SlideShare a Scribd company logo
1 of 2
Download to read offline
Traveling with Smartphones - Do’s and Don’ts
To Do When Traveling iPhone Android
Traveling Safely With Smartphones Traveling Safely with Smartphones 061614_1400
•	 Bring a dedicated loaner device; do not bring your personal smartphone
•	 Use smartphones with removable batteries when possible
•	 Assume that all information on your device could be compromised while traveling in a foreign country
•	 Avoid social media, banking, and other sensitive sites while traveling
•	 Never store passwords or sensitive information on your smartphone
•	 Do not click on links in text messages or emails - especially from people you do not know
•	 Do not jailbreak or root your smartphone
•	 Examine all mobile devices for evidence of tampering upon your return
Ensure that your phone’s
software is up to date
- Use apps to ensure that the
software on your smartphone is
up to date.
Protect your phone against
Malware
- Like a computer, your phone is
vulnerable to malware. Use
anti-virus apps to ensure that your
phone is protected.
Set your phone to lock
automatically
- In case you lose your device, you
want your smartphone to lock
automatically to prevent physical
access.
Check to see if your
software is up to date;
if not, your iPhone will
prompt you to download
the latest software
Use the AVG
Antivirus FREE
app for Android
Click Scan
Now to scan for
viruses
Check to see if your software is up to
date; if not, your phone will prompt
you to download the latest software
Go to Settings >
Display > Sleep
Set the phone to
sleep after 1
minute
Go to Settings >
Security >
Automatically
Lock immediately
Go to settings > General > Auto-Lock
Set the Auto-Lock to 1 Minute
Go to Settings >
About Phone >
System Updates
Go to Settings >
general > Software
Update
Use the Lookout app for iPhone; Go to Security >
Process Monitor to see if malicious processes are
running on your iphone
A Parent’s Guide to Internet Safety
Privacy Rights Clearinghouse
Microsoft Safety and Security
Online Guardian
www.fbi.gov/stats-services/publications/parent-guide
www.privacyrights.org/fs/fs18-cyb.htm
www.microsoft.com/security/online-privacy/social-network
www.onguardonline.gov/topics/social-networking-sites.aspx
www.novetta.com
Useful Links
Traveling with Smartphones - Best Practices
To Do When Traveling iPhone Android
Traveling Safely With Smartphones Traveling Safely with Smartphones 061614_1400
•	 Assume that your phone may be scanned forensically when you enter a foreign country
•	 If possible, encrypt the data on your phone
•	 Consider installing a VPN on your device as a more secure alternative to saving information locally
Disable Wi-Fi and Bluetooth
- Disable Wi-Fi and Bluetooth on
your smartphone; Wi-Fi and
Bluetooth can render your
smartphone vulnerable to
malware and hacking.
Use a 10+ character password or
Screen Lock Pattern
- Short passwords are vulnerable
to brute force attacks. Chose a
password with a combination of
letters, numbers, and symbols. If
using a Screen Lock Pattern,
choose a complicated pattern.
Recover lost or stolen smart-
phones and wipe data
- Find my iPhone and Cerebus can
locate lost devices and wipe data
remotely from lost or stolen
smartphones.
Go to Settings >
Security >
Screen Lock >
create a screen
lock pattern
Use the Cerebus app to
recover lost or stolen
Android Smartphones and
wipe data remotely from
the device memory and SD
card
Go to Settings
> Wireless &
Networks >
turn Wi-Fi off
Go to Settings >
Bluetooth > turn
Bluetooth off
Go to Settings > Bluetooth >
turn Bluetooth off
Go to Settings >
Passcode Lock > Turn
Off Simple Passcode
Enter a new passcode
with 10+ characters,
symbols, and
numbers
Use the Find My
iPhone app to
recover lost or stolen
iPhone smartphones
Go to Settings >
Wi-Fi > turn
Wi-Fi off

More Related Content

What's hot

Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneHasani Jaali
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
The Attentions to Protect your Privacy on Internet
The Attentions to Protect your Privacy on InternetThe Attentions to Protect your Privacy on Internet
The Attentions to Protect your Privacy on InternetFord King
 
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!iFixScreens
 
Mobile App Security: A Review
Mobile App Security: A ReviewMobile App Security: A Review
Mobile App Security: A ReviewUmang Singh
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service securityG Prachi
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital SecurityUjjwal Acharya
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkBlue Coat
 
Mobile protection
Mobile protection Mobile protection
Mobile protection preetpatel72
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for studentsAkhil Nadh PC
 
Electronic survelliance group_5
Electronic survelliance group_5Electronic survelliance group_5
Electronic survelliance group_5Damian John
 
Smartphone security
Smartphone securitySmartphone security
Smartphone securityMuthu Kumar
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – andRandyBett
 
Guide on How to keep your data safe when traveling to the UK
Guide on How to keep your data safe when traveling to the UKGuide on How to keep your data safe when traveling to the UK
Guide on How to keep your data safe when traveling to the UKDr Ghaiath Hussein
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone securityManish Gupta
 

What's hot (20)

Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your Smartphone
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
The Attentions to Protect your Privacy on Internet
The Attentions to Protect your Privacy on InternetThe Attentions to Protect your Privacy on Internet
The Attentions to Protect your Privacy on Internet
 
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!
 
Security risks with fake apps
Security risks with fake appsSecurity risks with fake apps
Security risks with fake apps
 
Mobile App Security: A Review
Mobile App Security: A ReviewMobile App Security: A Review
Mobile App Security: A Review
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service security
 
Hackers
HackersHackers
Hackers
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You Think
 
pegasus spyware
pegasus spywarepegasus spyware
pegasus spyware
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Electronic survelliance group_5
Electronic survelliance group_5Electronic survelliance group_5
Electronic survelliance group_5
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – and
 
How To Identify A Fake App In Playstore
How To Identify A Fake App In PlaystoreHow To Identify A Fake App In Playstore
How To Identify A Fake App In Playstore
 
Guide on How to keep your data safe when traveling to the UK
Guide on How to keep your data safe when traveling to the UKGuide on How to keep your data safe when traveling to the UK
Guide on How to keep your data safe when traveling to the UK
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 

Viewers also liked (12)

#HootUpFFIA
#HootUpFFIA#HootUpFFIA
#HootUpFFIA
 
King henry the sixth(1)
King henry the sixth(1)King henry the sixth(1)
King henry the sixth(1)
 
Espacios para ti. Acondicionamiento
Espacios para ti. AcondicionamientoEspacios para ti. Acondicionamiento
Espacios para ti. Acondicionamiento
 
Trabajo seminario de proyectos dibujo
Trabajo seminario de proyectos  dibujoTrabajo seminario de proyectos  dibujo
Trabajo seminario de proyectos dibujo
 
Dan Zaoui : "De Rabbi Jacob à nos jours"
Dan Zaoui : "De Rabbi Jacob à nos jours"Dan Zaoui : "De Rabbi Jacob à nos jours"
Dan Zaoui : "De Rabbi Jacob à nos jours"
 
Μικρομοριακού Βάρους Ηπαρίνες
Μικρομοριακού Βάρους ΗπαρίνεςΜικρομοριακού Βάρους Ηπαρίνες
Μικρομοριακού Βάρους Ηπαρίνες
 
Διαγνωστική προσέγγιση αναιμιών
Διαγνωστική προσέγγιση αναιμιώνΔιαγνωστική προσέγγιση αναιμιών
Διαγνωστική προσέγγιση αναιμιών
 
YoyoScience Grade1 Science Notes: LS1.A
YoyoScience Grade1 Science Notes: LS1.AYoyoScience Grade1 Science Notes: LS1.A
YoyoScience Grade1 Science Notes: LS1.A
 
Θρόμβωση
ΘρόμβωσηΘρόμβωση
Θρόμβωση
 
Arte gótico Arquitectura
Arte gótico ArquitecturaArte gótico Arquitectura
Arte gótico Arquitectura
 
Práctica 5. identificación de lípidos.
Práctica 5. identificación de lípidos.Práctica 5. identificación de lípidos.
Práctica 5. identificación de lípidos.
 
Cost of capital
Cost of capitalCost of capital
Cost of capital
 

Similar to Traveling Safely with Smartphones 061614

Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)Hîmãlåy Làdhä
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14Naval OPSEC
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx4Freedom Mobile
 
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Information Security Awareness Group
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureHeimdal Security
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for androidiYogi
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
How to view search history on iPhone?
How to view search history on iPhone?How to view search history on iPhone?
How to view search history on iPhone?SpymasterPro1
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsKevin Fream
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityTorian Group
 
Steps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossSteps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossWireless Solutions NY
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your usersSimpliv LLC
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and securityImran Khan
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldEmil Tan
 
Mobile security and what it means to you bb
Mobile security and what it means to you bbMobile security and what it means to you bb
Mobile security and what it means to you bbtechnosyah
 

Similar to Traveling Safely with Smartphones 061614 (20)

Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
How to view search history on iPhone?
How to view search history on iPhone?How to view search history on iPhone?
How to view search history on iPhone?
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Steps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossSteps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or Loss
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Modicare Mighty Guard
Modicare Mighty GuardModicare Mighty Guard
Modicare Mighty Guard
 
Mobile security
Mobile security Mobile security
Mobile security
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and security
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 
Mobile security and what it means to you bb
Mobile security and what it means to you bbMobile security and what it means to you bb
Mobile security and what it means to you bb
 

More from McAlester Army Ammunition Plant (6)

Photo Sharing Services Smart Card 060513
Photo Sharing Services Smart Card 060513Photo Sharing Services Smart Card 060513
Photo Sharing Services Smart Card 060513
 
Twitter Smart Card 070314
Twitter Smart Card 070314Twitter Smart Card 070314
Twitter Smart Card 070314
 
LinkedIn Smart Card 070314
LinkedIn Smart Card 070314LinkedIn Smart Card 070314
LinkedIn Smart Card 070314
 
Google+ Smart Card 070314
Google+ Smart Card 070314Google+ Smart Card 070314
Google+ Smart Card 070314
 
Facebook Smart Card 070314
Facebook Smart Card 070314Facebook Smart Card 070314
Facebook Smart Card 070314
 
2016 02 USAJOBS application process changes~996
2016 02 USAJOBS application process changes~9962016 02 USAJOBS application process changes~996
2016 02 USAJOBS application process changes~996
 

Recently uploaded

Amplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing ServicesAmplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing ServicesNetqom Solutions
 
Top 5 Ways To Use Reddit for SEO SEO Expert in USA - Macaw Digital
Top 5 Ways To Use Reddit for SEO  SEO Expert in USA - Macaw DigitalTop 5 Ways To Use Reddit for SEO  SEO Expert in USA - Macaw Digital
Top 5 Ways To Use Reddit for SEO SEO Expert in USA - Macaw Digitalmacawdigitalseo2023
 
The--Fraud: Netflix Original Media Pitch
The--Fraud: Netflix Original Media PitchThe--Fraud: Netflix Original Media Pitch
The--Fraud: Netflix Original Media Pitch17mos052
 
Unveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the StarsUnveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the StarsSocioCosmos
 
Dubai Calls Girls Busty Babes O525547819 Call Girls In Dubai
Dubai Calls Girls Busty Babes O525547819 Call Girls In DubaiDubai Calls Girls Busty Babes O525547819 Call Girls In Dubai
Dubai Calls Girls Busty Babes O525547819 Call Girls In Dubaikojalkojal131
 
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECTTHE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT17mos052
 
Values Newsletter teamwork section 2023.pdf
Values Newsletter teamwork section 2023.pdfValues Newsletter teamwork section 2023.pdf
Values Newsletter teamwork section 2023.pdfSoftServe HRM
 

Recently uploaded (7)

Amplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing ServicesAmplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing Services
 
Top 5 Ways To Use Reddit for SEO SEO Expert in USA - Macaw Digital
Top 5 Ways To Use Reddit for SEO  SEO Expert in USA - Macaw DigitalTop 5 Ways To Use Reddit for SEO  SEO Expert in USA - Macaw Digital
Top 5 Ways To Use Reddit for SEO SEO Expert in USA - Macaw Digital
 
The--Fraud: Netflix Original Media Pitch
The--Fraud: Netflix Original Media PitchThe--Fraud: Netflix Original Media Pitch
The--Fraud: Netflix Original Media Pitch
 
Unveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the StarsUnveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the Stars
 
Dubai Calls Girls Busty Babes O525547819 Call Girls In Dubai
Dubai Calls Girls Busty Babes O525547819 Call Girls In DubaiDubai Calls Girls Busty Babes O525547819 Call Girls In Dubai
Dubai Calls Girls Busty Babes O525547819 Call Girls In Dubai
 
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECTTHE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
 
Values Newsletter teamwork section 2023.pdf
Values Newsletter teamwork section 2023.pdfValues Newsletter teamwork section 2023.pdf
Values Newsletter teamwork section 2023.pdf
 

Traveling Safely with Smartphones 061614

  • 1. Traveling with Smartphones - Do’s and Don’ts To Do When Traveling iPhone Android Traveling Safely With Smartphones Traveling Safely with Smartphones 061614_1400 • Bring a dedicated loaner device; do not bring your personal smartphone • Use smartphones with removable batteries when possible • Assume that all information on your device could be compromised while traveling in a foreign country • Avoid social media, banking, and other sensitive sites while traveling • Never store passwords or sensitive information on your smartphone • Do not click on links in text messages or emails - especially from people you do not know • Do not jailbreak or root your smartphone • Examine all mobile devices for evidence of tampering upon your return Ensure that your phone’s software is up to date - Use apps to ensure that the software on your smartphone is up to date. Protect your phone against Malware - Like a computer, your phone is vulnerable to malware. Use anti-virus apps to ensure that your phone is protected. Set your phone to lock automatically - In case you lose your device, you want your smartphone to lock automatically to prevent physical access. Check to see if your software is up to date; if not, your iPhone will prompt you to download the latest software Use the AVG Antivirus FREE app for Android Click Scan Now to scan for viruses Check to see if your software is up to date; if not, your phone will prompt you to download the latest software Go to Settings > Display > Sleep Set the phone to sleep after 1 minute Go to Settings > Security > Automatically Lock immediately Go to settings > General > Auto-Lock Set the Auto-Lock to 1 Minute Go to Settings > About Phone > System Updates Go to Settings > general > Software Update Use the Lookout app for iPhone; Go to Security > Process Monitor to see if malicious processes are running on your iphone
  • 2. A Parent’s Guide to Internet Safety Privacy Rights Clearinghouse Microsoft Safety and Security Online Guardian www.fbi.gov/stats-services/publications/parent-guide www.privacyrights.org/fs/fs18-cyb.htm www.microsoft.com/security/online-privacy/social-network www.onguardonline.gov/topics/social-networking-sites.aspx www.novetta.com Useful Links Traveling with Smartphones - Best Practices To Do When Traveling iPhone Android Traveling Safely With Smartphones Traveling Safely with Smartphones 061614_1400 • Assume that your phone may be scanned forensically when you enter a foreign country • If possible, encrypt the data on your phone • Consider installing a VPN on your device as a more secure alternative to saving information locally Disable Wi-Fi and Bluetooth - Disable Wi-Fi and Bluetooth on your smartphone; Wi-Fi and Bluetooth can render your smartphone vulnerable to malware and hacking. Use a 10+ character password or Screen Lock Pattern - Short passwords are vulnerable to brute force attacks. Chose a password with a combination of letters, numbers, and symbols. If using a Screen Lock Pattern, choose a complicated pattern. Recover lost or stolen smart- phones and wipe data - Find my iPhone and Cerebus can locate lost devices and wipe data remotely from lost or stolen smartphones. Go to Settings > Security > Screen Lock > create a screen lock pattern Use the Cerebus app to recover lost or stolen Android Smartphones and wipe data remotely from the device memory and SD card Go to Settings > Wireless & Networks > turn Wi-Fi off Go to Settings > Bluetooth > turn Bluetooth off Go to Settings > Bluetooth > turn Bluetooth off Go to Settings > Passcode Lock > Turn Off Simple Passcode Enter a new passcode with 10+ characters, symbols, and numbers Use the Find My iPhone app to recover lost or stolen iPhone smartphones Go to Settings > Wi-Fi > turn Wi-Fi off