Mobile Security Tips
Always update your phone's Operating System (OS) when prompted. These updates are meant to protect your device and information.
Always lock your phone when not in use. Set up Touch ID or Facial Recognition on your device, and back that up with a unique PIN or pattern. Set your phone to lock automatically and consider setting it to erase all data after a number of unsuccessful attempts to unlock. You choose the number. Ten is a common number that allows you to make mistakes when entering but doesn't allow too many attempts by someone who shouldn't be unlocking your phone.
Always back up your smartphone's data. If your mobile device gets lost, stolen, or destroyed, would you feel safe that your contacts, pictures, apps, and email data are secure? Back up to the cloud if possible. If you back up to a computer, ensure the backups are encrypted.
Encrypt your data. Your smartphone holds a lot of data. If it's lost or stolen, your emails, contacts, financial information and more can be at risk. To protect your mobile phone data, you can make sure the data in encrypted. Encrypted data is stored in an unreadable form so it can't be understood.
Most phones have encryption settings you can enable in the security menu. To check if your iOS device is encrypted, go to the settings menu and then click on "Touch ID & Passcode." It will prompt you to enter your lock screen code. Then scroll to the bottom of the page where it should say "Data Protection is enabled."
To encrypt an Android, you must first be sure your device is 80% charged, and unroot your phone before continuing. Once these things are done, go to "Security" and choose "Encrypt Phone." If you don't charge your device, unroot it or interrupt the encryption process, you may lose all your data. Encryption can take an hour or more.
Turn on remote tracking in your mobile device settings. Apple users have Find My iPhone, and Android users can enable Find My Device to see the last known location of the device. Both features allow you to remotely wipe your smartphone's data if it's stolen or can't be retrieved.
Audit your apps to see what information they are accessing. Apple and Google Play scan the apps in their stores every day, but there is no way to identify all flaws. Be cautious about what permissions you grant the apps that you download. Permissions can be set to access location services, camera, microphone, photos, etc.
For location services:
If disabling location services altogether will negatively impact your life or business operations, then use them selectively - and with caution.
Share your location only with people or institutions that you trust - and disable any options that allow others to share your location.
Consider disabling geo-tagging features , which can add location tags to your posts and interactions on social media.
Before downloading, installing, or activating a location-enabled app or signing up for a location-based service, carefully study the paperwork (EULA, permissions, etc.) for suspicious references or outright admissions of dubious use of your personal data.
Do not "Root" your Android or "Jailbreak" your iPhone. This is a process that gives you complete access of your device, but in doing so, removes many of the safeguards that the manufacturers have put in place.
Make sure you're protected when using Bluetooth. Always make sure you recognize the device that you're pairing with and try to keep your connection only as long as it is necessary to do whatever it is that you're trying to do. Turn Bluetooth off if you don't use it regularly.