In this information age, anything and everything is possible. One’s practically tired and mentally exhausted by just hearing the fact that your data is no longer your data and that, in any instance of time it can belong to hackers. Therefore, we are in an age where both collection and usage of data are about as important as its very safety. But what can one do about hackers, who deploy trickery and cheating to steal away one’s precious data. It’s about as normal an occurrence in today’s world as one stepping out of the car to light up a smoke. Is it not? Hacking of personal accounts, sifting through one’s social media handles and profiles in incognito mode, resorting to skullduggery for engaging in suspicious activities concerning one’s private data are common maladies in an age where on the one hand, there’s great importance attached to data and where, on the other, one’s data is no longer one’s own (and, therefore, can belong to just about anyone anywhere in the world).
So the simple question is, how to protect your data on the phone? Is there a specific technique or tool using which one can keep the data safe and protected from vile prying eyes? Or is all of this some complex science that has to learn in order to tread more cautiously and skilfully?
The Indian Express recently published a story covering an interaction with a popular American Senator Mr. Angus King, a famous lawyer, senator, who hails from Alexandria, Virginia. As a member of the ‘secretive’ Senate Intelligence Committee, Mr. King exclaimed that there’s always a reason to worry about having run into some hacker who can access one’s data. And this reason to worry made him realize he had to urgently find a solution to end the woes with regards to data protection of his cell phone.
Though, last year, he found some useful advice on how to safeguard his cell phone data. The next thing he did was to immediately make his staff aware of it and inform it on the same.
Though, believe it or not, how one can actually safeguard one’s phone data, preventing it from falling it into the laps of the hackers is more easier than one would imagine. Surprised?
Want to learn it? Here we go then!
There are two simple steps, which one may not have thought about (and this is in accordance to the information published on the Indian Express publication)
Step 1: Turn your phone off
Step 2: Turn your phone back on
And that’s it. Furthermore, this is what IE.com had to say:
At a time of widespread digital insecurity it turns out that the oldest and simplest computer fix there is – turning a device off then back on again – can thwart hackers from stealing information from smartphones.
Regularly rebooting phones won’t stop the army of cybercriminals or spy-for-hire firms that have sowed chaos and doubt about the ability to keep any information safe and private in our digital lives. But it can make even the most sophisticated hackers work harder to maintain access and steal data from a phone.
Also Read – Five Signs That Hackers Are Attacking Your PC
The NSA issued a “best practices” guide for mobile device security last year in which it recommends rebooting a phone every week as a way to stop hacking.
King, an independent from Maine, says rebooting his phone is now part of his routine.
“I’d say probably once a week, whenever I think of it!,” exclaimed Mr. King.