Securing smartphones and tablets

Find out more about keeping your devices safe and secure.

Your device and your personal data

With smartphones, tablets and other devices containing a wealth of personal information they have become more attractive to criminals not just for the cost of the phone but for access to the data inside it too. Manufacturers have put in controls that will help you keep your device and data secure. Take some time to go through and set up the security options when you buy a new device and review the settings again every few months.

You can go directly to the manufacturers websites for their guides by following the links below (will take you to external websites). We’ve also included a rundown of our top tips to secure your device after the links.

Keep your devices updated

Cyber criminals look to find and exploit weaknesses in your devices software or the apps that you run. Providers, however, continually provide security fixes to keep your protection in place. If you update to the latest version regularly - the simplest way to do this is to turn on automatic updates - you can immediately improve your security.

Set up security to prevent access by others

Your device is likely to come with several options for you to prevent access to it by others. These include setting up PINS or passwords, pattern swipes and biometric measures such as fingerprint and facial recognition. Choose the one for you that provides the right balance of security and convenience.

Set up ‘find my’ device where available

Setting up a find my device service will help you control what happens to your data should your device be lost or stolen. If the device is still online you can take actions such as locate its whereabouts on a map, lock the screen, sound an alarm or wipe all the data from it.

More ways to stay safe

Storing all your data on just your device alone means that if it is lost, stolen or hacked you could end up losing it all. You can back up all your data or just the most precious information to another device or to a cloud storage solution so that if the worst happens you can recover it.