How to back up your Android data

There’s no denying that backing up your data is important. If you don’t, a cyberattack or hardware failure could wipe out invaluable personal and professional information. This doesn’t just apply to desktops and laptops. Android phones and tablets store plenty of important data, which means they need to be backed up, too. Take advantage of cloud services The best way to ensure your data is safe is backing it up in the cloud. When you power up your Android device for the first time, make sure to sign up for a Google account, this will give you access to 15GB of free Google Drive storage with additional space available for a monthly fee. Any Google Docs or Sheets file you create on your phone will automatically be saved to your Drive, so if you ever lose your phone, you can simply retrieve your files by signing in to your Google account from a different device. If you’re not a fan of Google services, you can always opt for other cloud storage services like Dropbox or Office 365. Back up your device settings Another great thing about Google Drive is you can back up your device’s settings and preferences. These include screen lock passcodes, display preferences, language options, and approved WiFi networks. To confirm all these settings are saved to your Google account, go to the “Backup” section in system settings and enable “Backup to Google Drive.” This way, if you ever switch to a new phone, you can simply restore all your device settings and preferences by signing into your Google account. Save app data If you have apps that contain important information, you can sync that data to your Drive. Simply return to the “Backup” section, look for “App data,” then enable the Automatic restore function. Keep your contacts Most contacts are saved on SIM cards or on the phone itself, so check if there’s a cloud syncing option in your Contacts app. If your phone doesn’t have this option, try third-party services like Contact Backup, which can be found on the Google Play Store. What if you don’t save your data in the cloud? Although we highly recommend cloud services for data retrieval, your phone’s SD card does retain some information after it’s been deleted. You can restore deleted files by connecting your card to a desktop computer and using specialized recovery software. But this can be a complicated process unless you team up with Android experts like us. For more services regarding data backup and mobile device management, call us today. We offer a wide array of solutions for Android phones. Published with permission from TechAdvisory.org. Source.

How to wipe data from your old smartphone

Our mobile phones contain some of our most private data. There are contact details, confidential business emails, financial information, and possibly even risqué pictures that you wouldn’t want falling into the wrong hands. Factory reset is one way to get rid of everything if you’re moving on from your old phone, but there are a few other things you must do first. 1. Encrypt your Android phone You can make sure unauthorized personnel don’t have access to your data by encrypting it, making it virtually unreadable. Those who own a newer phone will likely have their data encrypted by default, but if you’re unsure, you need to double-check. Simply go to the system settings in your phone and search for the Encryption option. The title and location will depend on which phone you’re using, but it should be easy to find. Once there, you’ll see whether your device is already encrypted or whether you should begin the encryption process. Keep in mind that it takes an hour or more to encrypt data, and you can’t use your device during that time. 2. Remove SIM card and storage cards Now that your data is encrypted, remove your SIM card and external memory cards. Both are linked to your identity and contain sensitive information so it would be best if they never left your possession. 3. Perform a factory reset You can now begin the actual data wiping process: Look for the Backup & reset section in your system settings where you will see the Factory data reset option. This is where you will remove data and accounts from your phone. It will ask you to either verify your fingerprint, or input your password, pattern, or PIN for protection before starting the process. 4. Sever ties to specific websites The final step is to manually remove your old device from Google and other websites it is associated with. Just go to the site, choose your device, and remove it from the list of Trusted devices. And don’t forget your password manager and multi-device authentication apps; sign in to those and sever any connections there as well. As long as you’ve followed these four handy steps, you’ll be safe when getting rid of an old mobile phone! But for those who are still anxious about their data, just give us a call. We’ll make sure to protect your files from prying eyes, and we’ll even provide valuable tips and tools to secure your new Android device. Published with permission from TechAdvisory.org. Source.

Battle of the mobile OS: Android vs. iOS

It normally takes you hours of watching phone reviews on YouTube to decide which model or brand to buy. And for your business, you assume that it’s pretty straightforward since your team will use it only for client communication. But with the multitude of efficient apps available for remote working nowadays, that is not the case anymore. Determine which mobile operating system (OS) is ideal for business use. Price Range Apple is a luxury brand, and the only way budget-conscious businesses can afford an iPhone is if they consider secondhand market or rely on older models. But of course, you would rather get a new phone that hasn’t been through previous repairs, carrying recurring problems, and one that isn’t outdated for app compatibility. Android is widely available for small-business rates and obviously triumphs in this category. Winner: Android phone Security Surely, there is a reason why iPhones cost so much. Apple products in general are known for their exquisite form and finish, which definitely adds to the cost, but don’t forget that Apple also places much emphasis on security. For instance, Apple is more strict about the apps it allows into the App Store when compared with Android. Nevertheless, both are still susceptible to malware, so try to be more cautious when downloading dodgy apps or programs. Winner: iPhone Customizability Android has always been superior when it comes to personalization. You can easily change the theme of the phone, modify home screen layout, add shortcuts and widgets, and even alter the user interface using launchers. With an iPhone, you may have the freedom to set backgrounds but there’s still restricted support for widgets. And as mentioned before, Android is more lax in allowing third-party installations for your default options. So if you think your company would benefit more from a personalized look, Android is the platform for you. Winner: Android phone Voice Assistants Siri may have wowed the public when it was first introduced, but Google Assistant has stayed true to its name as it progressed. The former remained basic by simply answering questions while the latter introduced several features, including seamless integration with other apps to make your life more convenient. For instance, if you have a meeting set in Google Calendar and Google Maps received a notification about the growing traffic in the area, Google Assistant will calculate the time it takes for you to get there and alert you beforehand. Fortunately for iPhone users, this virtual helper is also available on the App Store. Guess we can conclude that it’s a win-win for both mobile OS, then. Winner: Android and iPhone! Ultimately, the perfect phone for your business depends on your particular requirements. Both Android and iPhone devices have their own set of benefits and drawbacks, which is why it all boils down to which of the aspects listed above would help boost your business. But if you’re still confused between these two choices, just give one of our licensed technicians a call! We’ll conduct a free assessment of your IT framework to provide unbiased suggestions. Published with permission from TechAdvisory.org. Source.

Android P: Features to Look Forward To

Fans of Android mobile devices look forward to each new version of Google’s operating system as it shows off new features. Aside from being easier and more efficient for developers to create applications on it, there are some improvements for consumers to look forward to when they update or buy a device that runs the new Android P. App Actions and Slices App Actions aim to anticipate the next thing you may do on your smartphone. Actions such as beginning a workout or giving your spouse a call will appear in notification bubbles on top of the screen as suggestions for what activity it thinks you will do next. It uses machine learning techniques to predict your actions according to your usage habits. For example, if you go jogging at 7:30 am each day, your phone will suggest that you use an installed fitness app during that time. Slices offer a smaller version of an installed app when you do a Google Search, providing you with various app functions without activating the full app. For example, if you type “I want to book a flight” in the search bar, Search will display a basic version of an installed travel app. If you type “Philippines” in the search bar, Google Search will dig through your Google Photos for related images. These functions will not work if the developers do not implement them on your favorite apps. App Timers and Android Dashboard Android P comes equipped with App Timers which help you control how long you use certain apps (especially games and social media) so that it reduces the compulsive need to check the phone often. Once the time limit expires on an app, it changes the launcher icon to a grey color for the rest of the day. In line with App Timers, the Android Dashboard shows you how long you’ve been using your phone to help you with your “digital well-being.” It keeps track of the apps you often use, how many notifications you get, and how many times you unlock the device during the day. Android Shush and other silent modes Android P adds a new “do not disturb” mode in the device known as Shush. Place your phone on a flat surface with the screen down. Only notifications and calls from contacts that you specify will show on-screen. Another way to activate this feature is to push the power and volume up buttons simultaneously. There is a setting that lets you choose between placing your device in “vibrate” mode or keeping the phone quiet. Android P also introduces Wind Down, a “do not disturb” mode that turns on a night light in dark areas. Once the device detects that it’s time for bed, Wind Down forces the screen to enter a gray-scale mode while silencing notifications and phone calls. Battery-saving features Adaptive Brightness learns the apps you use and the level of light in your current location. This makes sure that the screen is not too dim or bright at all times, helping the battery last longer. Adaptive battery uses artificial intelligence to anticipate what apps you may use in the next hour and those you will not. This should save processing power as well as battery power as the CPU of the device will not be used often. App Standby Buckets groups installed apps into which ones you use more and cleverly sets aside battery power for them. This will basically cut down on device resources like the battery and the CPU according to your usage patterns. If you need more information on how the latest version of Android and its functionalities can fit into your workplace, give us a call today! Published with permission from TechAdvisory.org. Source.

How to tighten up Android security

Critical Android security issues have become somewhat of the norm in recent months. Hackers are developing a record number of cyberattacks that could compromise your mobile operating system and they’re having more success than ever before. But there are some things you can do to tighten up your Android security, and most of the features you need are already built in! Find my device If you lose your Android phone, anyone who picks it up — could be a harmless passerby, could be a hacker — can see what’s inside. Fortunately, Android has a “Find my device” feature that allows you to track, lock, and wipe data from your lost or stolen device. Unless you’ve accidentally disabled Find my device, it should be running on your Android by default. To use it in the event that you’ve misplaced your Android device, make sure it’s registered. Then go to www.google.com/android/find, where you will be prompted to log into your Google account. From there, you can locate your phone and, if you think it has fallen into the wrong hands, wipe it remotely. App permissions One feature that’s often overlooked, but which you should pay close attention to, is the app permission settings located in the App & Notifications menu. In this window, you’ll be able to see which apps have permission to access different phone functions. Pay extra attention to apps that have access to your microphone, camera, and biometric sensors, as these can be used to monitor your daily activities and private information. And given the recent Facebook privacy fiasco, it’s a good idea to closely watch what permissions your social media apps have. Safe browsing With “Safe Browsing” mode, Google Chrome users are given warnings before they enter a suspicious site. There are robust threat monitoring features that scan ahead to prevent you from falling for online scams, and much like “Find my device” this feature is enabled by default — just make sure you’ve updated your Android and Chrome to the most recent versions. Lock screen preferences In the “Security” menu of your device, there are various settings for managing your lock screen. App notifications, for instance, still make their way onto your lock screen, which means people can still see important messages, even if your phone is locked. To fix this, you can simply limit how much is shown on your lock screen. Another important setting is Smart Lock, a feature that allows you to automatically lock a device based on its location. For example, if you’re carrying your phone, it can let you automatically keep your phone unlocked; but as soon as it leaves your hand, it locks itself immediately. Multi-factor authentication Last but not least, you must enable multi-factor authentication. Aside from accessing your device and apps with just a passcode, multi-factor authentication forces users to provide another set of identification like an SMS code, fingerprint, or facial recognition scan. Although this adds another step to your sign-in process, it does make it much more difficult for anyone to hijack your accounts. This feature can be found in the “Sign-in & security” options of your system’s settings. Once you’ve enabled these settings, you’re well on your way to keeping the wide variety of cyberattacks at bay. But before you go off on your own, you should consider strengthening your Android device’s security even further with the help of a highly experienced managed IT services provider. Call us today to see what we can do for you! Published with permission from TechAdvisory.org. Source.

Android phones miss vital security patches

Android manufacturers routinely update their products with the latest security patches to keep users safe from all manner of threats. Or so they would have you believe. According to recent reports, Android phone manufacturers may have accidentally missed a few critical patches. Here’s everything you need to know. Missed patches Every month, Google rolls out a new batch of Android bug fixes and critical security updates. These patches are available to Google Pixel phones almost immediately, but many third-party manufacturers are often months behind. When it does arrive, you should theoretically be protected from every recently discovered threat. After extensively researching 1,200 different smartphones, however, Karsten Nohl and Jakob Lell of Security Research Labs discovered that even though certain phones were considered “up to date,” they didn’t have all the bug fixes and security updates listed on the patch notes. In other words, smartphone vendors often missed important patches. The study found that, on average, Sony, Samsung, and Google occasionally missed a patch but were generally more secure than other vendors like Nokia, Motorola, HTC, LG, and Huawei that skipped several important updates. According to manufacturers, these missed updates are purely accidental. Since there are so many updates to install every month, manufacturers can easily lose track and may even skip quality control checks just to keep up. But as we’ve seen time and again, small accidents can lead to massive-scale breaches. Unlike most Android consumers, who usually don’t think twice about the updates they’re installing, hackers always read patch notes and attempt to find weaknesses to exploit. The solution Fortunately, Security Research Labs released SnoopSnitch, a firmware analysis app that checks whether your Android phone is missing any security patches. If your phone model did miss a few patches, the app will record the data and send it to the device manufacturer so they can create a fix as soon as possible. Experts also say that users shouldn’t panic if they notice a missing patch and there are no updates available from their device manufacturer. Good security practices like avoiding suspicious emails and software from the Play Store will generally keep you safe from a wide array of attacks. What’s more, you should enable multi-factor authentication (using both a passcode and biometric scan to access your device) whenever possible to prevent account hijacking. On Google’s end, they’re working on streamlining the patching process for manufacturers and creating even stronger security measures that will prevent hackers from gaining a foothold into your device. Nevertheless, you should still update your Android devices as soon as they become available if you want to avoid a disastrous breach. And if you feel overwhelmed with managing security patches, don’t worry! Just call us today and we’ll help you out. Published with permission from TechAdvisory.org. Source.

Did Facebook secretly collect Android data?

It was recently exposed that Facebook has been collecting Android phone users’ call history and SMS data for years. This may be alarming to many users, but Facebook has assured us that it was collected with consent. Here’s everything you need to know. How Facebook’s data-collecting activities were discovered Software developer Dylan McKay realized Facebook had been collecting his call records and SMS metadata when he downloaded his Facebook account data from his Android device (to do this, go to General > Settings). When he tweeted about it, several users responded that the same thing happened to them, while others revealed that only call histories with close contacts such as parents, partners, and other family members were collected. Facebook has already clarified that they did not collect anything without users’ previous knowledge, and that granting access to call logs and SMS data is an opt-in feature that users of Messenger or Facebook Lite on Android agree to use when they installed the app. Facebook’s response According to Facebook, requests for access to one’s contacts, phone calls, and SMS history is a widely used practice that helps apps distinguish between personal and professional contacts to improve the way it recommends friends and contacts. They also noted that in new versions of Messenger or Facebook Lite on Android, users can see more clearly which permissions they’re granting to apps, specifically where apps ask for access to their call and SMS data. Despite this, users who granted permission before they updated to Android Jelly Bean (version 4.1) are still supplying their contacts data to Facebook. But from the “Marshmallow” version onwards, users are asked separate permissions to access their call and message logs. With Android’s new permission structure, users who download the app will be asked to grant two separate permissions: for their call history data and their message data. Is there anything you need to do? While there are users who are aware that Facebook has access to their contacts data, millions of others are still unwittingly granting access to their data — either because their device is running on an old version of Android, or because they’re simply unaware of what type of information they allowed access to when they initially downloaded and installed the app. Since a vast majority of iOS apps are not allowed to access call history and SMS data, iOS device users were unaffected. Android users, on the other hand, have an option to delete contact data from their profiles. But it’s unclear whether previously collected data can be completely purged even after deleting Facebook contacts on their device. For businesses that have employees using Android devices, managing data privacy settings can be tedious. Lucky for you, we have certified experts who can deal with all your mobile device data management needs. Call us if you need help securing your devices. Published with permission from TechAdvisory.org. Source.

5 Android changes to look forward to

Google has recently released an early preview of Android P, the next major release after Android Oreo. While we still don’t know what sweet treat the update will be named after, software developers have already had the chance to play with some of the features. Here are five changes you can look forward to later this year. Indoor positioning If you’re having trouble finding your way around a huge complex like a mall or factory, Android P can help with a feature called WiFi Round-Trip-Time, which triangulates your device’s position in relation to the building’s WiFi access points. Developers can use this feature to create GPS apps that give users a full layout of the building and how to get to certain stores or areas. Improved notifications Android P will also be adding more ways to interact with notifications directly. For instance, instead of an alert saying “[person] has sent an attachment,” image attachments will now appear on the notification window, eliminating the need to unlock your phone and open the app to see the attachment. You’ll also be able to make use of smart replies, a machine learning feature that scans the text of an incoming message and suggests three basic responses. So if someone asks whether you’re free to attend a meeting in the afternoon, Android will produce replies like “Yes”, “No”, or “I’ll check.” Better security To protect users from the onslaught of cyberattacks and data leaks, Google is fortifying Android P’s security and privacy settings. Apps will no longer have access to your device’s sensors, cameras, and microphones when they’re not being used. This means users won’t have to worry about apps tracking and recording their conversations, facial features, and other types of personal information without their permission. What’s more, apps will easily access Android’s fingerprint system. This will make authentication consistent across different apps so users know their fingerprints are being processed by a trusted source and not some uncertified third party. Enhanced volume slider The volume slider is getting some improvements, too. Other than being moved from the top of the display to the side, the volume slider will get a button that allows you to toggle between different ring settings (e.g., mute, vibrate, and ring). There’s also the “media output” setting that enables you to connect (or disconnect) Bluetooth-enabled audio devices to your phone. Neural network processing With this feature, machine learning processes are carried out on the device itself instead of sending it to the cloud for analysis, which means fewer privacy leaks. This also means Android P can quickly learn and adapt to the user’s behavior, allowing for a more customized user experience. These aren’t the only set of features you can expect later this year. As it’s just an early build reserved for those subscribed to the developer preview, Google is probably going to add more functionality and design changes to Android P, so make sure to tune in to this blog to find out about future updates! Published with permission from TechAdvisory.org. Source.

Android phones worth using for business

From Samsung to Huawei to HTC, there are plenty of Android smartphones available to consumers and businesses. But the choices get even more confusing as smartphone manufacturers release new models every year. That’s why Google compiled a list of devices to help you choose. Google-approved devices Recently, Google launched Android Enterprise Recommended to make it easier for businesses to find secure, cutting-edge devices they can confidently invest in. This program establishes minimum hardware, software, security, and user experience requirements for Android devices and services. For instance, mobile devices in the program must be able to deliver security updates within 90 days of Google releasing them, for at least three years. This is an important requirement because the Android OS tends to get a lot of unwanted attention from hackers due to its open-source nature and the thousands of unregulated apps available in its Google Play store. Beyond security, ‘enterprise-ready’ Android phones must have: The capacity to support Android 7.0 Nougat or higher (at least 2GB of RAM, 32GB of storage, and a 1.4 GHz processor) Zero-touch enrollment, which allows businesses to deploy devices with company configurations and policies already in place Seamless application experience across devices and accounts Google also announced that requirements will change for each new version of Android OS, and vendors will have to submit their devices to be validated every time. Of course, if any device doesn’t meet compliance (or falls out of it), Google will remove it or even its manufacturer from the program. What devices are recommended right now? So far, the program has 21 enterprise-ready smartphones, including: Google Pixel (Pixel XL, Pixel 2, Pixel 2 XL) BlackBerry KEYone and Motion Huawei (Mate 10, Mate 10 Pro, P10, P10 Plus, P10 Lite, and P smart) Nokia 8 LG G6 and V30 Motorola X4 and Z2 Sony Xperia (XZ1, XZ1 Compact, XZ premium, XA2, and XA2 Ultra) Although it’s the leading Android smartphone vendor, Samsung was not included in the list. However, this was only the first fleet of devices that were validated, and more devices will be added to the list throughout the year, according to Google. So if you’re planning to implement remote work and bring your own device policies in the coming months, check the Android website regularly for new Google-approved devices. And if you need more advice about mobility solutions, contact us today. We have IT experts at your beck and call! Published with permission from TechAdvisory.org. Source.

5 ways to improve security on your Android

If you get separation anxiety at phone-prohibited events or you’re one of those people who sleeps next to their phone, then you’re probably emotionally attached to your smartphone. And just like every other thing we hold dear, we should put up some walls and protect it. So, if you value your apps, personal data, and everything else stored in your Android, it’s time to take its security to a whole new level with these features you can enable right now. Set a strong screen lock The single most important thing any smartphone owner can do is use a strong, unique passcode or swipe pattern to prevent unwanted access to their device. Avoid using obvious codes such as your birthday or pet’s name; instead, use alphanumeric combinations that are much harder to crack. To enable a screen lock, simply head over to Settings > Security. Select Screen Lock and pick your preferred password lock type and set Automatic Lock after a certain period of time. From then, you will need to enter your passcode or swipe pattern each time you try to access your phone. Use alternative unlocking methods Newer Android devices have advanced security tools for an extra layer of protection. These include features like fingerprint authentication, iris scanning, and facial recognition. To see what features can be enabled on your phone, go to Settings > Security. In addition, if you are a Google Nexus or Pixel user, your device is equipped with a range of Smart Lock options that when activated, keeps your phone unlocked when it’s detected to be on your body or near a trusted Bluetooth device. These settings can also be found under Security. Enable Find My Device Google’s Find My Device is a locator service that lets you track or wipe data from a lost or stolen Android phone, tablet, or wearable. All you need to do is add your Google account to your Android device and turn on the location feature to enable the service. To locate your device remotely, install the Find My Device app or access it via web browser. Once you’re logged in, a dashboard will show an approximate location of your phone and provide you with four options: locate your device, play sound, lock your device (and add a short note), or erase device that permanently deletes all data stored. Revisit Your App Permissions Did that photo-editing app you just downloaded really need access to your Contact list? If you sometimes wonder why some apps need so many permissions or why they request to access data unrelated to their purpose, then you are asking the right questions. Remember to take control of the features that you allow your apps to access, especially from dubious developers who might stealthily steal your information. If you have Marshmallow or later versions of Android, go to Settings > Apps and then select the app. Click on Permissions and revoke all those permissions you’re uncomfortable with. Encrypt Your Phone Device encryption protects your data by converting it into a format that prevents unauthorized individuals from accessing it without the key. This is particularly important if someone manages to find a way around your lock screen and pull data from your device. Android handsets running on Lollipop or higher has full encryption enabled by default. But if you’re using an older device, encryption options can also be found under Security. It never hurts to take extra steps to make sure your information is protected. Some of these might take time, but trust us, it’s totally worth the extra minutes. If you need more tips to secure your personal or even your company’s files, email, or data, we’ll be happy to help. Security is what we do best, so give us a call today! Published with permission from TechAdvisory.org. Source.