Identity and devices

Users are more and more attached to their mobile phones. We can read headlines like Your phone is you. Users have a lot of personal data on their phones. So, it is natural that we protect them? Lookout’s Phone Theft in America report found that victims reported

Loss of company data

10 %

Stolen identity

9 %

Fraudulent charges

12 %

Each day more than 1200 mobile phones are stolen. So, how can users protect their mobile phones and with that also their identities?

Lesson goals and objectives

In this lesson you will learn:

  • how to protect your mobile device/phone
  • how to protect your accounts

Physical protection

The first step is to protect the phone from being taken away. It is not smart to leave it anywhere where others can see it. Store it in the purse, pocket in a way that is completely hidden.

When using it in crowds, it is very easy to pull a mobile phone out of somebody’s hands. So, it is not a good idea to use a mobile phone when there are too many unknown people around.

Locking the phone

The phone must be auto-locked when not used.

It is good to lock it with a minimum 6 number pin code or a good password. On modern mobile phones also biometric authentication can be used as face recognition or fingerprint scanning.

Fingerprint authentication is more and more popular.
Image by Gerd Altmann from Pixabay

Software for the case of theft

It is good to be prepared for the worst situation.

Anti-theft software can be installed and be used in a case of theft to find a phone or at least wipe all the data on it. There are plenty of mobile apps for this situation. Some of them function also as antivirus app.

If a phone gets stolen, a backup can help a user to get at least the data back. Every phone should have backup software installed and used.

Users can back up their data to an external hard drive.
Photo by Dylan Gillis on Unsplash

Applications and updates

There are a few easy guidelines to follow regarding mobile phone software:

  • update the operating system regularly,
  • install and use only verified apps,
  • remove unused apps.

Online accounts

Mobile phones are linked tightly to online services. Users access the emails, messages, posts without authentication as they just open an app and use it. So it is important to know which devices are authorized to use each service/account. In the case of online services use 2-factor authentication.

2-factor authentication protects your online data.
Image from

Interactive video




Leave a Reply

Your email address will not be published. Required fields are marked *