Protect Your Phone

The following tools and tactics can help keep your information safe when browsing on your phone. Learn more about how to set a PIN, safely manage wireless settings, and avoid common pitfalls to keep your information secure. 

PIN keycode

PIN/Keycode

  • Use a PIN/keycode to lock your phone; otherwise if your phone is lost, stolen or left unattended, anyone that picks it up will have unrestricted access to your personal financial information.

  • Avoid using a pin/keycode that is easy to guess such as "1234" and other common phrases.

  • Set up a SIM card lock in the form of a PIN number that will need to be entered when a phone is turned on in order to connect to a network.

  • Another way to retrieve data is by simply plugging the phone into a computer. You can protect against this with software that can encrypt files or folders on a device with industry-standard protection. This means a code must be entered before a file can be viewed or copied to prevent others from accessing your personal information.

Wireless Connections

Wireless Connections

  • Turn off the wireless connection when not in use to safe battery power and ensure that other parties can't connect to your device without your knowledge.

  • If your device has Bluetooth capability, set it to “non-discoverable” and turn off when not in use.

  • If you get a request to “pair” your device with an unknown user, ignore or decline the offer.

  • Be careful when logging into wireless hotspots and unknown networks, they are also hotspots for hackers to get your information.

  • You should not receive requests for passwords, login details and other information at a hotspot location. Any request for information that does not seem legitimate should be ignored.

Applications Tips

Application & Tips

  • When downloading applications, purchase them from a trusted source such as the App Store or Android Market. Do not download apps from third party sources, low rated or poorly reviewed companies.

  • Do not root or jailbreak your device to get around limitations set by your carrier or manufacturer. It may remove any protection to defend against threats. While you may benefit from more flexibility, writers of malicious code can also benefit from access to your device if it becomes infected.

  • Disable the AutoComplete option for online financial companies or secured sites. The convenience of saving user details and passwords when logging into websites makes it very easy for those accessing an unprotected device to do the same.

  • Pay attention to any security warnings before downloading documents or visiting sites.

  • Look for the padlock symbol and https:// in the URL to confirm that the site is secure before you enter sensitive information.

  • Regularly back-up your device. Most devices allow users to "synchronize" information with a computer or website for productivity, backup purposes or in the event of loss.