{"id":4166,"date":"2019-09-23T09:04:06","date_gmt":"2019-09-23T16:04:06","guid":{"rendered":"https:\/\/www.realtyexecutives.com\/blog\/?p=4166"},"modified":"2019-10-03T13:16:44","modified_gmt":"2019-10-03T20:16:44","slug":"five-tips-for-keeping-mobile-data-safe","status":"publish","type":"post","link":"https:\/\/www.realtyexecutives.com\/blog\/five-tips-for-keeping-mobile-data-safe","title":{"rendered":"Five Tips For Keeping Mobile Data Safe"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignright\"><img decoding=\"async\" loading=\"lazy\" width=\"450\" height=\"300\" src=\"https:\/\/www.realtyexecutives.com\/blog\/wp-content\/uploads\/2019\/09\/unlocked-smartphone-lock-internet-phone-hand-business-people-press-picture-id963577994.jpg\" alt=\"\" class=\"wp-image-4167\" srcset=\"https:\/\/www.realtyexecutives.com\/blog\/wp-content\/uploads\/2019\/09\/unlocked-smartphone-lock-internet-phone-hand-business-people-press-picture-id963577994.jpg 450w, https:\/\/www.realtyexecutives.com\/blog\/wp-content\/uploads\/2019\/09\/unlocked-smartphone-lock-internet-phone-hand-business-people-press-picture-id963577994-300x200.jpg 300w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><\/div>\n\n\n\n<p><strong>1. Have a Security Plan And Follow It<\/strong><\/p>\n\n\n\n<p>All mobile phones and tablets used for business should be password-protected. Even better, use bio-metric authentication, such as a fingerprint or face scan, which cannot be replicated. Bio-metrics also make a strong password for apps.<\/p>\n\n\n\n<p>Use a password manager to generate and store a different password for every account.<\/p>\n\n\n\n<p>Know which data and apps are on a device and remove any apps that are not necessary for business. While the user may see a functioning app, like a flashlight or game, in the background, the program may be secretly sending information to a third party. Domingo Guerra, co-founder and president at mobile security firm Appthority, refers to these apps as \u201chospital gown\u201d threats. The programs appear to be legitimate upfront and are even distributed in the major app stores, but they have a security gap in the back end. To be sure, only install apps from reputable developers and services, such as the&nbsp;<a href=\"https:\/\/www.apple.com\/ios\/app-store\/\" target=\"_blank\" rel=\"noreferrer noopener\">Apple App Store<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/play.google.com\/store\" target=\"_blank\" rel=\"noreferrer noopener\">Google Play<\/a>.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>Be aware of who is around you when you\u2019re on your phone. Restaurant table tops are a favorite place to snatch phones. If you carry a purse, keep your phone zipped inside when not in use, and be aware that many purses are snatched in hopes of getting a wallet and cell phone.<\/p>\n\n\n\n<p><strong>2. Practice Good WiFi &amp; Charging Etiquette<\/strong><\/p>\n\n\n\n<p>That free WiFi at the coffee shop is tempting because it allows you to use data without tapping into your wireless plan. But in most cases, these networks are not secure, so it\u2019s best to avoid when accessing accounts with sensitive information, such as your business email, transaction platform or financial accounts.<\/p>\n\n\n\n<p>Additionally, public WiFi networks are open to \u201cman in the middle\u201d hacks, where a thief uses a portable device to fool you into logging onto a legitimate looking network, which can be used to intercept every piece of data coming to and from your device.<\/p>\n\n\n\n<p>Be cautious about charging your devices at public USB ports. Data thieves can use these ports to place malware on your phone and harvest sensitive data.<\/p>\n\n\n\n<p><strong>3. Have A Plan When Things Go Wrong<\/strong><\/p>\n\n\n\n<p>Plan ahead for the loss or theft of a device, so you\u2019ll be ready to quickly shut off access to your accounts and block the retrieval of sensitive data from your phone.<\/p>\n\n\n\n<p>If you have an iPhone, set it to delete data after 10 incorrect attempts to enter the passcode.<\/p>\n\n\n\n<p>Have the \u201c<a href=\"https:\/\/support.apple.com\/explore\/find-my-iphone-ipad-mac-watch\" target=\"_blank\" rel=\"noreferrer noopener\">find my phone<\/a>\u201d function activated so you can track your missing device.<\/p>\n\n\n\n<p>Create a plan for quickly changing the passwords to your email accounts and any other accounts in which a thief could access financial or other sensitive information.<\/p>\n\n\n\n<p>Finally, alert your wireless provider that your phone was stolen. The&nbsp;<a href=\"https:\/\/www.ftc.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">Federal Trade Commission<\/a>&nbsp;recommends that you make this call as soon as you know your device is missing. Your phone company can permanently or temporarily disable the SIM card to stop someone from using the device for calls or the internet. It helps too if you have a record of your phone\u2019s serial number or IMEI number (a unique identifier for your phone).<\/p>\n\n\n\n<p><strong>4. Keep Your Device Up-To-Date &amp; Back Up Your Data<\/strong><\/p>\n\n\n\n<p>The major mobile phone makers such as Apple, Samsung and LG release operating system updates that provide protection against the latest malware threats. By keeping your device updated, you\u2019ll increase your chances of staying safe.<\/p>\n\n\n\n<p>When an agent\u2019s entire business is run off their phone, it\u2019s especially important to have it backed up often and preferably automatically. That way, if the phone goes missing, the agent can quickly transfer to a new device without an interruption in business.<\/p>\n\n\n\n<p>Archive photos, videos and other irreplaceable data externally, such as in the cloud, which will free up space that your cellphone may require for upgrades.<\/p>\n\n\n\n<p><strong>5. Help Clients Protect Their Data<\/strong><\/p>\n\n\n\n<p>Data security is important for both agents and their clients. As you explain the buying or selling process to a client, use the opportunity to educate them about precautions they should be taking to keep their data safe.<\/p>\n\n\n\n<p>A good place to start is the security of their email accounts. Research has shown that most people use weak or duplicate passwords on their personal accounts, which can be easily absconded through spoofing or social engineering, such as when a scammer poses as a trusted contact.<\/p>\n\n\n\n<p>Many people do not realize that once a cyber criminal has their email username and password, the thief may be able to gain access to their other accounts through password reset requests.<\/p>\n\n\n\n<p>While the dotloop platform does not require clients to enter financially sensitive information like credit card or social security numbers,&nbsp;<a href=\"https:\/\/www.dotloop.com\/security\/\" target=\"_blank\" rel=\"noreferrer noopener\">dotloop takes data security and safety very seriously<\/a>. Our security team maintains industry-standard safeguards against data incursions. Working through the platform, agents can be confident that their sensitive information will be safe from hackers and securely archived.<\/p>\n\n\n\n<p>Lastly, dotloop customers own the data they put on the platform. This includes all customer data, from user information to transaction data. Dotloop doesn\u2019t share it with other Zillow entities without an agent\u2019s permission and won\u2019t disclose customer information except as required by law. Check out our&nbsp;<a href=\"https:\/\/www.dotloop.com\/blog\/2015\/12\/dotloop-announces-new-data-privacy-guarantee\/\" target=\"_blank\" rel=\"noreferrer noopener\">Data Privacy Guarantee<\/a>&nbsp;to learn more.<\/p>\n\n\n\n<p>Play it safe \u2014 use the industry\u2019s secure end-to-end transaction solution, practice good password protection habits and \u201cthink before you app\u201d to keep your most sensitive data protected.<\/p>\n\n\n\n<p><em>originally published by dotloop.com.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. Have a Security Plan And Follow It All mobile phones and tablets used for business should be password-protected. Even better, use bio-metric authentication, such as a fingerprint or face scan, which cannot be replicated. Bio-metrics also make a strong password for apps. Use a password manager to generate and store a different password for &hellip; <a href=\"https:\/\/www.realtyexecutives.com\/blog\/five-tips-for-keeping-mobile-data-safe\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Five Tips For Keeping Mobile Data Safe<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[835,829],"tags":[771,765,1726,1725,212],"yst_prominent_words":[1716,1721,1720,1611,1710,1715,1571,1724,1722,1714,1585,1718,1713,1719,1723,1567,1283,1717,1712,1711],"_links":{"self":[{"href":"https:\/\/www.realtyexecutives.com\/blog\/wp-json\/wp\/v2\/posts\/4166"}],"collection":[{"href":"https:\/\/www.realtyexecutives.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.realtyexecutives.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.realtyexecutives.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.realtyexecutives.com\/blog\/wp-json\/wp\/v2\/comments?post=4166"}],"version-history":[{"count":2,"href":"https:\/\/www.realtyexecutives.com\/blog\/wp-json\/wp\/v2\/posts\/4166\/revisions"}],"predecessor-version":[{"id":4185,"href":"https:\/\/www.realtyexecutives.com\/blog\/wp-json\/wp\/v2\/posts\/4166\/revisions\/4185"}],"wp:attachment":[{"href":"https:\/\/www.realtyexecutives.com\/blog\/wp-json\/wp\/v2\/media?parent=4166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.realtyexecutives.com\/blog\/wp-json\/wp\/v2\/categories?post=4166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.realtyexecutives.com\/blog\/wp-json\/wp\/v2\/tags?post=4166"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/www.realtyexecutives.com\/blog\/wp-json\/wp\/v2\/yst_prominent_words?post=4166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}