ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Lock Your Android Device

b2ap3_thumbnail_got_that_andoid_on_lock_400.jpgYou’ve got a lot of sensitive information stored on your mobile device. If it were to fall into the wrong hands, you wouldn’t want the new user to have easy access to it. This is why every mobile device should be locked. Here’s how to lock your Android device, as well as how to pick out a lock screen setting that’s right for you.

Locking the device should be a standard security practice for every user. Yet, some mobile users choose not to enable their lock screen because they view it as a hassle. Granted, with your phone locked, it will take you a few extra moments to access it, but all things considered, it’s worth the extra effort. Plus, it won’t take too long before going through the motions of unlocking your phone will become second nature.

To enable the lock screen for your Android device, go to Settings > My Device > Lock screen > Screen lock. From here, you will be given multiple screen lock settings to choose from.

android menu

It’s important that you pick out a lock screen setting that fits your security needs and lifestyle. While every lock screen setting provides some level of security (which is better than having no security), some settings require more effort to access than others.

Pattern
Due to the fact that the pattern lock screen amounts to a couple of swipes that give the user quick access, Pattern is one of the more popular options. Pattern displays a 3-by-3 grid of dots and the user must connect the dots (la-la-la) with the correct pattern in order to unlock the screen. When using Pattern, it’s recommended to choose a pattern that’s not overly simple. Otherwise, a thief may be able to guess the pattern by investigating the swipe marks left on the screen.

PIN
With PIN, the user must enter a 4-to-17 digit pin number of their choosing in order to unlock the device. Like choosing a password for your online accounts, it’s recommended that you choose a PIN number that’s not easy to guess (like 1,2,3,4).

Password
A regular password has the potential to be more secure than PIN or Pattern, depending on the complexity of the password that’s chosen. However, the downside to using Password is that it can be the most time-consuming way to unlock your phone.
Face Unlock

android biometrics

Newer Android devices with front-facing cameras come equipped with the Face Unlock feature. This is a fun and futuristic feature that captures an image of your face in order to grant you access. As cool as Face Unlock sounds, it may not work so smoothly in a low-light setting. Plus, the security may be compromised if the person attempting to hack your phone looks like you (your doppelganger), or happens to have a portrait of you handy.

Of course, locking your device’s screen will only protect your information from petty thieves and curious bystanders. In the hands of a professional thief, they may possess tools that can bypass the lock screen, or simply wipe the device’s data altogether without having to mess with the lock screen. For more heavy-duty mobile security solutions that will protect your data from worst-case-theft scenarios, give ClearView IT a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Data Backup Ransomware Smartphone communications Smartphones Microsoft Office Small Business Upgrade Network Mobile Devices Data Recovery Managed IT Services Communication Productivity Quick Tips Social Media Users VoIP Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Passwords Holiday Covid-19 Disaster Recovery Apps IT Support Browser Windows 10 Managed Service Cloud Computing Outsourced IT Miscellaneous Internet of Things Managed Service Provider Remote Work Data Management Government Saving Money Operating System Artificial Intelligence Managed IT services Networking Windows Workplace Strategy Gadgets Bandwidth Blockchain Encryption Server WiFi App Virtualization Information Spam Mobile Device Management Business Technology Remote History Employee/Employer Relationship Information Technology Gmail Office Budget Two-factor Authentication Office 365 Apple Health Cybercrime Access Control Analytics Conferencing Data Security Big Data Wi-Fi BDR Employer-Employee Relationship Compliance Document Management Voice over Internet Protocol Remote Computing Patch Management Save Money Help Desk Hacking Remote Monitoring Vendor Hacker IT Management Cost Management Training Firewall Retail Augmented Reality Legal Alert Word Data loss Data storage IBM Hiring/Firing Website Outlook Mobile Office Password Managed Services Project Management Applications BYOD Computing Vulnerabilities Vendor Management Hard Drive Money Search... Customer Service Best Practice Unified Threat Management Law Enforcement End of Support VPN iPhone Printer Education Cortana Update Content Filtering User Remote Workers Router Travel Paperless Office Windows 7 Virtual Reality Social Engineering Antivirus Free Resource Chrome The Internet of Things Cryptocurrency Black Market Maintenance YouTube Data Breach How To Cleaning Robot Laptop Mobile Computing Websites Meetings Marketing Mobility Monitoring Running Cable Healthcare Windows 11 Google Maps Social Scam Sports SaaS DDoS Storage Twitter Cooperation Computers How To Bitcoin Video Conferencing Microchip Flexibility Disaster Telephone Virtual Machines Tech Terms Computer Repair Managed IT Digital Lithium-ion battery Professional Services Hack HIPAA Excel Identity Theft Notifications Unified Communications Taxes Google Docs Processors Managed Services Provider Bluetooth Distributed Denial of Service Virtual Assistant Office Tips Virtual Private Network Private Cloud Memory Physical Security Current Events Processor Solutions PowerPoint Politics Wireless Technology Administration eWaste Machine Learning Settings Start Menu Images 101 Computer Care Integration Presentation Downloads Display Specifications IT Consultant Solid State Drive Vulnerability Downtime Safety Multi-factor Authentication Software as a Service Customer Relationship Management Employees Data Protection Co-Managed IT Virtual Desktop Drones Avoiding Downtime Chromebook Entertainment Experience Holidays Saving Time Automobile Relocation Displays Staffing Advertising Virtual Machine Error IP Address Optimization Bookmark Work/Life Balance Knowledge Reviews Tech Support Corporate Profile 2FA Telephony Term Employer Employee Relationship Workplace Teamwork Download Piracy Television HTML Data Storage Cabling Hypervisor Browsers G Suite Medical IT Nanotechnology In Internet of Things Shopping Tablet Hacks Mouse Paperless Network Congestion VoIP Google Play Tracking Scams SQL Server Upload Troubleshooting Software License Reliable Computing Writing Recovery PCI DSS Competition Licensing Social Network Humor Data Analysis Web Server Screen Reader Gig Economy SharePoint LiFi Business Communications Internet Service Provider Security Cameras Digital Payment Cables Entrepreneur Azure Trends Mobile Technology Devices Scalability Documents Regulations Compliance Worker Application Managed IT Service Customer Resource management Proactive IT Access Memes Fileless Malware Business Intelligence Administrator Tip of the week Text Messaging Bring Your Own Device Human Resources Time Management Net Neutrality Public Cloud Point of Sale Gamification Business Owner Company Culture Telephone System Regulations Securty Financial Data Risk Management Music Spyware Domains IT Directions Shortcuts Backup and Disaster Recovery Audit Desktop Google Apps File Sharing Content Electronic Medical Records Accountants Redundancy Telework Smartwatch Cache Communitications Be Proactive Microsoft 365 Database Botnet Rental Service Micrsooft Unified Threat Management Procurement Workers Inbound Marketing Health IT Equifax Flash FinTech Public Speaking CES Business Growth IT Assessment CCTV Workplace Strategies Tactics Hard Drive Disposal Telephone Systems Printing Streaming Media Touchscreen Supply Chain Management Keyboard Value Username Cyber security Computer Malfunction Electronic Payment Startup Freedom of Information Emergency Organization Hard Drives Google Wallet Vendor Mangement Smart Devices Navigation intranet Addiction email scam Banking Mobile Security Messenger Deep Learning Wireless Remote Working Samsung Shortcut Heating/Cooling Trend Micro User Tip Webcam Environment Legislation Phone System News AI Uninterrupted Power Supply Windows XP Digital Security Cameras Hosted Solution Business Mangement Electronic Health Records Evernote Smart Technology Social Networking Transportation Network Management Business Metrics Books Tablets Wasting Time eCommerce Proxy Server Modem Emails Fake News Language Society Videos Surveillance Supercomputer Service Level Agreement Computing Infrastructure Google Calendar Device security Reading Computer Accessories Monitors Virus Visible Light Communication Managing Costs Management Motion Sickness SSID Wireless Headphones Microsoft Excel Windows 8 Media Google Drive Development Tech Supply Chain Employer/Employee Relationships Going Green Business Cards Comparison

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?