Phones, tablets and watches routinely store and transmit personal information, so it’s important that each device is configured for maximum security. If you have a device you’re unsure of, see your data plan carrier for assistance if needed.
Use the following suggestions:
Find your device:
First, software (Find My iPhone or Android Device Manager) must be installed and active on the device and you must have signed into these services prior to losing the device for this to work.
With some devices, you can also ring and/or lock the device with a password, even if you hadn't protected the device with a password before it was lost.
Automatically wipe the data after 10 incorrect password attempts.
If your device cannot be recovered, you can remotely wipe data if you’ve installed the needed software (Find My iPhone, or Android Device Manager) .
Get control over data and location tracking:
Some apps track your location, even when you're not using them. Disabling these services provides more privacy, however be aware some apps require location services to function properly.
Don’t allow browsers to store information such as usernames, passwords, addresses, etc.
Prevent the installation of apps from unknown sources:
As a rule, you should only install apps from trusted sources, like the Apple App Store or Google Play store. Apple devices are configured to ensure apps are only downloaded from the App Store or a trusted enterprise via secure certificates, and that cannot be changed. Other operating systems such as Android may require a change in phone settings to disallow the downloading of information from unknown sources.
Don't jailbreak/root your device:
Sometimes people jailbreak, or root, mobile operating systems to achieve escalation of privilege on the device. By gaining greater privilege on the device, it becomes easier to customize. However, escalation of privilege also makes the device easier to infect or compromise. Anti-malware software becomes more of a necessity when devices are jailbroken.