3 Step to Secure a Smartphone

Keep android device safe from attackers. Many of these are pretty simple, but security is really more about doing safe things every time than fancy complicated security tricks.

1) Only buy smartphones from vendors who release Android patches quickly.

I recently got a Google Pixel 2. There were many reasons for this, but number one with a bullet was that Google makes sure its smartphones, such as the Pixel, the Pixel 2, Nexus 5X, and 6P get the freshest updates. This means they get the newest security patches as they’re released.

As for other major vendors, Android Authority , the leading Android publication, found, the best vendors for keeping their phones up to datewere, in order, from best to worse: LG, Motorola, HTC, Sony, Xiaomi, OnePlus, and Samsung.

2) Lock your phone.

I know, it’s so simple. But, people still don’t do it. Trust me. You’re more likely to get into trouble by a pickpocket snatching your phone and running wild with your credit-card accounts than you from malware.

What’s the best way to lock your phone? Well, it’s not sexy, but the good old PIN remains the safest way. Fingerprints, patterns, voice-recognition, iris scanning, etc. — they’re all more breakable. Just don’t, for the sake of Android Oreo cookies, use 1-2-3-4, as your PIN. Thank you.

3) Use two-factor authentication.

While you’re securing your phone, let’s lock down your Google services as well. The best way of doing this is with Google’s own two-factor authentication .

Here’s how to do it: Login-in to your Google account and head to the two-step verification settings page . Once there, choose “Using 2-step verification” from the menu. From there, follow the prompts. You’ll be asked for your phone number. You can get verification codes by voice or SMS on your phone. I find texting easier.In seconds, you’ll get a call with your verification number. You then enter this code into your web browser’s data entry box Your device will then ask you if you want it to remember the computer you’re using. If you answer, “yes” that programs will be authorized for use for 30-days. Finally, you turn on 2-step verification and you’re done.