Protecting Your ID When You’re Always Connected

With more and more of our time spent connected to smart devices, security is always an important factor to consider whether you’re working on files that live in the cloud, filing photos, or trying to get to the next level of your favorite online game. Your smartphone or tablet could be a target for a savvy hacker looking to capture your information. When you use a smartphone for all the convenience it can deliver (including mobile banking, document signing and sharing, and staying social), what steps should you think about to help ensure your security?

identity-theft

Using Apps Safely

As you look for applications to add into your smartphone, make sure you’re taking the legitimacy of apps into account before clicking ‘download.’ You can do this by reading reviews of apps that are unfamiliar to you so you’re in the know on issues that other users have experienced. Make sure, too, that you know and can confirm that the developer source is a reputable one. The good news for you is that app stores now have rigorous screening procedures to vet submissions, so they’re on the lookout to make sure your store shopping experience is safer and more intelligent than in earlier days.

Protecting Yourself Beyond Apps

Apps are a major window into device access, but hackers have commonly resorted to other increasingly sophisticated tactics to get into your information by email, too. Commonly known as phishing, these look-alike attempts to scam you out of your personal information by resembling communications that you do (or might reasonably do) business with. Commonly requested information: your Social Security number, account information, and passwords. As a reminder of something you probably are already familiar with, never give these out in email: reputable companies won’t ever ask for you to supply this information by email.

When it comes to taking your information with you on the go, mobile devices are unbeatable for convenience, portability, and staying connected. Just make sure that you’re keeping security in mind when you set up accounts, consider new apps, or access your information from another new place.

RELATED: Protect Your Sensitive Data from Cyber Criminals with the Union Built Cloud

This article is provided for general guidance and information. It is not intended as, nor should it be construed to be, legal, financial or other professional advice. Please consult with your attorney or financial advisor to discuss any legal or financial issues involved with credit decisions.

Like Union Built PC on Facebook, Follow us on Twitter and LinkedIn and don’t forget to subscribe to our monthly eNewsletter for the latest Labor and Union News delivered straight to your inbox.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s