Laserfiche WebLink
[ & - E C;- .•> <br />�0P THINK <br />C: O N N <br />10 Security <br />Precautions You <br />Should Take on <br />Every Device... <br />1 . Keep a clean machine. <br />.4* <br />Running the most recent versions <br />of your mobile operating system, <br />security software, apps and Web <br />browsers is the best defense <br />against malware, viruses and other <br />online threats. <br />3 . Protect your personal <br />information. <br />When using a public, unsecured <br />wireless connection, avoid using <br />apps or websites that require you <br />to enter a password. This applies <br />to the wireless networks provided <br />on many airlines, as well as Wi -Fi <br />connections in places like coffee <br />shops, hotels, airports and libraries. <br />4 . Connect with care. <br />Switch off your Wi -Fi and Bluetooth <br />connections when not in use to <br />I 1 1• f <br />-5 . Secure your device. <br />Activate key -lock features and/ <br />or use a passcode. If your device <br />allows for a complex password, <br />take advantage of the feature. <br />6 . Back it up. <br />Sync your contacts, photos, videos <br />and other mobile device data with <br />another device or cloud service on <br />a weekly basis. <br />7 . Provide contact info. <br />Doan Internet search for the <br />best way to add your name and <br />an alternative contact number to <br />your lockscreen, in case a Good <br />Samaritan finds your device. (Don't <br />use highly personal information, <br />such as your home address.) <br />8 . Activate locator apps. <br />Many manufacturers have free <br />apps you can download to help <br />you locate your device in the event <br />it gets lost or stolen. These apps <br />often allow you to remotely lock the <br />device or wipe data. <br />9 . Think before you app. <br />Only download apps from <br />reputable sources, like verified <br />app stores. Understand what <br />information (i.e., location, social <br />networking profiles, etc.) the app <br />would access and share before <br />you download. <br />Other Security <br />Features <br />In addition to activating locator <br />apps and backing up your phone, <br />there are other ways to safeguard <br />your device. Before purchasing <br />or downloading other services, <br />check with your smartphone carrier <br />or service provider to see what <br />additional security measures it <br />provides. These might include: <br />• Remote wipe, which enables you <br />to remotely clear all of your data — <br />including email, contacts, texts, <br />and documents —off your device. <br />• Siren trigger, called the "scream" <br />feature —a high - pitched sound <br />on your smartphone that lasts for <br />about one minute. The scream <br />may be used to draw attention to <br />the smartphone so someone might <br />answer it; or its owner may find the <br />person who has the device. <br />SMiShing and <br />Spam... <br />"SMiShing" is the mobile version <br />of phishing, and occurs when <br />someone sends a SMS /text message <br />asking you to provide personal and/ <br />or financial information by clicking <br />r <br />G <br />