Previous Page  29 / 42 Next Page
Information
Show Menu
Previous Page 29 / 42 Next Page
Page Background

If a tech-savvy has physical access to

your mobile, he can use one of the

advanced cracking methods to reach

to your mobile information even if

it’s locked by PIN, password or pat-

Most of the mobile devices can support

software which remotely erases and/or

locates mobile information in case you lose

your device. Some mobiles’ operating sys-

tems come with embedded software that

enables managing the mobile device afar

either by wiping information or tracking its

location. Other operating systems require a

special software to enable such control.

Backup your mobile device regularly.

This will help you recover your infor-

mation in case your mobile device

is lost or stolen. Backup can be per-

formed in many ways: storing directly

in the computer, through iCloud for

Apple devices and Google Cloud for

Android users.

»

»

Encryption

»

»

Remote Wiping & Tracking

»

»

Backups

tern lock. Therefore, various mobile compa-

nies provide built-in hardware encryption

enabled automatically to protect the data

even without a password.

October 2017

| 26

DoIT Newsletter

Nov 22, 2022