Usa Find My Device o Buscar de Apple
4/Feb/2020Tips de seguridad en móviles
Usa Find My Device o Buscar de Apple
Con la apliacion Find My Device de Goolge o Buscar de Apple, tendremos el control sobre nuestro dispositivo y en caso de pérdida o robo, podremos localizarlo, bloquearlo o incluso borrar todos los datos remotamente.
Más consejos
Beware of public WiFi networks
When we connect to a public Wi-Fi network, such as in airports, bars or stations, or a Wi-Fi network without a password, we should not access any website that contains sensitive information, such as banks. In public Wi-Fi networks or without a password, it would be...
Protégete frente al spyware Pegasus
El spyware Pegasus se ha convertido en un problema a nivel global, dado que se trata de un malware que está logrando saltarse las barreras de seguridad tradicionales e infectar tanto a dispositivos Android como iOS. ¿Como puedes protegerte frente Pegasus? Pegasus...
Security updates
Although it may be tedious, it is essential to continuously update the software of our mobile devices and all the installed applications. Every day new software vulnerabilities are discovered, which as soon as they are discovered can be used to attack us. Companies...
Bloqueo con contraseña
Utiliza siempre contraseña para desbloquear el dispositivo en vez del patrón. Cambiala con frecuencia.
Usa Find My Device o Buscar de Apple
Úsalas para poder localizar, bloquear y borrar nuestro dispositivo en caso de pérdida o robo.
Automatic lock
When we stop using our device, it should automatically lock after about 30 seconds. Más consejos
Bloqueo automático
Se recomienda que la pantalla se bloquee después de 30 segundos de inactividad.
Secure app stores
When installing an application on our device, we must always use official means such as the Apple App Store or Android Google Play. If we download the application from a third-party website, we run the risk of malware being installed. Más consejos
Bluetooth and NFC off
The bluetooth and the NFC of our device help us to connect to other devices in our day to day; but it can also be used by cybercriminals in a way that we do not want, so we should only activate it when we are going to use it. As these are two gateways to our device,...