Site icon Soko Directory

Why You Should Be Cautious When Browsing With a Mobile Phone

Mobile phone

When browsing the internet using your phone, you should always ensure that you maintain the utmost security with the websites that gain access to your sensitive data. According to the Communications Authority of Kenya, there are various risks related to wireless networks.

Bluetooth

Bluetooth devices communicate through short-range wireless signals and operate on frequency within 2.4 GHz to 2.4835 GHz, achieving a speed of 1Mbps. It can be used to link mobile phones to headsets or to a computer.

Bluetooth technology has some security and privacy threats to users, these include,

To avoid such risks the communication authority of Kenya urges all Bluetooth users to make sure devices are turned off when not in use.

Data storage on mobile phones

 A lot of people use mobile phones to store a wide range of data, either on the phone’s memory or external memory. And so is the SIM card which is designed to store contacts and messages only. It is crucial to be able to master how to secure data on a mobile phone.

ALSO READ: Telkom’s Response To The CA Review Of Interconnection Rates

SIM lock and phone lock are essential so that whenever your device goes off you can always enter a password to access your personal information. This also means that when the phone is lost or stolen the data cannot be accessed.

Wireless Fidelity (WI-FI)

Wi-Fi areas are also known as hotspots and are deployed in public areas such as airports, universities, hotels, and even café’s.

Any device within the network can serve as an illicit entry point of the entire network if not protected. Users should secure their network by using anti-spyware software as well as firewalls.

Change the router pre-set password and only allow specific computers to access the network.

Another way to secure your mobile privacy is being aware of the IMEA (International Mobile Equipment Identity) number; the unique code can be used by server providers or the police to block the phone against future use in case of theft.

If the phone is recovered the network provider can also unblock to restore the phone to normal use. to access the number key in *#06# and note down the 15-digit number that appears on the screen.

Exit mobile version