Refreshing Viewpoints

All about cell phone security

malware2Cell phones have become an important part in people’s lives. There’s no doubt that your lives move around this be it for personal use or business use. In fact, most people use their cell phones more than they use their personal computers. This clearly makes the data as well as the information stored in the cell phone more important than the laptop or PC. To make things easier and to secure your cell phone, here are some of the cell phone security tips you need to consider.

Tips to secure your cell phones

Find out IMEI number- each and every device has their IMEI number stored in the phone. All you need to do is find it out and save it elsewhere. This will help you track down your cell phone and block it, if it gets stolen.

Turn off the Bluetooth- most people have the habit of turning on the Bluetooth even when they aren’t using this. It poses a big threat to cell phone security. It is always important to turn off the Bluetooth when it is not in use.

Set passwords and pin- setting pins and passwords on your cell phone make it really impossible to use it when it gets stolen. You need to set up a pin on your cell phone and select lock automatically.

Backup and transfer important data- most people prefer to keep their cell phones secure due to the amount of information stored in it. Simply losing the password is a big problem. You can’t get the lost images, contact numbers and essential information. So, it is extremely necessary to have a back up of these data and transfer the important ones.

Be careful when downloading free apps- everyone loves using free apps that allow them to use it without paying. But, not all free apps are safe to use. There are several apps that steal personal data from your device after you download it. So, be careful what app you are downloading.

New threats to cell phones

Just like PC and laptops are affected by the virus and spyware, your cell phone too isn’t quite safe. There are several security threats to your cell phone. Here are some of the common types.

Application based threats

Downloading certain applications can cause damage of security. There are some malicious app that looks fine when you download, but are designed so that it can sacrifice your cell phone’s security. Malware, spyware, privacy threats and vulnerable applications are some of the common ones. Malware can send unsolicited messages, result in excess billing of your cell phone and more. Spyware, on the other hand, steals sensitive data from your cell phone such as browser history, contact details, phone’s location and more.

Web based threats

The next in list includes web based threats. Cell phones are always connected to the internet to access the web. This is when your device fall prey to these threats. Some of the common web based threats include phishing scams, browser exploits and drive by download. Drive by download downloads application automatically when you visit a web page. Phishing scams send you links to the websites that trick you in a way to provide details such as account numbers, passwords,etc.

If you want to stay up to date on all the threats that are out there as well as new ones, then you should definitely check out We Hate Malware, a tech blog focusing on spyware and malware detection and prevention.

How to Optimize Your Computer

oldcomputer2A slow PC is usually a culmination of software programs that are either incompatible with your windows or infections from a malware. As much as today’s windows versions provide a better performance in any PC, you can still end up with a computer that is frustratingly slow. You can however optimize your computer to solve problems that often relate to memory usage. The following guide will help you get started.

The Processor Should Be Compatible With the Windows Version

Incompatibility issues may cause a divergence from the normal PC’s memory functions such that when your prompt a command, it takes a long time to initiate i.e. when opening a program, folder, audio or video file.

Don’t Save More Private Files On Your Desktop & System Drive.

These files will slow down your PC because if you use them frequently, the computer will allocate more memory space for them.

Don’t Permit Programs That Take More Memory Space

User-installed background programs require more memory. Therefore, make sure you close them completely to end the process that you were running before.

One Anti-Virus Software Is Enough

There are many antivirus programs you can download for free online some on a trial basis. However, don’t use more than one antivirus in a system as this will create a conflict of operations between the installed programs thereby affecting the performance of your PC.

Apart from the antivirus, also avoid software that are sending or receiving any data to their server without your permission. Browsing or using other applications may also generate temporary files, cookies and history. Close all user-opened applications and clean up (don’t deep-clean the registry) your PC before shutting down. Also scan your PC on a weekly basis to check for vulnerabilities or back-door cases. Perform a full system “deep scan” on a monthly basis.

The most recommended features you can disable on your PC include;

– Windows Gadget Platform

– Internet Information Services

– Indexing Service

– Hostable Web Core

– Games

Optimizing Your PC Speed in Windows

– Use the disk defragment tool when your total file size is around 70-80% of the drive capacity.

– Remove any drivers which are not properly installed.

– Do not start or stop manually any windows services that you are unfamiliar with.

– Remember the last restore point. Then restore windows within 5 months or in case of an emergency. To avoid complete formatting procedures, don’t initiate full system restore.

– A home PC should have at least a 100GB space to avoid the tendency to create more duplicate data.

– Perform a deep registry clean operation at least 3 times in a year to help remove invalid entries from the registry.

– Exit Instant Messengers if you are not using them.

– Make sure cookies are completely cleared the first time with any cleanup utilities. Some intruders can collect information from cookies and use them to initiate malicious attacks on your PC.

– Switch off the internet connection on your PC if you are not browsing.

– Set a scheduled backup.

– After uninstalling any program make sure that related folders that exist in Program Files are deleted. Some folders and their contents may however be deleted automatically when you next logon. Therefore, no action is needed.

What to Avoid

-Before cleaning the registry, ensure that your recent backup files exist.

-Avoid independent tweaks in windows as they may affect some drivers or programs.

You may have to install external software to optimize your computer. Still, you can maximize speed by tweaking the existing programs on your PC and avoiding malicious software.