{"id":454,"date":"2013-10-16T12:52:11","date_gmt":"2013-10-16T11:52:11","guid":{"rendered":"http:\/\/blogs.iriss.org.uk\/autismcard\/?p=454"},"modified":"2013-10-16T17:56:16","modified_gmt":"2013-10-16T16:56:16","slug":"data-devices-security","status":"publish","type":"post","link":"https:\/\/blogs.iriss.org.uk\/autismcard\/2013\/10\/16\/data-devices-security\/","title":{"rendered":"How to: Mobile device security"},"content":{"rendered":"

Preventing unauthorised use by ‘locking’<\/h2>\n
\"Lock<\/a>
Image By: Carlos Luz<\/a><\/figcaption><\/figure>\n

Most smartphones\/tablets have a way of locking the screen so that access to your device is protected by e.g. a password, pin number\/code, gesture, face and fingerprint recognition,… new methods are coming along all the time. The lock will usually start when you haven’t used your device for a few minutes – sometimes you can choose what length of time this should be – shorter is more secure. Locking is strongly recommended<\/strong>, especially if you are storing sensitive personal data on your device or traveling. Locking will prevent others from just picking up your unattended phone and using it without your knowledge. Be careful though that you choose a method of locking that you’ll be able to remember how to use or you’ll lock yourself out of your own device!\u00a0If you’re clumsy, locking also helps stop you unintentionally press buttons or launching apps e.g. when the device is in a pocket or bag, helps prevent you making accidental phone calls<\/a> or draining your battery.<\/p>\n