THE word “cybersecurity” calls to mind images of hackers and scammers – but how often do you think about thieves physically stealing your device?
Since this crime is rarely considered in the scope of mobile security, iPhone and Android owners are even more at risk.
Cybersecurity experts talk about guarding your phone from hackers and scammers – but what happens if your device is physically stolen?[/caption]Luckily, there are steps to ensure a malicious actor doesn’t breach your device once it slips out of your grasp.
The best tip is to be prepared for the worst-case scenario. You should know your phone’s unique identifier – a string of digits either 15 or 14 characters long, known as an IMEI or MEID, respectively.
IMEI stands for International Mobile Equipment Identity and is a chain of numbers assigned to mobile phones on the GSM network.
MEID, meanwhile, is short for Mobile Equipment Identifier. It is another unique code specific to CDMA-based technologies.
All this means is that phones run on different networks – your device will have one or the other. Think of it as your phone’s “fingerprint.”
These little-known features are easy to locate once you know how.
Android users can find their phone’s ID number in Settings under About Phone. On iPhone, head to Settings followed by General, and then About.
Once you locate your number, immediately make a record of it. Your mobile carrier, insurance provider, and even the authorities might ask for this information in the case of theft.
This means a simple string of digits can stand between you being reunited with your phone or receiving the correct reimbursement for the loss.
There are other simple tips to keep your phone secure, even once a thief has nabbed it.
One of the most intuitive pieces of advice is to protect your phone with a passkey or password.
A biometric passkey like a fingerprint or face scan is considered the most secure.
Cybersecurity experts recommend using a six-digit PIN or passcode rather than a gesture – like waving a hand – to unlock your phone.
Both iPhones and Androids have an auto-lock feature that closes your phone after a certain period of inactivity.
Security experts recommend limiting this time to one minute or less to prevent bad actors from poking around your device.
It helps to know your smartphone’s unique identifier, which comes in the form of an IMEI or MEID depending on the network. Both numbers can be found in Settings[/caption]Users are generally advised to enable the “Find My” feature, a GPS tracking tool available on iOS and Android.
It goes by different names – “Find My iPhone” and “Find My Device” – but serves the same purpose. The feature can pinpoint your device as long as it has an active data or Wi-Fi connection.
Even if the phone is powered down, “Find My” can lead you to the last known location.
You should regularly back up the contents of your device, either to a cloud service or PC. Even if the device vanishes, you will have what matters, like your photos and files.
Knowing your phone’s “fingerprint” can help police locate the device or ensure you are properly reimbursed for the loss[/caption]If your device is stolen, it is natural to panic – but try to remain calm and remember these steps.
Start by reaching out to your mobile provider. They can suspend service to your phone if necessary.
It is imperative to file a police report. Remember that insurance companies might require a police report number if you file a claim, too.
Lastly, change your passwords. Many apps like email are not password-protected by default, meaning anyone who can open your phone can make changes.
While Apple’s iPhone Operating System has a reputation of being safe, you could always take steps to be even safer. Here’s what Mackenzie Tatananni, Science and Technology Reporter at The U.S. Sun, has to say.
One of the easiest ways to avoid being hacked is to download the latest software updates, which usually contain patches to fix vulnerabilities.
You can also keep your iPhone up to date with the most recent software by turning on automatic updates.
When searching for software, apps, or really anything to download onto your iPhone, only look to trusted sources.
The official App Store is just one example – applications in there have all been vetted by Apple as opposed to those from a third-party source.
You should also exercise caution when downloading text or email attachments.
Do not click on suspicious attachments or links if you haven’t confirmed where they come from.
They can inject malware onto your phone or nab your personal information under the guise of being from a trusted source, like a bank or employer.
To take steps to protect your data from interception, refrain from connecting to public WiFi networks.
If you must, be sure to use a Virtual Private Network, or VPN – there are tons of options in the App Store.