How to keep a better use of your used Android device remains secure

Although Google has prepared a way to ward off malware on Android, we as users have a big role in keeping the device used to stay safe.

Adrian Ludwig, Technical Director for Android Security, shares tips for keeping users' devices secure without being exposed to security issues. There are 5 points you need to know to keep your Android safe.

1. Using lock screen

This is to better maintain the privacy because not everyone can open your phone. How many methods can a user choose? The easiest way to use a password or pattern. But today, many phones are equipped with fingerprint sensors that are considered more secure.

2. Enable data backup feature.

It's good indeed do not ignore data backup. This not only applies to Android users, but also other operating systems.

It is recommended to routinely backup data. So when to update the operating system, replace ROM or exposed to malware attacks, we do not lose important data.

3. Download the app from a trusted store.

Downloading on the Google Play Store is most recommended. Because Google itself has filtered the app that is there with Google Play Protect.

"If downloading outside the Play Store, it's probably ten times more vulnerable," Ludwig said.

4. Make sure it's installed in Google Play Protect and enable Find My Device.

The existence of Google Play Protect to keep the Android system from diverse applications that threaten security.

Google Play Protect is visible under My Apps section of the Play Store. Or it can also be found in Settings in the Security and Location section.

While Find My Device itself to help track the position of the phone when lost or hidden. Through this feature, we can also lock the smartphone to be accessible to others.

Most important through Find My Device, we can delete data on the phone when lost. So no one is misusing the data stored in the device.

5. Enable two-factor authentication for Google services.

Through this feature, Google will inform the phone or email whenever it breaks through the device's security system.   

#Tags

No comments