Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Protecting Your Mobile Device in 2 Easy Steps

Tip of the Week: Protecting Your Mobile Device in 2 Easy Steps

Mobile devices are one of the greatest tools available for business use today. However, because society has come to rely so much on mobile devices, these devices have become a treasure trove for cybercriminals to obtain information from. For this week’s tip, we’ll go over some simple ways to protect yourself from such threats.

Do You Really Need to Connect?
Wi-Fi and Bluetooth connectivity give our phones a heightened level of utility, but this benefit can also come with severe risks. Mobile devices, for the sake of simplicity and convenience, are ready and willing to connect with any Wi-Fi or Bluetooth signal they can. Unfortunately, this puts them at risk of being hijacked by any threat that may be lurking on the signal.

To mitigate this risk, make sure that you aren’t connecting to Wi-Fi or Bluetooth signals that aren’t secure and trustworthy. In fact, when not using them, keep these connections disabled just in case.

The same goes for public charging stations. These can also be used to spread threats, so it is better to rely on a portable charger or a wall outlet to power your device.

Furthermore, if you are connecting to something, make sure you aren’t sharing more than you need. For instance, if you need to rent a car while on a business trip, there’s nothing wrong with using Bluetooth to make hands-free calls. However, if prompted, there is no reason to sync your contacts with the car’s storage, effectively handing them to the next person that rents that car. Being cautious as you connect will only help you to stay safe in the long run.

Keep it Locked Up
The contents of your phone shouldn’t be available to just anyone who picks it up. Whether you have access to sensitive business information through the device, or you have apps that help you manage the rest of your life, your information is at risk unless you have protections in place to keep it safe.

The simplest way to do so is to leverage the phone’s built-in security features. Whether your phone accepts PIN numbers, passcodes, or a pattern set it up so that only you know how to open it. Furthermore, with more devices today leveraging biometric and facial recognition technology, there are other means for you to secure your mobile device.

Security is a crucial consideration to keep in mind, whenever you’re using a mobile device. For more information on how you can keep your business resources safe from threats in and out of the office, reach out to Decatur Computers Inc. at 217-475-0226.

VR and AR Made a Scene at CES 2018
The Fun, the Fit, and the Weird: Our Review of CES...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Network Security Hackers Business Computing Android Google Cybersecurity Smartphone IT Support Malware Software Backup Tech Term Email Small Business Managed IT Services Business Management User Tips Ransomware Internet Data Productivity Data Recovery Phishing Data Backup Efficiency Communications IT Management Business Cloud Cybercrime Windows 10 Artificial Intelligence Antivirus Mobile Device Management Blockchain Cost Management Hard Drive Update Saving Money App Network Hardware Computer Innovation Outsourced IT Gadgets Data Security Internet of Things Microsoft Start Menu Law Enforcement Passwords Bitcoin Microsoft Office Browser Business Technology Social Engineering Spam Word Digital Gmail Collaboration Patch Management Data Management Vulnerabilities Scam Laptop Disaster Recovery Websites Bandwidth Data Protection BDR Holiday Alert Smartphones Tech Terms Business Continuity Project Management Apps Access Control IT Services Data loss Hacking Mobile Device Windows SaaS Data Breach Office 365 VPN Encryption Money Search Applications Social Media Server Operating System Save Money Facebook Touchscreen Maintenance Remote Monitoring Mouse Password Cleaning Paperless Office Two-factor Authentication Computer Care Training Google Calendar eWaste Information Technology Running Cable Computers Solid State Drive Database WiFi Multi-factor Authentication Unified Threat Management Outlook Telephone Systems Equifax Document Management Robot IT Support Mobile Technology Disaster Vendor Mangement Cabling Nanotechnology Tactics Wireless Device security Excel Access Consultant Startup Google Docs Managed IT Services Augmented Reality SharePoint Business Mangement Uninterrupted Power Supply Addiction Website Unified Communications Tip of the week Redundancy Spyware Budget Computing Infrastructure Screen Reader Virtual Reality Knowledge Distributed Denial of Service Worker Tablet Printing Software as a Service Networking Analytics Legislation Communication Samsung Company Culture Freedom of Information Cloud Computing How to History Unified Threat Management HTML Government Cortana Business Cards Virtualization Comparison Automation Conferencing Identity Theft News Google Drive IBM Legal Virtual Assistant Virus Managed Service Provider Big Data Hosted Solutions Apple Automobile Chromebook Desktop Google Maps Fake News Telephony YouTube Best Practice Devices Downloads Downtime Emergency Employer-Employee Relationship Emails Backup and Disaster Recovery VoIP Settings Unsupported Software Compliance VoIp Hard Drive Disposal Piracy Vulnerability Specifications Bluetooth Audit Microsoft Excel Administration Regulations Mobility email scam Software License DDoS Television Wireless Headphones Printer Mobile Security Cryptocurrency Time Management Corporate Profile Upgrades Accountants Mobile Devices Managed IT Windows 10 Marketing Multi-Factor Security Office Users Office Tips Twitter CrashOverride

Latest Blog

In business, everything is measured. Every minute is quantified in order to run the most profitable business possible. When measuring data the measurements you’ll most hear are in bits and bytes. Today, we’ll get into the various ways bits and bytes are used to describe the ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.