SlideShare a Scribd company logo
By Lookout, Inc.
SPRING CLEANING FOR
YOUR SMARTPHONE
IT’S THAT TIME OF THE YEAR
The sun is out, the sky is blue — it’s time to get rid
of the digital clutter that’s been piling up on you.


THIS MESS GOES BEYOND
YOUR GARAGE
Maybe you went on a downloading spree when you unwrapped
your phone over the holidays, or maybe you’ve been
accumulating junk for a while. Either way, there’s a good chance
your phone is starting to look like an episode of Hoarders.
UPDATE YOUR SETTINGS
1

Do you allow downloading from unknown sources? (Hint: You should
check “No”) Does your phone automatically connect to WiFi networks
that might not be secure? (No) Is your device encrypted? (Yes)
!
Spending a few minutes to make sure your phone settings keep the
bad stuff out can save a lot of heartache later on.
G
etourtips!
CHANGE YOUR PASSWORDS
2
****Between your phone, tablet and computer, how many accounts are
you logged into right now? Do you even know? Change the
passwords to your most used accounts, especially if they hold
important financial or personal information.
!
If you’re using the same passwords across many accounts (not that
you would ever do something like that…), using unique passwords
on the important ones will leave you much less vulnerable to fraud.
G
etourtips!
REVIEW APP PERMISSIONS
3

If your so-called free Flappy Bird knockoff game is requesting
access to your financial info, you might have downloaded more
than you bargained for.
!
It’s best to read reviews and check permissions before you
download an app, but you can double check what your apps
are collecting and uninstall the ones that seem fishy.
UNINSTALL FORGOTTEN
APPS
4

Remember that app that was all the craze for about a week three
months ago? Yeah, neither do we.
!
Most of us have about 10 apps we use ALL the time, but the rest
can build up into a crowded graveyard of forgotten apps. Factor
in the fact that some of the lesser known ones may not have the
best privacy standards, and it’s better to just cut the cord.
BACK UP CONTACTS
AND PHOTOS
5
Be honest, how much do you love taking pictures of your lunch? We have
nothing against your extensive album of sandwich pics, but they’re
probably taking up space you could be using for other things (like more
lunch pics).
!
We’re living in the digital age, people! There’s no reason that valuable
data has to live only on your phone. Back up what matters, delete what
doesn’t and your phone can be running more efficiently in no time.
Lookoutcan
help!
BE PROACTIVE
6
Download a mobile security app like Lookout to make
sure you and your phone don’t encounter too much
trouble before your next spring cleaning.
For more mobile security tips, follow
  
Lookout

More Related Content

What's hot

Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
McKonly & Asbury, LLP
 
Hume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentationHume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentation
Scott Burnett
 
Do you know where you are
Do you know where you areDo you know where you are
Do you know where you aresythe64
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
NetLockSmith
 
How to find stolen laptop
How to find stolen laptopHow to find stolen laptop
How to find stolen laptop
sellalaptop.com
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
Simpliv LLC
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
JoshuaWisniewski3
 
How to spy on facebook messenger
How to spy on facebook messengerHow to spy on facebook messenger
How to spy on facebook messenger
kristin2603
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMEN
Naval OPSEC
 
News Bytes - June 2015 - Null HYD
News Bytes - June 2015 - Null HYDNews Bytes - June 2015 - Null HYD
News Bytes - June 2015 - Null HYD
n|u - The Open Security Community
 
Spying Cameras & Spying Phones
Spying Cameras & Spying PhonesSpying Cameras & Spying Phones
Spying Cameras & Spying Phones
Trading Atlas
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
Naval OPSEC
 
Tm insider threat - presentation
Tm insider threat - presentationTm insider threat - presentation
Tm insider threat - presentation
Hakki Aydin Ucar
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Arjun Chetry
 
how to catch a cheater app for android
how to catch a cheater app for androidhow to catch a cheater app for android
how to catch a cheater app for android
Sally_Savard
 
How to install cell phone spyx
How to install cell phone spyxHow to install cell phone spyx
How to install cell phone spyx
devsteam
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
JenMorri
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
FatimaAmin26
 
Securitytips
SecuritytipsSecuritytips
Securitytips
Santosh Khadsare
 

What's hot (20)

Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Hume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentationHume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentation
 
Do you know where you are
Do you know where you areDo you know where you are
Do you know where you are
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
How to find stolen laptop
How to find stolen laptopHow to find stolen laptop
How to find stolen laptop
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
How to spy on facebook messenger
How to spy on facebook messengerHow to spy on facebook messenger
How to spy on facebook messenger
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMEN
 
News Bytes - June 2015 - Null HYD
News Bytes - June 2015 - Null HYDNews Bytes - June 2015 - Null HYD
News Bytes - June 2015 - Null HYD
 
Spying Cameras & Spying Phones
Spying Cameras & Spying PhonesSpying Cameras & Spying Phones
Spying Cameras & Spying Phones
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
 
Tm insider threat - presentation
Tm insider threat - presentationTm insider threat - presentation
Tm insider threat - presentation
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
how to catch a cheater app for android
how to catch a cheater app for androidhow to catch a cheater app for android
how to catch a cheater app for android
 
How to install cell phone spyx
How to install cell phone spyxHow to install cell phone spyx
How to install cell phone spyx
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 

Viewers also liked

Hyperdex - A closer look
Hyperdex - A closer lookHyperdex - A closer look
Hyperdex - A closer lookDECK36
 
Riak Search - Erlang Factory London 2010
Riak Search - Erlang Factory London 2010Riak Search - Erlang Factory London 2010
Riak Search - Erlang Factory London 2010
Rusty Klophaus
 
Brunch With Coffee
Brunch With CoffeeBrunch With Coffee
Brunch With Coffee
Sébastien Gruhier
 
Chloe and the Realtime Web
Chloe and the Realtime WebChloe and the Realtime Web
Chloe and the Realtime Web
Trotter Cashion
 
LXC, Docker, and the future of software delivery | LinuxCon 2013
LXC, Docker, and the future of software delivery | LinuxCon 2013LXC, Docker, and the future of software delivery | LinuxCon 2013
LXC, Docker, and the future of software delivery | LinuxCon 2013
dotCloud
 
Blazes: coordination analysis for distributed programs
Blazes: coordination analysis for distributed programsBlazes: coordination analysis for distributed programs
Blazes: coordination analysis for distributed programs
palvaro
 
ElasticSearch - index server used as a document database
ElasticSearch - index server used as a document databaseElasticSearch - index server used as a document database
ElasticSearch - index server used as a document database
Robert Lujo
 
(Functional) reactive programming (@pavlobaron)
(Functional) reactive programming (@pavlobaron)(Functional) reactive programming (@pavlobaron)
(Functional) reactive programming (@pavlobaron)
Pavlo Baron
 
Complex Legacy System Archiving/Data Retention with MongoDB and Xquery
Complex Legacy System Archiving/Data Retention with MongoDB and XqueryComplex Legacy System Archiving/Data Retention with MongoDB and Xquery
Complex Legacy System Archiving/Data Retention with MongoDB and Xquery
DATAVERSITY
 
NkSIP: The Erlang SIP application server
NkSIP: The Erlang SIP application serverNkSIP: The Erlang SIP application server
NkSIP: The Erlang SIP application server
Carlos González Florido
 
Web-Oriented Architecture (WOA)
Web-Oriented Architecture (WOA)Web-Oriented Architecture (WOA)
Web-Oriented Architecture (WOA)
thetechnicalweb
 
In Pursuit of the Holy Grail: Building Isomorphic JavaScript Apps
In Pursuit of the Holy Grail: Building Isomorphic JavaScript AppsIn Pursuit of the Holy Grail: Building Isomorphic JavaScript Apps
In Pursuit of the Holy Grail: Building Isomorphic JavaScript AppsSpike Brehm
 
Scalable XQuery Processing with Zorba on top of MongoDB
Scalable XQuery Processing with Zorba on top of MongoDBScalable XQuery Processing with Zorba on top of MongoDB
Scalable XQuery Processing with Zorba on top of MongoDB
William Candillon
 
Interoperability With RabbitMq
Interoperability With RabbitMqInteroperability With RabbitMq
Interoperability With RabbitMq
Alvaro Videla
 
Erlang plus BDB: Disrupting the Conventional Web Wisdom
Erlang plus BDB: Disrupting the Conventional Web WisdomErlang plus BDB: Disrupting the Conventional Web Wisdom
Erlang plus BDB: Disrupting the Conventional Web Wisdomguest3933de
 
Shrinking the Haystack" using Solr and OpenNLP
Shrinking the Haystack" using Solr and OpenNLPShrinking the Haystack" using Solr and OpenNLP
Shrinking the Haystack" using Solr and OpenNLP
lucenerevolution
 
Scaling Gilt: from Monolithic Ruby Application to Distributed Scala Micro-Ser...
Scaling Gilt: from Monolithic Ruby Application to Distributed Scala Micro-Ser...Scaling Gilt: from Monolithic Ruby Application to Distributed Scala Micro-Ser...
Scaling Gilt: from Monolithic Ruby Application to Distributed Scala Micro-Ser...
C4Media
 
AST - the only true tool for building JavaScript
AST - the only true tool for building JavaScriptAST - the only true tool for building JavaScript
AST - the only true tool for building JavaScriptIngvar Stepanyan
 
Erlang as a cloud citizen, a fractal approach to throughput
Erlang as a cloud citizen, a fractal approach to throughputErlang as a cloud citizen, a fractal approach to throughput
Erlang as a cloud citizen, a fractal approach to throughput
Paolo Negri
 
Pregel: A System for Large-Scale Graph Processing
Pregel: A System for Large-Scale Graph ProcessingPregel: A System for Large-Scale Graph Processing
Pregel: A System for Large-Scale Graph Processing
Chris Bunch
 

Viewers also liked (20)

Hyperdex - A closer look
Hyperdex - A closer lookHyperdex - A closer look
Hyperdex - A closer look
 
Riak Search - Erlang Factory London 2010
Riak Search - Erlang Factory London 2010Riak Search - Erlang Factory London 2010
Riak Search - Erlang Factory London 2010
 
Brunch With Coffee
Brunch With CoffeeBrunch With Coffee
Brunch With Coffee
 
Chloe and the Realtime Web
Chloe and the Realtime WebChloe and the Realtime Web
Chloe and the Realtime Web
 
LXC, Docker, and the future of software delivery | LinuxCon 2013
LXC, Docker, and the future of software delivery | LinuxCon 2013LXC, Docker, and the future of software delivery | LinuxCon 2013
LXC, Docker, and the future of software delivery | LinuxCon 2013
 
Blazes: coordination analysis for distributed programs
Blazes: coordination analysis for distributed programsBlazes: coordination analysis for distributed programs
Blazes: coordination analysis for distributed programs
 
ElasticSearch - index server used as a document database
ElasticSearch - index server used as a document databaseElasticSearch - index server used as a document database
ElasticSearch - index server used as a document database
 
(Functional) reactive programming (@pavlobaron)
(Functional) reactive programming (@pavlobaron)(Functional) reactive programming (@pavlobaron)
(Functional) reactive programming (@pavlobaron)
 
Complex Legacy System Archiving/Data Retention with MongoDB and Xquery
Complex Legacy System Archiving/Data Retention with MongoDB and XqueryComplex Legacy System Archiving/Data Retention with MongoDB and Xquery
Complex Legacy System Archiving/Data Retention with MongoDB and Xquery
 
NkSIP: The Erlang SIP application server
NkSIP: The Erlang SIP application serverNkSIP: The Erlang SIP application server
NkSIP: The Erlang SIP application server
 
Web-Oriented Architecture (WOA)
Web-Oriented Architecture (WOA)Web-Oriented Architecture (WOA)
Web-Oriented Architecture (WOA)
 
In Pursuit of the Holy Grail: Building Isomorphic JavaScript Apps
In Pursuit of the Holy Grail: Building Isomorphic JavaScript AppsIn Pursuit of the Holy Grail: Building Isomorphic JavaScript Apps
In Pursuit of the Holy Grail: Building Isomorphic JavaScript Apps
 
Scalable XQuery Processing with Zorba on top of MongoDB
Scalable XQuery Processing with Zorba on top of MongoDBScalable XQuery Processing with Zorba on top of MongoDB
Scalable XQuery Processing with Zorba on top of MongoDB
 
Interoperability With RabbitMq
Interoperability With RabbitMqInteroperability With RabbitMq
Interoperability With RabbitMq
 
Erlang plus BDB: Disrupting the Conventional Web Wisdom
Erlang plus BDB: Disrupting the Conventional Web WisdomErlang plus BDB: Disrupting the Conventional Web Wisdom
Erlang plus BDB: Disrupting the Conventional Web Wisdom
 
Shrinking the Haystack" using Solr and OpenNLP
Shrinking the Haystack" using Solr and OpenNLPShrinking the Haystack" using Solr and OpenNLP
Shrinking the Haystack" using Solr and OpenNLP
 
Scaling Gilt: from Monolithic Ruby Application to Distributed Scala Micro-Ser...
Scaling Gilt: from Monolithic Ruby Application to Distributed Scala Micro-Ser...Scaling Gilt: from Monolithic Ruby Application to Distributed Scala Micro-Ser...
Scaling Gilt: from Monolithic Ruby Application to Distributed Scala Micro-Ser...
 
AST - the only true tool for building JavaScript
AST - the only true tool for building JavaScriptAST - the only true tool for building JavaScript
AST - the only true tool for building JavaScript
 
Erlang as a cloud citizen, a fractal approach to throughput
Erlang as a cloud citizen, a fractal approach to throughputErlang as a cloud citizen, a fractal approach to throughput
Erlang as a cloud citizen, a fractal approach to throughput
 
Pregel: A System for Large-Scale Graph Processing
Pregel: A System for Large-Scale Graph ProcessingPregel: A System for Large-Scale Graph Processing
Pregel: A System for Large-Scale Graph Processing
 

Similar to Spring Cleaning for Your Smartphone

5 Ways to Reduce Smartphone Addiction
5 Ways to Reduce Smartphone Addiction5 Ways to Reduce Smartphone Addiction
5 Ways to Reduce Smartphone Addiction
Howtonia
 
You Sure That's Secure?
You Sure That's Secure?You Sure That's Secure?
You Sure That's Secure?
Washington Trafficking Prevention
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Shifts / Trends 2015 - The Pervasive Internet
Shifts / Trends 2015 - The Pervasive InternetShifts / Trends 2015 - The Pervasive Internet
Shifts / Trends 2015 - The Pervasive Internet
Tom Goodwin
 
Your Smartphone CAN help you work smarter in your busines.
Your Smartphone CAN help you work smarter in your busines.Your Smartphone CAN help you work smarter in your busines.
Your Smartphone CAN help you work smarter in your busines.
Bryna Lee Jacobson
 
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
edSocialMedia
 
Rwanda - Smartphone Afavantages and Disadvantages.pptx
Rwanda - Smartphone Afavantages and Disadvantages.pptxRwanda - Smartphone Afavantages and Disadvantages.pptx
Rwanda - Smartphone Afavantages and Disadvantages.pptx
BinyamMeles
 
Android for beginners: Tips and tricks for your new smartphone
Android for beginners: Tips and tricks for your new smartphoneAndroid for beginners: Tips and tricks for your new smartphone
Android for beginners: Tips and tricks for your new smartphone
Dharmendra Rama
 
Friends Before Phones: It's Time to End Cell Phone Addiction
Friends Before Phones: It's Time to End  Cell Phone AddictionFriends Before Phones: It's Time to End  Cell Phone Addiction
Friends Before Phones: It's Time to End Cell Phone Addiction
SaneBox
 
Iphone and ipad kids safety
Iphone and ipad kids safetyIphone and ipad kids safety
Iphone and ipad kids safety
UDIA ORG.
 
Pitch presentation, Apps for Good, focus in
Pitch presentation, Apps for Good, focus inPitch presentation, Apps for Good, focus in
Pitch presentation, Apps for Good, focus iniharris22
 
Tomorrow th'internet
Tomorrow th'internetTomorrow th'internet
Tomorrow th'internetTom Goodwin
 
Tech Savvy Parenting
Tech Savvy ParentingTech Savvy Parenting
Tech Savvy Parenting
hornerl
 
blog androidBlog android
blog androidBlog androidblog androidBlog android
blog androidBlog android
john abraham
 
Efficient placement of #smartphone apps on home screen
Efficient placement of #smartphone apps on home screenEfficient placement of #smartphone apps on home screen
Efficient placement of #smartphone apps on home screenJianfa Ben Tsai
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
Lookout
 
Mobile Matters: 6 Considerations When Selecting A Mobile App
Mobile Matters: 6 Considerations When Selecting A Mobile AppMobile Matters: 6 Considerations When Selecting A Mobile App
Mobile Matters: 6 Considerations When Selecting A Mobile App
Digital Media Training
 
Smartphones
SmartphonesSmartphones
Smartphones
Drew Shope
 

Similar to Spring Cleaning for Your Smartphone (20)

5 Ways to Reduce Smartphone Addiction
5 Ways to Reduce Smartphone Addiction5 Ways to Reduce Smartphone Addiction
5 Ways to Reduce Smartphone Addiction
 
You Sure That's Secure?
You Sure That's Secure?You Sure That's Secure?
You Sure That's Secure?
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Shifts / Trends 2015 - The Pervasive Internet
Shifts / Trends 2015 - The Pervasive InternetShifts / Trends 2015 - The Pervasive Internet
Shifts / Trends 2015 - The Pervasive Internet
 
Your Smartphone CAN help you work smarter in your busines.
Your Smartphone CAN help you work smarter in your busines.Your Smartphone CAN help you work smarter in your busines.
Your Smartphone CAN help you work smarter in your busines.
 
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
 
Rwanda - Smartphone Afavantages and Disadvantages.pptx
Rwanda - Smartphone Afavantages and Disadvantages.pptxRwanda - Smartphone Afavantages and Disadvantages.pptx
Rwanda - Smartphone Afavantages and Disadvantages.pptx
 
Android for beginners: Tips and tricks for your new smartphone
Android for beginners: Tips and tricks for your new smartphoneAndroid for beginners: Tips and tricks for your new smartphone
Android for beginners: Tips and tricks for your new smartphone
 
Friends Before Phones: It's Time to End Cell Phone Addiction
Friends Before Phones: It's Time to End  Cell Phone AddictionFriends Before Phones: It's Time to End  Cell Phone Addiction
Friends Before Phones: It's Time to End Cell Phone Addiction
 
Iphone and ipad kids safety
Iphone and ipad kids safetyIphone and ipad kids safety
Iphone and ipad kids safety
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Pitch presentation, Apps for Good, focus in
Pitch presentation, Apps for Good, focus inPitch presentation, Apps for Good, focus in
Pitch presentation, Apps for Good, focus in
 
Tomorrow th'internet
Tomorrow th'internetTomorrow th'internet
Tomorrow th'internet
 
Tech Savvy Parenting
Tech Savvy ParentingTech Savvy Parenting
Tech Savvy Parenting
 
blog androidBlog android
blog androidBlog androidblog androidBlog android
blog androidBlog android
 
Avg digital-diaries
Avg digital-diariesAvg digital-diaries
Avg digital-diaries
 
Efficient placement of #smartphone apps on home screen
Efficient placement of #smartphone apps on home screenEfficient placement of #smartphone apps on home screen
Efficient placement of #smartphone apps on home screen
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Mobile Matters: 6 Considerations When Selecting A Mobile App
Mobile Matters: 6 Considerations When Selecting A Mobile AppMobile Matters: 6 Considerations When Selecting A Mobile App
Mobile Matters: 6 Considerations When Selecting A Mobile App
 
Smartphones
SmartphonesSmartphones
Smartphones
 

More from Lookout

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
Lookout
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Lookout
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
Lookout
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
Lookout
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
Lookout
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
Lookout
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
Lookout
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
Lookout
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
Lookout
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
Lookout
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
Lookout
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
Lookout
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
Lookout
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise Products
Lookout
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for Good
Lookout
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?
Lookout
 
Dragon lady
Dragon ladyDragon lady
Dragon ladyLookout
 
Dragon Lady
Dragon LadyDragon Lady
Dragon Lady
Lookout
 
History of Lookout
History of LookoutHistory of Lookout
History of LookoutLookout
 

More from Lookout (20)

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise Products
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for Good
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?
 
Dragon lady
Dragon ladyDragon lady
Dragon lady
 
Dragon Lady
Dragon LadyDragon Lady
Dragon Lady
 
History of Lookout
History of LookoutHistory of Lookout
History of Lookout
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Spring Cleaning for Your Smartphone

  • 1. By Lookout, Inc. SPRING CLEANING FOR YOUR SMARTPHONE
  • 2. IT’S THAT TIME OF THE YEAR The sun is out, the sky is blue — it’s time to get rid of the digital clutter that’s been piling up on you. 
  • 3.  THIS MESS GOES BEYOND YOUR GARAGE Maybe you went on a downloading spree when you unwrapped your phone over the holidays, or maybe you’ve been accumulating junk for a while. Either way, there’s a good chance your phone is starting to look like an episode of Hoarders.
  • 5.  Do you allow downloading from unknown sources? (Hint: You should check “No”) Does your phone automatically connect to WiFi networks that might not be secure? (No) Is your device encrypted? (Yes) ! Spending a few minutes to make sure your phone settings keep the bad stuff out can save a lot of heartache later on. G etourtips!
  • 7. ****Between your phone, tablet and computer, how many accounts are you logged into right now? Do you even know? Change the passwords to your most used accounts, especially if they hold important financial or personal information. ! If you’re using the same passwords across many accounts (not that you would ever do something like that…), using unique passwords on the important ones will leave you much less vulnerable to fraud. G etourtips!
  • 9.  If your so-called free Flappy Bird knockoff game is requesting access to your financial info, you might have downloaded more than you bargained for. ! It’s best to read reviews and check permissions before you download an app, but you can double check what your apps are collecting and uninstall the ones that seem fishy.
  • 11.  Remember that app that was all the craze for about a week three months ago? Yeah, neither do we. ! Most of us have about 10 apps we use ALL the time, but the rest can build up into a crowded graveyard of forgotten apps. Factor in the fact that some of the lesser known ones may not have the best privacy standards, and it’s better to just cut the cord.
  • 13. Be honest, how much do you love taking pictures of your lunch? We have nothing against your extensive album of sandwich pics, but they’re probably taking up space you could be using for other things (like more lunch pics). ! We’re living in the digital age, people! There’s no reason that valuable data has to live only on your phone. Back up what matters, delete what doesn’t and your phone can be running more efficiently in no time. Lookoutcan help!
  • 15. Download a mobile security app like Lookout to make sure you and your phone don’t encounter too much trouble before your next spring cleaning.
  • 16. For more mobile security tips, follow    Lookout