Paradise Computer Services
paradisecomputer@comcast.net

CALL US! 941-493-5126

Address: 1832 Tamiami Trail South, Unit B, Venice, FL 34293 

New Security Features to Protect Your Phone Now

Daniel Bracho • Mar 16, 2024

New Security Features to Protect Your Phone Now

Gone are the days when phones were simple devices used to make calls. Today, our phones are advanced, handheld supercomputers that can do everything from paying a bill to ordering lunch for delivery, editing videos, and more.



But with more capabilities come more risks. Because our phones are computers connected to the Internet, they are susceptible to the same security risks as any other computer. Worse yet, personal devices often contain private information like bank account numbers, which, if accessed by the wrong person, could result in dangerous and expensive problems like drained bank accounts, identity theft, etc. Still, despite the obvious risks, most people do not treat phones like the security threats they pose, making them easy, no-brainer targets for cybercriminals.

To give perspective on how severe the problem is, Apple recently shared a study from MIT revealing a shocking 2.6 billion personal records were breached in 2021 and 2022 and were expected to increase in 2023. According to Kaspersky Security Network, in Q3 of 2023 alone, 8,346,169 mobile malware, adware, and riskware attacks were blocked, with adware being the most common tactic, accounting for 52% of total detected threats.

The risks are even more serious for business owners. Does your organization have a mobile policy for employees? Are employees accessing sensitive work documents or accounts using unprotected devices? If you’re unsure, your IT department must investigate this immediately. A hacker only takes one entry point to break into your network.

There are a few ways to protect your devices now. Apple and Android have developed powerful security systems with advanced protective features you can use today.

 

Apple:

End-to-end encryption has been the default for Apple iMessage, iCloud Keychain, and Health data, but with a recent update, Apple rolled out Advanced Data Protection (ADP). This feature is an optional setting that offers Apple's highest level of cloud data security by encrypting messages in iCloud, iCloud Backup, Notes, Photos, Safari bookmarks, Siri Shortcuts, and more.

Activating this setting protects your data in case of a cloud-based data breach by only allowing trusted devices you add to decrypt the information. Not even Apple can access your data.

Here’s how to enable Apple’s Advanced Data Protection Setting:

  1. Ensure devices signed in with your Apple ID have been updated to at least iOS 16.2, iPadOS 16.2, macOS 13.1, tvOS 16.2, watchOS 9.2 or later.
  2. Open the Settings app on your iPhone.
  3. Tap your name at the top.
  4. Select iCloud, scroll to the bottom, and tap Advanced Data Protection.
  5. Tap Turn On Advanced Data Protection.

NOTE: You'll be prompted to do that first if you don’t have a recovery contact or key.

  1. Once a recovery contact/key is set up, return to Settings > iCloud > Advanced Data Protection and tap Turn On Advanced Data Protection.
  2. Follow the prompts.

NOTE: You may be asked to update other devices signed into your iCloud account before enabling end-to-end encryption (E2E).

You can also remove devices with old software to continue the process.

If your device is new, for security reasons, Apple might make you wait to enable the feature. If that’s the case, that timeframe will show on your screen during setup.

Android:

While Apple is known for its robust security system that reduces vulnerabilities and protects users’ data, Android’s security features are not far behind. Google Play Protect analyzes every app before it’s available for download, and any new apps where a security risk is detected cannot be accessed. The software also runs daily scans to help identify and disable malware and other harmful applications installed on your phone to protect your data.

Furthermore, Android backups are regularly uploaded to Google servers and encrypted with your Google Account password for security purposes.

How to keep data secure if you’re using an Android:

If you’re using Google One, you can set up automatic backups on your Android device to ensure that if disaster strikes, your data is securely stored in the cloud:

  1. Open the Google One app on your Android.
  2. At the bottom, tap Storage.
  3. Scroll to “Backup” and tap View.

●    If this is your first phone backup, tap Set up data backup.

●    If this isn’t your first phone backup, tap View Details.

  1. To review backup settings, tap Manage Backup.
  2. Choose your backup settings.

NOTE: If you get a message about installing an app, updating an app, or changing your settings, follow the onscreen steps. Then, go back to the Google One app to finish.

  1. If asked, tap Allow Permissions.
  2. At the top left, tap Back.

NOTE: Google One backups may take up to 24 hours to complete.
 

How To Protect All Of Your Devices:

These features are not the be-all and end-all of phone security, but they will add a layer of protection for your data. To ensure every device on your network is secure, we recommend getting a third-party Cybersecurity Risk Assessment. This is a free, no-obligation assessment in which one of our experts will examine your network and let you know if and where you’re vulnerable to an attack, including your mobile device policy.

Schedule your assessment with one of our senior advisors by calling us at 941-493-5126 or going to paradisecomputerservices.com

Money -- Scam --  IT Solution -- IT Services -- IT -- Venice, FL -- Paradise Computer Services
By Daniel Bracho 10 May, 2024
Horror stories of people getting scammed out of hundreds or even thousands of dollars aren’t in short supply. As we scroll through the news app from the comfort of our couch, reading these accounts of how a stupid so-and-so opened a suspicious attachment and a hacker drained their bank account, it’s easy to say things like, “I’d never fall for that!” But would you?
Jetty -- Beach --  IT Solution -- IT Services -- IT -- Venice, FL -- Paradise Computer Services
By Daniel Bracho 04 May, 2024
We rely on technology to run our businesses and lives now more than ever. When the “Internet goes down,” most companies come to a standstill until they are back online, costing thousands in lost productivity and sales. A perfect example would be the AT&T outage a few weeks ago, when an estimated 1.7 million customers, including small business owners, lost service. No phones, no Internet. Could you afford your business to be down for minutes, hours, or even days? The answer is likely no.
Email -- Phishing -- IT Solution -- IT Services -- IT -- Venice, FL -- Paradise Computer Services
By Daniel Bracho 26 Apr, 2024
In today's digital world, phishing emails have become one of the most common methods cybercriminals use to trick individuals and businesses into revealing sensitive information or installing malware. As an IT customer, educating yourself and your team on how to detect phishing emails to safeguard your business from potential threats is crucial. In this article, we'll explain how to spot a phishing email and explore how MSP solutions can help protect your business from cyber threats without selling you unnecessary products or services.
Idea --IT Problem -- IT Solution -- IT Services -- IT -- Venice, FL -- Paradise Computer Services
By Daniel Bracho 19 Apr, 2024
In today's digital age, small-medium businesses (SMBs) face many challenges when managing their IT infrastructure. From cybersecurity threats to software updates and technical glitches, the world of technology can sometimes feel like a maze. That's where IT Managed Services Providers (MSPs) come into play, serving as the guiding light that helps SMBs navigate the complexities of IT management. In this article, we'll break down what an IT-managed services provider is and how it can support SMBs daily, all while emphasizing the importance of having local representation. So, What is an IT Managed Services Provider?
IT Problem -- IT Solution -- Cyber Pirates -- IT -- Venice, FL -- Paradise Computer Services
By Daniel Bracho 13 Apr, 2024
When properly utilized, technology can provide a strategic advantage for companies in every industry. However, one of small business owners' biggest issues is overcoming common tech obstacles that hinder productivity. These issues range from minor inconveniences to serious threats that permanently shut down a business. In today’s blog, we’ve outlined 6 of the most common technology problems small business owners face regularly and how you can either avoid or resolve them. 1. Failing to Meet Industry-Specific Compliance Requirements 2. Lack of Strategic IT Planning 3. Inadequate Cyber Security Protection 4. Poor User Support 5. Poor User Asset Management 6. Lack of Training
User -- Piracy -- Cyber Pirates -- IT -- Venice, FL -- Paradise Computer Services -- Passwords
By Daniel Bracho 06 Apr, 2024
“Know Ye That We Have Granted and Given License to Adam Robernolt and William le Sauvage…to annoy our enemies by sea or by land, wheresoever they can, so that they share with us the half of all their gain.” These were the words of King Henry III of England as he issued one of the first letters of marque, effectively employing private sailors to bolster his naval power and fill the royal coffers, all under the guise of lawful privateering. This clever maneuver financed the kingdom’s ambitions and paved the way for the discovery and plunder of new worlds, all at the expense of England’s adversaries.
User -- Laptop -- Username  -- IT -- Venice, FL -- Paradise Computer Services -- Passwords -- Change
By Daniel Bracho 29 Mar, 2024
You are about to read a real story showing how a business can be devastated by cybercriminals in the blink of an eye. Most importantly, I’ll share several ways this could have been avoided. Remember to forward this to anyone making online payments and, better yet, your entire staff. The name of the company and principals has been withheld so they don’t become a further target. $43,000 Gone in The Blink of An Eye!
User -- Laptop -- Username  -- IT -- Venice, FL -- Paradise Computer Services -- Passwords -- Change
By Daniel Bracho 23 Mar, 2024
I get it—it's already passed, but each year, on February 1st, we celebrate Change Your Password Day. While it’s not a holiday that gets you off work, it is a good opportunity each year to do a quick check-in and ensure you’re using strong passwords to protect your accounts. Does not matter if it already passed; you can always have a belated celebration! The suggested ‘rule’ used to be to change your password every three months. With advanced tools like password managers and data encryption, experts now say the type of password you use is more important than how often you create a new one. We’re sharing up-to-date advice on how to make a strong password that will keep your account secure and hackers guessing.
Top -- Top 5 -- Service -- IT -- Venice, FL -- Paradise Computer Repair & Services -- Servers
By Daniel Bracho 09 Mar, 2024
The year 2023 marked a significant turning point for cyber-attacks with the introduction and wide proliferation of AI (artificial intelligence). AI is now in the hands of people who wish to do you harm and who are actively using it to find faster and easier ways to rob you, extort you, or burn your business to the ground. As we write this, we know there’s a tendency to shrug and accept the “we’re all going to get hacked anyway” mantra to avoid dealing with it. Further, like overhyped weather reports, it’s also tempting to ignore the warning signs, thinking all this is just fearmongering rhetoric designed to sell stuff.
attacker -- cybercriminal --cybersecurite -- username -- password --paradisecomputer
By Daniel Bracho 02 Mar, 2024
Have you ever searched for a specific website but landed on a completely different one after misspelling a letter or two in the URL? This deceptive tactic is known as cybersquatting. This practice not only jeopardizes the online presence of businesses and individuals but also poses a significant challenge in the ever-evolving landscape of cyber security. The scariest part is that you can be a victim of a cybersquatting domain and not even realize it.
More Posts
Share by: