How to Prepare your Android Phone to be theft proof!!

Page content:

In this busy world, it is sometimes hard to keep track of the things and we usually forget some things even if we do them regularly. This might sometimes bring great losses upon you. And sometimes your things may be lost or stolen by someone. It is easy to forget small things, but if it is your android phone your heart might stop literally right? Your device may contain confidential and compromising data which once lost or fall in wrong hands will bring hell upon you. So you have to make your android device theft proof. Here are a few tips that will make your android device theft proof.

TIPS TO MAKE YOUR ANDROID DEVICE THEFT PROOF

android-device-manager

ENABLE ANDROID DEVICE MANAGER

If your android device is stolen or lost, it is highly impossible to track down your device unless you got a anti-theft or device tracking app installed on your device. If you have some important data on the device which is highly confidential then it is necessary to remote wipe your device as well. These requirements can be full filled by the anti-theft apps found in the play store.

You can use the native Android device manager officially provided by Google itself to track and locate your device using GPS and data connection. If you want some greater flexibility then you can try some other tracking apps which might satisfy your needs. Always enable remote wipe in case you need to wipe all the data on your lost device including the data on your SD card.

Download the Android Device Manager from the Playstore link provided below:

  Download Android Device Manager

You can track your lost device from the Android device manager website and can do remote operations on your device. Click the below link and log in with your Google account to track your device.

 ANDROID DEVICE MANAGER

v

INSTALL CERBERUS APP

If you’re not satisfied with the Android device manager and want to have additional features to track down your device, then Cerberus is the perfect app for tracking your device. Cerberus is a complete anti-theft application, the best protection you can get to recover your misplaced, lost or stolen Android device. The app is for free trial for one week, then you can buy a lifetime license for a small price (2.99€) from within the application: no monthly or yearly fees, just a one-time payment. License is associated to your Cerberus account, if you have multiple devices you can use all of them (up to 5) with the same account.

What the app offers:

It has three ways to protect your device: –

  • Remote control through the website http://www.cerberusapp.com.
  • Remote control via text messages.
  • SIM Checker (for devices that have a SIM card): you will automatically receive alerts if someone uses your phone with an unauthorized SIM card
Remote Control features:
  • Locate and track it.
  • Start a loud alarm, even if the device is set to silent mode.
  • Wipe the internal memory and the SD card.
  • Hide Cerberus from the app drawer.
  • Lock the device with a code.
  • Record audio from the microphone.
  • Get a list of last calls sent and received.
  • Get information about network and operator the device is connected to.
  • And much more!

Cerberus automatically enables GPS if it is off when you try to localize your device (only on Android < 2.3.3) and you can protect it from unauthorized uninstalling – more info in the app configuration. The app works even if the device does not have an internet connection thanks to remote control by sms messages. Also, the SIM Checker feature allows you to know the new number to send texts to, if the SIM card is changed. Texts received and sent for Cerberus remote control will not start any notification and will not appear in the Messages application.

Cerberus does not drain the battery because there is no background service running: it will activate only if there is a remote control request and will stop afterwards. Download the Cerberus app from the Playstore link provided below.

  Download Cerberus anti theft

locksreen-lock

USE LOCKSCREEN PASSWORD

Some people are too lazy to type a 4 digit pin or a pattern lock, so they leave their android device without any protection at the lock screen itself. Their device is an open book to everyone when the device is lost or un-attended compromising all the private data stored in the device.

When coming to security prevention is better than the aftermath. The security is too important for a smart phone which holds a large amount of personal data like pictures, videos, passwords etc… You should always try to prevent intruders from accessing your data rather than grieving upon your wrong decision later on. A lock screen password or pin ensures your device’s security at the initial point itself.

In addition to using a PIN or password, you can secure any device running ICS or newer versions by using Face Unlock. This security feature hasn’t exactly been accurate but it builds a stronger security to your device. A pattern lock can be set to access the device by drawing a specific pattern on the touch screen. These features avoid security lapses that are caused by the smudges on the touch screen.

android-encryption

ENCRYPT DEVICE DATA

If you want more security on your android device and don’t want the data on your phone fall in wrong hands then you might have to encrypt your device which will scramble all your data and you alone can access the data. The encryption process is time taking and may take upto an hour depending on the data on your device. So it is recommended to have a full charge on your device before you start encrypting your device.

Before encrypting the device you have to setup a lockscreen on your device to confirm your identity. You have to plug your device to the AC outlet for the entire time of encryption. To Encrypt your device Open device Settings » Security Settings » Encrypt Phone.

The phone will ask for your confirmation as the encryption process is irreversible and you can only decrypt it by performing a factory reset. Confirm the process and wait for the process to complete. You will now have a encrypted device with full security.

Leave a Reply