Petrogram -Spring 2012 - (Page 6)
HandheldYou Lost Your Smartphone? Vulnerability What Would You Do if
How Can You Protect Yourself? So what can you do to protect yourself if your smartphone is lost or stolen? The most important steps you can take can be taken before you ever lose the device. Make sure to password protect your smartphone with a strong combination. Many users rely on something simple like the “four corners” of swipe keypads, or 1-2-34, or some simple variation. To make the password any kind of real deterrent, pick something less predictable yet still easy for you to remember: like an important date, or a more irregular geometric shape. In addition, you can choose to set up your phone so that the device will lock down or even wipe all data on the phone after several failed password attempts. This is a good way to prevent your data from being taken advantage of, but it also carries the risk that you may lose your data for good if you have not backed it up. What Do You Do if You Lose Your Smartphone? First take the obvious step of contacting your carrier. Secondly check with friends and family; see if it’s been left anywhere; call the phone and see if it rings in case you left it by the couch. There is every chance that the only thing that has happened is that you simply misplaced it and it’s in the care of either a very good friend or a very determined portion of your sofa. As valuable as these devices are, it must be said we often don’t treat them with the respect such an expensive investment truly deserves.
But what if worse comes to worst and the phone isn’t in Uncle Julius’s passenger seat and has been really lost or stolen?
Standard Security Procedures Many smartphones are issued by employers for work related purposes. If this is the case, your company will
Mark Price, Abilita
he smartphone may well be the defining device of our generation. A truly lightweight and portable computer that lets you surf the web, video conference with your friends, email, play songs, store your vital data and more. Blackberries, iPhones, Androids and assorted others give users a vast array of options with which to confront the digital world. With a single handheld device we can manage a number of tasks it took an entire office to accomplish – welcome to the future. But with that availability and popularity have come the usual concerns of vulnerability. As often as we use our smartphones, we don’t pay attention often enough to the huge amount of information we put into these devices. There’s the obvious information – our contact lists, calendars, notes about important meetings, email and more. But we often forget the peripheral yet vital data that sometimes gets saved: passwords to our bank accounts, apps that record data. Have you ever used a GPS navigation program on your smartphone? Many of them save favorite locations, which would make it fairly easy for a determined thief to find his way to your home.
6 | View past issues of Petrogram online at www.fpma.org.
Table of Contents for the Digital Edition of Petrogram -Spring 2012
Out and About the Industry
Won’t Pay, Won’t Go... What’s Next?
Advertisers’ Centerspread Marketplace
NACA Partnership with FPMA
Th e Power Within You
Meet the 2012 Sunshine Food and Fuel Expo Keynote Speaker
Index of Advertisers/Advertiser.com
Petrogram -Spring 2012
If you would like to try to load the digital publication without using Flash Player detection, please click here.