MvVO Art Launches AD ART SHOW

4 Effective Ways to Secure Your Smartphone

4 Effective Ways to Secure Your Smartphone

That little handheld computer you carry with you everywhere, aka your smartphone, likely contains all sorts of personal information. From emails and text messages to bank account and credit card numbers, there’s plenty of data on these devices that you don’t want to fall into the wrong hands.

Fortunately, there are a number of ways to secure your smartphone to keep your information private — and give you better peace of mind:

1. Use Caller ID to Block Your Phone Number

Depending on the circumstance, there may be times when you want to keep your phone number private when making a call. One good example might be when you call a retailer to inquire about pricing. In this instance, it makes sense that you wouldn’t want the business or company to see — and potentially jot down — your phone number on caller ID.

To prevent the business or company from calling you back — either once or several times — T-Mobile offers simple and easy advice on how to block a number. Simply dial *67 and then the phone number you wish to call. When the recipient receives your call, his or her caller ID will display “private” or “anonymous,” helping to secure your identity.

It’s important to note this service works when calling a business or an individual, but not for any toll-free numbers or emergency services.

2. Set Up and Use a PIN

You might find it taxing to enter a passcode every time you receive a text or want to check your email. Believe me — it can get a little annoying. But keep this in mind: If your smartphone falls into the wrong hands — and you haven’t set up a simple, four-digit passcode — criminals can easily tap a button or two to unlock your smartphone and access your information.

Of course, setting up a passcode can prevent this from ever happening. If you’re an iPhone owner, tap your Settings app and then scroll down until you see “Touch ID and Passcode.” From there, you can create a passcode — some newer iPhone models allow you to use your fingerprint in lieu of a passcode. However, make sure your passcode is not only easy to remember but also difficult for anyone to figure out; for example, don’t use “1234” or “0000.”

Meantime, Android users can access their Settings app and then click “Lock Screen” to set up a pattern, password or PIN.

3. Install Tracking Apps

There are a slew of tracking apps to find your misplaced or stolen smartphone. If you believe your AWOL iPhone is within the vicinity in which it went missing, you’ll hear an alert emitting from it — this system will work even if your smartphone is in silent mode — if you’ve already downloaded and opened the Find My iPhone app.

Meantime, if you believe your iPhone was stolen and is now long gone, you can attempt to track it down by also using the Find My iPhone app, which employs GPS coordinates. Simply log into the app from any other device — someone else’s iPhone, or your tablet or laptop — and use the tracking app to find it.

You can also use this tracking app to wipe proprietary data and information from your smartphone, including bank account information, credit card numbers and more. To enable Find My iPhone, perform the following steps:

  1. Launch the Settings app on your iPhone or iPad.
  2. Tap your Apple ID at the top of the screen.
  3. Tap iCloud.
  4. Scroll down and tap “Find My iPhone.”
  5. Tap the switch to enable it.

For Android users, use the Android Device Manager to enable tracking.

4. Utilize Top-Level Encryption

One effective way to protect your smartphone data from prying eyes is by utilizing hardware-level encryption. Android smartphones on the Marshmallow operating system now automatically encrypt your data, and seemingly every new iPhone offers advanced encryption protection.

But if it has been some time since you’ve upgraded your smartphone, you may wish to invest in a newer model that offers state-of-the-art encryption. has highlighted four smartphones that it deems best for privacy and security. Moreover, each model uses one of two basic types of encryption: either file-based or full disk.

For example, the iPhone 7 uses a dedicated hardware chip to enable encryption, whereas the highlighted Android smartphones on the list all use a software-based encryption engine.


Suzanna, co-owns and publishes the newspaper Times Square Chronicles or T2C. At one point a working actress, she has performed in numerous productions in film, TV, cabaret and theatre. She has performed at The New Orleans Jazz festival, The United Nations and Carnegie Hall. Currently she has a screenplay in the works, which she developed with her mentor and friend the late Arthur Herzog. She was the Broadway Informer on the all access cable TV Show “The New Yorkers,” soon to be “The Tourist Channel.” email:

More in Business

How To Make Money With Vacant Land In New York

WriterMay 22, 2018

How to Invest in Bitcoin

WriterMay 19, 2018

Professional Development Training: Is it Beneficial for Your Company and Employees?

WriterMay 19, 2018

The New Go To Website for Real Estate InternationalRealEstate.News Launches This Saturday

Suzanna BowlingMay 18, 2018

How to Make Money From Instagram

WriterMay 17, 2018

In an Era When Content Is King, Don’t Let Your Business Be the Jester

WriterMay 16, 2018
Domain names

Do’s & Don’ts of Securing Your Domain Name

WriterMay 14, 2018

How To Turn Traffic Into Dollars

WriterMay 11, 2018
food service

Food Service: 9 Maintenance Tips to Keep Your Business Booming

WriterMay 11, 2018