Here’s what to do to increase your cell phone security

by

The action of gangs that steal cell phones and manage to break into digital bank accounts has left users on alert and afraid to use their devices on city streets.

Today the risk represents less the loss of the device itself and more having social networks, banks, shopping applications and emails scoured by criminals, which can affect the personal and financial lives of victims.

Last week, talent agent Bruno de Paula, 36, went viral on Twitter when he told how criminals managed to access his bank accounts, make transfers and ask for loans after stealing his cell phone while he was in a taxi.

This theft practice, called “boating”, happens when cell phones are taken from the victim’s hand, who is usually distracted and with the device unlocked, facilitating access to the most targeted applications.

The cell phone unlocking password (PIN, written password, biometrics and Face ID) is the first security barrier that devices offer, and one of the most important, but the security measures do not stop there.

Digital security experts consulted by the Sheet divide the tips between before and after a possible robbery. The before consists of increasing the device’s overall protection, making access to sensitive applications and information more difficult, and setting the stage for the worst-case scenario; the second consists of reducing the damage and avoiding greater losses.

Gather complete information and keep it in an accessible place

The first and main tip for acting quickly is to take the time to learn how to do all the steps suggested by the experts, and write down contacts, instructions and necessary steps in an easily accessible place.

As much as the tips and cautions seem logical and simple, at the time of the incident it will be difficult to remember all of them.

Increase the protection of your mobile

It’s worth taking the time to figure out how to implement these protections on your cellular system. There are specific tutorials on the internet for iPhones and Android devices.

  • Do not use the same password to access different accounts. Create one for each website and app, unrelated to personal information (date of birth, mother’s name) and made up of numbers, letters and symbols. Use a password manager to make the process easier
  • Do not leave credit card images, documents, proof of address and bank passwords, emails and websites stored on the device
  • Always use protection to unlock your phone, whether by PIN (number sequence), written password, biometrics or facial recognition
  • Decrease automatic screen lock time. The smaller, the greater your security.
  • Enable the option to enter password when an app is accessed. So, even if the device is stolen while unlocked, it will be possible to avoid exposing sensitive information.
  • Activate your SIM password. If the function is activated, it will be necessary to enter this password every time the user turns on the phone or puts the SIM in another device.
  • Store apps with sensitive information in secure folders or leave them hidden
  • Store in a safe place or remember your Google (Android) and iCloud (iOS) account login and password so you can access devices remotely
  • Enable a second factor of authentication on all available services, but do not have the password recovery email registered in the mobile app
  • Disable the content of SMS and email notifications on the lock screen so that password recovery information, tokens and validation codes are not displayed
  • Learn how to remotely lock and wipe your device. On iPhones, this can be done in iCloud; on Android devices, Google services can be used
  • Choose someone you trust to have access to your cell phone’s remote lock system to support you in case of theft or theft
  • Reduce the individual and daily limit of your financial transactions (Pix mainly) and follow security recommendations from your financial institution
  • Keep backups and apps up to date

Avoid damage if your device is stolen

Prepare in advance for the operations below. Contact the operator and banks to check contacts and information that may be needed and keep these instructions in an accessible place (on paper or in a cloud that can be quickly accessed, for example)

  • Contact your carrier to have your SIM blocked. To allow this step, look for the operator now, find out about how to request the SIM block and keep this information in an accessible place (never on your cell phone, obviously)
  • Erase your cell phone data remotely. Thus, the device will be unusable and all information will be erased the next time it is connected to the internet. Prepare in advance by studying how to do this remote cleaning and writing down the instructions in an accessible place
  • Contact bank support to block access to accounts and cards. Inform yourself in advance with the bank about the contacts and the necessary steps, and record the information in an accessible place
  • Change passwords and recovery emails for social networks
  • Notify friends and family
  • Register the incident report so that the IMEI (International Mobile Equipment Identification, a kind of CPF for the device) is blocked. To do this, check your device’s Imei beforehand and register it in an accessible place. This code is noted on the box of the device, but it is also possible to receive it by typing the code *#06# on the telephone keypad, as if you were making a call. The number will appear on the screen.

Sources: José Luiz Santana, director of cybersecurity at C6 Bank, Thiago Bordini, director of cyber intelligence at Axur, and Emilio Simoni, chief security officer at PSafe.

You May Also Like

Recommended for you