Secure your phone

8 tips to information secure usage of your mobile

A phone is a payment device. So, it should be used very carefully.

The phone is much more than just a phone or a payment device. We rarely think about how our phones contain a lot and versatility various critical information about us and what we do.


Besides payment applications and access to online bank services, our phones hold more or less our entire social network, and access to our conversation history within our networks, perhaps over the years.

In other words, your phone equals nearly your entire life.


The phone also contains biometrical data on us, like fingerprints. It can also enable access to our various health information, as for example, the latest data seepage of Polar’s wellbeing bracelets showed.


Location data leaks a story of where we spend our time. Our location faithfulness is bigger than commonly thought. According to a recent research, people visit regularly only about 25 places. Even a quick look at your location data may reveal information plenty enough to know where you are and when.


In other words, your phone equals nearly your entire life. This insight should motivate you enough to take your phone’s information security seriously. On the other hand, only few will follow up long or detailed instructions on the matter.


That’s why we pay attention to the things you should ensure related to the information security of your phone.


I suggest the following actions, the reasoning of which are summarized below:


  1. Use screen lock.
  2. Make sure that your phone’s memory is encrypted.
  3. Turn on a ‘Remote Wipe’ functionality.
  4. Make sure that your phone updates its software automatically.
  5. Switch to a new phone, when the new security updates are not available anymore.
  6. Do not install any virus detectors or similar tools.
  7. Lose the phone accordingly, when you give it up.
  8. Avoid using additional memory cards.

In Apple’s phones, using a screen lock ensures the encryption of the fixed memory, but it is also a very essential way to ensure others can’t access our phones. Encrypting fixed memory not only protects your phone but also ensures its information secure wiping when restored to factory settings whilst giving up the phone.


A factory reset is usually enough when giving up an encrypted phone.


Remote Wipe enables the wiping of a stolen or lost phone. Updates, however, are an essential part of information security, and the most common phone manufacturers offer up-to-date security updates to their phones only for a couple of years. This, unfortunately, means that in regards to a phone, the idea of buying a proper one in one go does not qualify.


The usefulness of virus detectors is questionable as the applications need very wide access rights, and it is possible that it opens up new space for criminals to attack. When giving up the phone accordingly, it is enough to do a factory reset, if the phone is encrypted and does not have any additional memory. And of course, the phone can be destroyed physically as well.


From the perspective of information security, the idea of buying a proper phone in one go does not qualify anymore.


The issue with using additional memory is that proper encryptions like in fixed memory should be used, but a factory reset might not block the access to them well enough.


As a conclusion, the phone is a big part of our lives and should be handled with care. In addition to common sense, just a hint of closer information security to your phone is enough. You don’t have to be a guru of information security to handle it. I hope you learned new tips from this blog and are now a bit more secured mobile user!


Poplatekcrew is all about information security. Among other things, we developed our own 3-D Secure Server to protect the payments and transactions of our customers’ customers. Learn more from here!

Secure your phone

Secure your phone

Secure your phone

Subscribe to Poplatek’s newsletter

Subscribe to our newsletter to never miss out on the best opportunities and success stories of digitalisation.