How To: Change These Settings Now to Protect Your Data in Case Your Phone Is Stolen

Change These Settings Now to Protect Your Data in Case Your Phone Is Stolen

As smartphone users, we live in dangerous times. The value of phones continues to rise, making them prime targets for thieves. In 2015, the FCC estimated that one million phones are stolen each year, and with several devices starting to hit the $1,000 mark now, these numbers are sure to rise. But what do you do if you fall victim to phone theft?

Unfortunately, there's always a chance that you or someone you love will have their smartphone stolen. Replacing the phone, although costly, is easy to do — but your precious data is still vulnerable. If a thief is savvy enough, they can access the personal information on a stolen phone and potentially empty your bank account, steal your identity, or worse. Thankfully, we can protect ourselves.

Since you can never know when your phone might be stolen, you'll need to take a proactive approach to lock down your data now. By following these tips, you can minimize the chances of a thief accessing your data while increasing the odds of locating your stolen device. Although we live in dangerous times, we do possess strong tools to protect ourselves.

Step 1: Install an Anti-Theft App

With the rise of smartphone theft, many security-focused companies started to expand their efforts from remote threats to those nearby. This led to the creation of several anti-theft programs that combine different technologies to assist users if their device is stolen.

Typically, these programs will include remote tracking so that you can locate your device and relay that information to the proper authorities. Remote wiping is another great feature that allows you to wipe the data and prevent unwarranted access. If you conduct regular backups, you won't lose any data, but the thief will not have access.

Google provides these two features and the ability the ring your device to help you locate your phone as part of their Find My Device service, which is baked into all modern Android phones. This year, Google combined this program with an antivirus suite to create Play Protect, which acts as a security platform for Android smartphones.

If anything happens to your phone, you can use the Find My Device app on another phone (or from the desktop) to see its location on Google Maps. But there's a problem here: Your GPS has to remain on for this feature to work. However, having your GPS always on will drain your battery faster, and it's a security risk in the sense that someone could track you using the same technology. Also, if your phone is turned off, tracking doesn't work.

For these reasons, we recommend using Cerberus to supplement Google's default anti-theft measures. This all-in-one anti-theft solution provides all the basic functionality found in Find My Device, but expands on it significantly.

With Cerberus, you can remotely turn on GPS so that you can track the device. You can prevent someone from shutting down your device by tricking them with a fake shutdown menu. While they believe they've escaped detection, your phone would really be on and continue its tracking. You can hide the app so that they won't know Cerberus is installed.

Cerberus has a web app that allows you to track your phone remotely, and when you first sign up, you'll receive an email with SMS commands that you can use to remotely control your phone. You can remote wipe both the local storage and the SD card.

(1) Some of the features found in Cerberus. (2) Cerberus' IFTTT options.

But one of the best features is the ability to take a picture or video of the perpetrator without their knowledge. It also has SIM checker that will inform you if the thief changes your SIM card, and it supports IFTTT to set up a series of commands that activate another program based on previous actions. Cerberus also has many more features to assist you if you unfortunately ever have to experience this situation.

Cerberus is $5.52 a year, but has a seven-day free trial. We strongly recommend you use this program. By itself, it can be the difference between retrieving your phone or losing everything.

Step 2: Secure Your Lock Screen

One of the most effective deterrents against unwanted access to your data is a secure lock screen. This starts with enabling one of the authentication methods to enter your device. Do not forgo the lock screen by using just a swipe up gesture or having none. By implementing any authentication, thieves will have some difficulty entering into your phone.

As the absolute minimum, we recommend using the fingerprint scanner to enter your device. Fingerprint scanners provide the best balance between security and speed, as most scanners can detect your finger within a fraction of a second. As long as the thief doesn't force you to unlock your device, once they run away with your phone, they won't be able to access any of your data unless they can get your fingerprint.

Fingerprint scanners provide adequate lock screen security.

However, fingerprint scanners are a flawed security method since consciousness isn't required for access. For example, if you are sleeping on the subway and someone steals your phone, they can use your fingerprint while you sleep to access your phone and turn off the security. That is why, for maximum protection, we recommend a password.

A strong password (with over eight characters and a combination of uppercase, lowercase, numbers, and special symbols while having no relation to you or known words) is the best way to impede access, as it requires you to be conscious to implement and is hard to replicate by simple observation. A strong password can last you years without anyone gaining access — although we recommend changing all passwords after 90 days for the best security.

Step 3: Enable Secure Start-Up

With Android 4.4 KitKat, Google introduced full-disk encryption to the platform. What this provided was a virtual safe that locked away all the data stored locally on your device, preventing anyone from accessing it. This encryption was optional, requiring the user to enable it. It prevented access to your phone after it was shut down (or restarted) by requiring the same passcode from your lock screen to decrypt the device for use.

Google changed this with Android 7.0 Nougat to a file-based encryption to protect users from themselves. This is because some users would restart their phones and unknowingly be locked out their device for hours, not receiving notifications because the lock screen password hadn't been entered yet. Nougat also removed the default requirement of a passcode each time you restart your device, but you can re-enable it. That way, if a thief turns off your phone to hide his or her location, when they turn it back on, they will not be able to access its data without your passcode.

To enable this feature, head to your phone's main Settings menu and select the "Security" option (it might be combined with another feature such as "Fingerprints & Security," depending on the skin). Choose the "Secure start-up" option, then enable the "require X to turn on phone" setting (X representing the lock screen security you are using, whether PIN, password, or pattern). You'll be prompted for this passcode, and then you're done.

Step 4: Secure Your Apps

A secure lock screen with secure start-up offers great protection against thieves accessing your data. However, one of the leading principles in cybersecurity is layered security. By having protection at various levels, your data stands a better chance of not being accessed. For an additional layer of protection, we recommend securing apps individually.

Not all apps contain precious data that could compromise us if accessed by another individual. However, for the apps that do, you can use an app called AppLock to provide additional protection.

With AppLock, you can secure individual apps from being accessed without proper authentication. AppLock allows you to use either a pattern, PIN, or fingerprint to secure individual applications.

AppLock also can prevent certain actions from being conducted without a passcode, such as installing or uninstalling apps, receiving calls, or toggling connectivity radios. It allows you to schedule protection based on the time of day or location if you choose.

Step 5: Hide Info from the Lock Screen

Even without requiring proper authentication, the notifications presented on your lock screen can contain valuable data. Although convenient, notifications such as text messages can be read from the lock screen without ever needing a passcode.

To disable this, head to the Settings menu and select "Notifications" (for some skins, you'll need to search for "notifications" instead). Select the "Lock screen" option and choose "Hide sensitive only." Once enabled, the lock screen will still show all new notifications, but it will block the contents of messages, preventing someone from reading them without unlocking the device.

Step 6: Use a Password Manager

It is convenient to use our favorite apps without having re-login in each time. Yet, if they are unlocked for you, they would be unlocked for a thief if he or she was able to gain access to your device. Hence, always log out of all important apps, such as banking or e-commerce. This way, your data is protected with layered security. Also, if possible, don't autofill your user name, as this can be used to retrieve your password. Hackers have used usernames to call up customer support to gain the access to accounts.

To take things a step further, use a password manager to create secure passwords for all your accounts. If you try to make up a secure password for all of your accounts, you'll likely forget them — especially if they follow the good password guidelines.

Password managers, such as LastPass, assist with this by only requiring you to know one strong password. LastPass can generate passwords for all your other accounts and store them in an encrypted database. The password generated can be as complex and long as necessary since you are not required to remember it.

There may be more smartphones stolen each year, but the tools available now allow you to better protect your data and minimize the damage. By using these recommendations, you can safeguard your smartphone's data in the event it ever falls into the hands of a thief.

This article was produced during Gadget Hacks' special coverage on smartphone privacy and security. Check out the whole Privacy and Security series.

Hot Deal: Set up a secure second phone number and keep your real contact details hidden with a yearly subscription to Hushed Private Phone Line for Android/iOS, 83%–91% off. It's a perfect second-line solution for making calls and sending texts related to work, dating, Craigslist sales, and other scenarios where you wouldn't want to give out your primary phone number.

Cover image and screenshots by Jon Knight/Gadget Hacks

Be the First to Comment

Share Your Thoughts

  • Hot
  • Latest