In this Internet age, the mobile phone is too important to us. When you go to a strange place, you can open the map with your mobile phone to navigate so as not to get lost; when you are in danger, you can use your mobile phone to call a friend or call the police to relieve the crisis; when you see a beautiful scenery, you can use your mobile phone to send to community to share your mood. There are so many uses of mobile phones in this era. If you live without mobile phones, it will be unimaginable.
However, while getting convenience, we have to accept the harm caused by mobile phones. One of the most common hazards is the leakage of our personal information.
Opening a website inadvertently, connecting to WIFI inadvertently, or posting to Moments inadvertently may cause information leakage. Therefore, it is very important for us to learn how to protect personal information. Here are a few precautions to prevent information leakage. I hope that can help you.
1. Don’t Fill in Personal Information on the APP
With the development of mobile phones nowadays, various APPs have emerged, and many software are strange and dangerous to us.
We sometimes accidentally download some applications that contains fraudulent features. Before using it, they will ask us to fill in personal information, and even ask us to bind a bank card. Some allow you to pay a small fee to use the application for free.
In fact, these are common methods for applying the personal information of mobile phone users. If the user is not alert and directly follows the requirements, criminals will use this information to commit crimes.
2. Tighten the Permissions of Mobile Apps
In addition, you also need to tighten the permissions of the mobile app. The current APP basically reminds you whether to open a certain permission before using it or not, such as location, contact, camera, picture, etc. Once you agree, then these apps can get your personal information through these channels, resulting in information leakage.
Therefore, when opening a certain permission, you need to consider carefully to ensure that the APP is legal and the opened permission is related to the APP. For example, gaining contact permission, obtaining location permission, and gaining the permission to send and receive text messages by yourself, or it is easy to leak personal information in the mobile phone. Generally, just choose to disagree.
3. Don’t Throw away Old Phones
Many people habitually throw away their old phones after their phones are broken or replaced with new ones. This is not desirable. Because there are a lot of personal information on the mobile phone, if your mobile phone is obtained by bad people, and the above information is stolen, they will use these to obtain illegal profits and leak your personal information.
Therefore, as for the method of disposing of old mobile phones, one is to change a battery, which can also be used as a backup machine; the other is to format the mobile phone and sell it to a regular mobile phone recycler.
4. Don’t Connect to Unencrypted WIFI in Public Places
For some free wireless networks in public places, try not to use them. In some public places, in addition to regular wireless networks, there are also many wireless networks that criminals use technology to disguise. But behind these wireless networks is just a phishing website.
If you easily fill in your personal information on it and enter the SMS verification code, your personal information has been leaked almost. In addition, do not install apps with unknown origins, and do not scan QR codes randomly. These things are probably a tool of criminals. If you are not careful, then you will fall into their trap.
5. Do not Register Unreliable Websites
These unreliable websites are very weak in protecting users’ personal information, and they are easy to be attacked to cause information leakage. There are even some websites that collect user information, which is to seek illegal benefits through this channel.
Therefore, do not register the website at will. Check whether the website is legal and reliable before using it, and do not fill in private information at will during the process of filling in the information, otherwise it will be easily used by criminals.
6. Set Privacy Permissions for Social Accounts
Do not post photos in blogs, Moments of friends and other places where strangers may see，because it is very likely that someone will obtain your personal information through these photos. When sharing, you must set the privacy county, and you can also set who is allowed to watch and who is forbidden to watch each time you publish. Make sure not to be seen by people with bad intentions and do something against you.
7. Do not Throw away the List Containing Personal Information at Will
Do not discard the courier slips, card swiping POS slips, banking receipt slips, etc. That contains personal information of you. The information should be eliminated. In addition to sensitive data such as address, telephone number and amount, the waybill number, transaction serial number, etc. should also be eliminated, because these can further obtain other information. Elimination methods include crushing, burning, smearing and so on.
8. Use Private Browsing for the Browser
As we all know, the browser is the window through which the user communicates with the online world, and the user will inevitably leave traces after using the browser.
When the user logs on to the website next time, the website can identify the user’s identity based on the Cookie, and your login information, browsing preferences, etc. will also be recorded. This is why you will accurately recommend the content you like after browsing the web.
Therefore, you need to use “Private Browsing” appropriately. Close the browser’s “User Experience Program” and “Remember Password” functions, and enable “Clear history when exiting the browser”.