our lives are documented and stored in e-mails, social networks and the apps we install on our phones. All this information syncs seamlessly with your work PC or your tablet. And after initial  set up, it might not even prompt you for a password again. Wonderful news if you are terrible at remembering passwords. Also, wonderful news if you are the thief who steals a smartphone.

What information would a clever criminal get his hands on if you lose your smartphone now? Banking information? A copy of your ID or passport saved somewhere in your e-mail? All your holiday photos on Dropbox? 

Here are a few tips to ensure he won’t be able to get to it:

  1. Always enable the password option on your phone to lock your screen. Most phones have various options – typing in a password, a pin code or even swiping a sequence of dots. This is your first line of defence.
  2.  Don’t select “remember password” on any of your apps or your e-mail applications. Yes, it is a nuisance to type in your password, but do you really want someone else to read your e-mails? 
  3. Turn off cookies and autofill. This prevents your device from remembering your username and possibly even your password at websites you regularly visit.
  4. If you need to access sensitive information, e.g. banking, rather go to the website, via a web browser, than using an app.
  5. Set up your phone to be tracked if you do lose it. (Read our previous instructions on locating lost or stolen devices here.) A device can also be wiped remotely in some cases, which at least ensures that your information doesn’t end up being used, even though your actual device is.

Remember that you also need to remove ALL personal data (for example e-mails, SMS’s and telephone numbers) and anything which could connect you to the phone when you sell or dispose of it. 

Comments are closed.

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.