Search by service, product, or technology

While most people are familiar with basic security practices such as installing the latest updates on their computers, other steps may be less obvious. These include locking your computer every time you get up and avoiding leaving your Bluetooth on 24/7. Read on to learn more about the five best practices to help keep your devices safe.

1. See if someone is secretly getting copies of your emails

The best way to ensure that others are not getting copies of your emails is to ensure that your inbox is locked down. If you notice or suspect any unusual logins, you can follow these steps:

  • Login to your email account and then select your account or security settings.
  • You will find an option that allows you to view your recent login activity or history. It may be labeled “Security”, “Recent Activity”, or “Login History.”
  • Next, you can review the list of recent logins. If you notice any devices that do not belong to you or any logins from a strange location, this is a red flag. 

If you are concerned about a login, change your password as soon as you can, and ensure that two-factor authentication is turned on. Also, log all devices out of your account.

2. Ensure your printer didn’t get hacked

Did you know that, just like your computer, your printer can also get hacked? Printers are often goldmines of information for hackers, as they usually store copies of the documents that have been printed. Common signs that your printer has been hacked include:

  • Your printer is producing pages you did not initiate.
  • Your printer begins printing blank pages or pages containing a bunch of characters.
  • Your printer’s settings have changed, and you were not the one to change them.

If you notice any of these signs, unplug your printer. Then, press and hold the Reset button. While holding the Reset button, plug the printer back in and turn it on. After about 20 seconds, the lights on the printer will flash to show that it is reset. 

3. Turn off the Hidden location tracker on your iPhone

Many people are not aware that there is a hidden location tracker on your iPhone. To view many of the GPS tracking settings, you can look through the location settings on your phone. You should also access your Significant Locations setting, which exists to provide personalized services such as traffic routing and Photo Memories. To access the Significant Location setting, and turn it off, follow these steps:

  • Open your iPhone settings and then select Privacy & Security.
  • Select Location Services.
  • Scroll until you find System Services.
  • Then scroll until you see the Significant Locations option.
  • Slide the toggle next to Signification Locations to the left to disable this setting.

4. Wipe your phone if you lose it

The image of a stranger going through your personal photos, videos, apps, and more on your phone is enough to make you cringe. If your phone is ever lost or missing, you should take certain steps to protect your information. This may include remotely erasing your date.

If you are an iPhone user, you can accomplish this by:

  • Open icloud.com/find and go to the Find iPhone feature.
  • Select your lost phone and then choose Erase iPhone. 

If you are an Android user, you can:

  • Go to android.com/find and login into your Google account. Select your lost phone and you will receive information regarding its location.
  • Select Enable lock & erase when prompted.
  • Select Erase device.

5. Do not give apps access to your phone’s contact list

Social media companies want to collect your contacts’ birthdays, full names, email addresses, pictures, and more. They often access this information through apps that access your phone’s contacts. Thankfully, you can review which apps have access to your contact list and then turn it off. 

Overall, it is important that you educate yourself on the best practices to protect your devices from hackers. As a technology solutions company. AD Solutions is committed to ensuring that your printing and copying solutions are protected from hackers and those who wish to steal your information. To learn more about our Sharp devices and the steps we take to keep your information safe, contact us today.

Related Blogs

Tech tips: Make your phone audio crystal clear and even add a library

While tech is meant to make our lives easier, that’s not always reality. But, with a few tips and tricks, you can have your…

Learn More

Choose a Category