Protecting your personal data on your smartphone is not an easy task.Certain good habits should be taken.Here are 7, given by security specialists.
Can we trust the applications of our phones?In terms of privacy, applications are rather loose to keep our data.Unfortunately, there is no way to easily know if an application tracks you down, even when you ask it to stop and no protection is really waterproof in our world with so changing technologies.An application that behaves well today could go wrong tomorrow if it is sold, if its management changes or if a security flaw is used.
And there is always a risk that the operator who offers you its mobile service be also the victim of a flaw.This is what happened last month in T-Mobile, with data of 48 million flight subscribers.If the end user that you are can do in this kind of case, it is important to secure your data on your own devices, and especially with regard to the applications that we use.It is possible to find and delete the data that Google has on you, it is possible to configure Android and iOS to prevent applications from tracking you down.And Apple recently launched a rapid viewing of the data collected by applications on the app store.
But you can do more to protect your data and your privacy on your smartphone.Here are 7 tips delivered by private life protection experts:
Use a password manager
The strongest passwords are the random character strings.A series of letters, figures and symbols, without any particular order, will be less likely to be discovered in a dictionary in the case of a brute force attack.The downside is that they are more difficult to memorize.
This is where a password manager is useful.This kind of software allows you to keep your passwords in one place.These applications are often also capable of generating strong passwords.Although Google Chrome and other Owner Applications, especially at Samsung, also allow you to record your passwords, experts recommend going through a password manager.
It is also better to avoid using the same password for several accounts.If one of your accounts is compromised because of a security flaw, all these accounts would be compromised.With a password manager, each of your accounts can have their own strong password.
Use a VPN on public wifi
If you connect to a public network from your smartphone rather than go through your data package, experts advise to use a VPN.A virtual private network prevents your data from being watched by other connected to the same network.VPNs can also mask your data transmissions, avoid filtering or internet censorship and allow you to access a whole bunch of content worldwide.
In our case, the VPN acts as a shield protecting you against other people connected to this same WiFi network.When you are looking for a VPN, be careful to opt for a known and recognized entity.The Apple App Store and the Google Play Store are full of free VPN applications, but some have quite dubious practices.
Whatever your frequency of use of a VPN, you should carefully read the conditions of use to be certain that your data is not collected or transmitted to third parties.
Pay attention to permissions granted to applications
One of the advice on which all experts agree is to check the permissions requested by applications.You have to ask yourself whether this or that permission and well appropriate for such or such application.An application that would require data access when it does not need it must be a warning sign.
“If you download a calculating application, for example, and the application asks you for access to your contact list and your location,» explains Stephen Hart, CEO of Cardswitcher, “why would a calculator need to see your contactsAnd your location?Such requests should alert you.»
In addition to paying attention to the permissions you grant to an application, it is important to observe the behavior of your phone after installing said application.SHLOMY LIBEROW, safety specialist at Hackerone, explains that important changes in the autonomy of your smartphone, for example, are another warning sign, insofar as malicious applications often work in the background.
“If, after having installed an application, you notice that the autonomy of your device melts faster than usual, this can be an indication that the application is not trustworthy, there are strongchances that she turns in the background.»
Find out about the application or the company that manages it
Although it is impossible to know if an application is malicious at first, a quick search on Google can provide you with more information. Les experts suggèrent de rechercher le nom de l’application accompagné des mots “data scandal» ou “scam».Depending on the results, you will know a little more precisely if there have been security flaws or other scandals.
“Cette recherche devrait aussi vous dire si les fuites de données sont fréquentes chez l’entreprise et si elle en a déjà été victime, et comme elle y a répondu», explique Stephen Hart."If the company has already been affected several times and has nothing to correct the problem, stay far from the application, it means that it does not take the subject seriously sufficiently.»
Joe Baker, system administrator at Anderson Technologies, explains that it is wise to avoid an application if it is the only one that the developer has produced or if he manages other controversial applications.
Limit exposure to social networks
The Facebook scandal and Cambridge Analytica plunged Facebook in turmoil.But even people who have moved away from Facebook after this scandal, or who had never even created an account, can see their private life invaded.If you appear on the Facebook account of a loved one, you are visible online and companies can build the basics of a profile with what you like, what you do not like, your political inclination, your religious beliefs,etc.
It is wise to limit the amount of information you share on social networks, regardless of what the site asks for you for your profile.The more information you share, the more data you give to create advertisements concerning you.Only inform the strict minimum.In the event of a data leak, you will also risk less.
"Mobile applications are generally more" rigorous "with regard to targeted advertising. Certains s’inquiètent même que des applications accèdent à votre microphone (pour aller plus loin encore dans le ciblage publicitaire)», précise Bobby Kittleberger, directeur de Legal Software Help.
Keep software up to date
Taking the time to update the operating system of your smartphone is absolutely vital to protect your data.Updates make it possible to secure everything and fill faults, which are otherwise used by hackers.Better to configure your device to automatically install said updates.
“Voyez les mises à jour logicielles comme des vaccins pour votre smartphone,» explique Stephen Hart."The methods that criminals use to invite themselves into your phone and steal your data is constantly evolving, protections for our smartphones must also evolve.»
Download applications only from Google and Apple blinds
All the applications offered on the App Store or the Google Play Store are not necessarily confident but the experts advise only download from these two official blinds rather than from a third-party platform.
“Les applications disponibles sur les plates-formes officielles ont été analysées pour s’assurer qu’elles répondent à un standard de qualité dans la protection des données notamment et qu’il vous sera proposé un descriptif détaillé vous indiquant comment elles protègent vos données», selon Stephen Hart.
Download an application from an unofficial source increases the risk that ransomware, malware, spyware or a Trojan would infected your device.And in the worst scenarii, the hacker can obtain total control of your phone.
In addition to avoiding the unique applications of a developer, Joe Baker encourages to find out about the duration of presence on the blind and read the comments before downloading.
"A natural opinion assortment should contain various notes.[…] Some fraudulent applications will also display fraudulent opinions.»
You should pay attention to language habits, high notes without description or explanation."Long -used user reviews will be the best and safest information source.»
En savoir plus