Get Started Today!  217-475-0226

croom new

Decatur Computers Inc. Blog

Are Your Mobile Security Settings Up to Par?

Are Your Mobile Security Settings Up to Par?

While you may not consider it at first, your mobile device has a sizeable amount of personally identifiable data on it - far more than should be left on an unsecured phone at any time. Fortunately, Google has added a considerable layer of protections to Android to assist users with their security. All a user has to do is know how to use them to their fullest potential.

Here, we’ll go over how to activate the built-in defenses to the Android system.

Confirm Google Play Protect is On
Google Play Protect is the security system that Android has to ensure that your mobile apps aren’t endangering your security, always scanning your device to spot threats. While it should be activated by default, it never hurts to check that this feature wasn’t switched off at some point. In Settings, go to the Security section and access Google Play Protect. If all the toggles are active, you have Google Play Protect on your side.

Activate Two-Factor Authentication
While this is actually a feature on your Google account and not native to your Android, it is still key enough to your Android’s security that it warrants inclusion. After all, we’ve established that your phone likely has a huge amount of sensitive data and personally identifiable information on it - adding another layer of protection only makes sense.

To activate two-factor authentication, access your Settings, and in the Google section, access Security and follow the steps provided to start up 2-Step Verification.

Limit Lock Screen Notifications
The fact that Android has the ability to display notifications on a user’s lock screen is extremely useful… until someone else sees something that they shouldn’t have as a notification pops up for an incoming message. Fortunately, the amount of information that these notifications display can be limited so that these messages remain more private. In your Settings, access Lock screen and press Notifications. From there, you can toggle whether or not your notifications show their content or just the application’s icon.

Pinning Your Screen
This one is a handy trick to know if you have a tendency to let other people use your phone with any regularity. If you’d rather not risk them digging into your other applications or files, you can ‘pin’ your screen to a particular application. This means that whoever is using your device is unable to use the other applications and functions that the phone has until you unpin it.

Pinning your screen is a fairly simple process, once you’ve activated this functionality. To do so, access your Settings, go to Biometrics and security, and press Other security settings. Scroll to the bottom of this page and make sure the Pin windows toggle is switched to on, then enter that menu item and turn the Ask for PIN before unpinning switch so it is also activated.

Once screen pinning is activated, you can then ensure that the app that you are allowing someone borrowing your phone to use is the only one they can use until the application has been unpinned. To pin usage down to a single app, open the application and press the Recent button. There will now be a pin icon on the screen, press it to pin that application. When you are ready to allow other apps to be used again, hold the Back and Recent buttons simultaneously. This will unpin your device, but also lock it, requiring your PIN to be input again before it can be used.

Keeping your phone safe can seem like a challenge at times, but properly utilizing its abilities can make it a lot easier. Decatur Computers Inc. can do the same for your business’ technology. Give us a call at 217-475-0226 to learn more.

The Computer Processor May Not Be What You’d Expec...
How to Order the Items on Your To-Do List


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Network Security Tech Term Privacy Business Computing Hackers Productivity Data Software IT Support Data Backup Android Efficiency Innovation Google Business Management Malware User Tips Data Recovery Email Communications Computer Cybersecurity Internet Collaboration Smartphone Cloud Small Business IT Services Backup Windows 10 Phishing Hosted Solutions Communication Managed IT Services Mobile Device Ransomware VoIp Browser Facebook Artificial Intelligence Microsoft Office Social Media Business Technology Hardware BDR Cloud Computing Automation Applications Cybercrime Cost Management Managed Service Blockchain Mobile Devices IT Management Access Control Office 365 Business Outsourced IT Mobile Device Management App Information Data Security Microsoft Patch Management Passwords Scam Apps Websites Encryption Server Gadgets Network Maintenance Smartphones Data Management Two-factor Authentication Hard Drive Managed IT Services Update Saving Money Disaster Recovery Antivirus Workplace Tips Holiday Augmented Reality Windows VPN Law Enforcement Quick Tips Start Menu Bandwidth Vulnerability Laptop Bitcoin Cooperation Operating System Mobility Saving Time Printer Social Engineering Tech Terms Analytics Remote Monitoring Internet of Things Users SaaS Gmail Healthcare Conferencing Business Continuity Project Management Data loss Money Hacking Apple Vendor Search Spam Managed Service Provider Google Maps Save Money Big Data Document Management Word Alert Touchscreen Digital Data Protection Data Breach Vulnerabilities Cryptocurrency Customer Resource management SSID Hard Drive Disposal Compliance Google Docs Gamification Entertainment Unified Threat Management Management Google Play Website Access Service Level Agreement Vendor Management Piracy History Bluetooth VoIP Freedom of Information Settings Twitter Unified Communications Cortana Computing Infrastructure Business Mangement Mouse Username Navigation Virtual Reality Screen Reader Audit Telephone System email scam Regulations Redundancy Budget Data Analysis News Computing Security Cameras Automobile Running Cable Spyware Going Green WiFi Software License IBM Wireless Headphones Knowledge Telephone Systems Mobile Security Administration Printing User Tip Networking Solid State Drive Legislation DDoS Evernote Company Culture Tablet Software as a Service Electronic Medical Records Medical IT IT Support Accountants Content Fileless Malware Best Practice Fake News Error Social Cabling HTML Managed IT Download Bookmark Wireless Corporate Profile Cleaning Time Management Consultant Employer-Employee Relationship Paperless Office Government Addiction Business Cards Virtualization Miscellaneous Identity Theft How to Computer Care Excel Health IT PowerPoint eWaste Training Password Comparison BYOD Directions Unsupported Software Telephone Router Voice over Internet Protocol Virtual Assistant Google Calendar Upload Browsers Information Technology Computers Multi-factor Authentication Database Legal Machine Learning Proxy Server Uninterrupted Power Supply Google Drive SharePoint Tech Desktop Chromebook Virus Tip of the week Professional Services Robot Equifax Specifications Microchip Microsoft Excel Social Network Modem iPhone Worker Devices Outlook Trends Mobile Technology Nanotechnology Unified Threat Management Term Device security Tactics Downloads Network Management Help Desk Downtime Emails Telephony Disaster Distributed Denial of Service Monitoring Upgrades YouTube Backup and Disaster Recovery Sports Samsung Startup Vendor Mangement Emergency Television Travel Processor Multi-Factor Security Retail Windows 10 Managing Stress Marketing Office CrashOverride Printers Office Tips Regulation

Latest Blog

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.