Once our phones and PCs became connected, our digital lives became much more productive and accessible. They have also become more dangerous since cybercriminals can now double the damage to your devices. Fortunately, this guide will teach you how to prevent hackers from accessing your phone.
Remote access is an extremely useful feature that can make your life easier. Tap or click here to set up remote access between your phone and your computer. But it also comes with some big cybersecurity risks, as hackers can take over your phone remotely if you’re not careful.
Let’s manage your security settings and prevent these scary scenarios from happening. Here’s everything you need to know to protect your phone from hackers.
Enable 2FA (two-factor authentication)
Two-factor authentication is your best first defense against unwanted users accessing your phone. It also prevents information theft if your phone is lost or stolen. Follow these steps to prevent hackers from accessing your phone.
On your Google account
- On your PC, go to your Google account page and select the Security tab on the left side of the screen.
- Locate 2-step verification in the center of the page and click where it says Stopped.
- Press blue Begin button on the 2-step verification filter.
- Make sure you’re on a secure connection, then sign in to your Google account and continue.
- Enter your phone number and click Next at the bottom of the page.
- Either your phone will go to a verification screen on its own, or you will receive a text message from Google with a security code. Enter your code or confirm your device to continue.
- Finally, the last prompt is to just tap the big blue To light up button for 2FA. Then you are done.
On your iPhone/iPad
- Go to Settings on your iPhone or iPad.
- Faucet [your name] then Password and Security.
- Faucet Enable two-factor authenticationthen Continue.
- Apple will ask you to enter the phone number you want to receive verification codes.
- You will receive an SMS or a robocall with a verification code. Enter it to verify your number and account.
You may need to enter your Apple ID security questions when browsing this menu.
Disconnect unrecognized devices from your account to prevent hackers from accessing your phone
When you leave old devices signed into your Google or iCloud account, 2FA can become a liability. Multiple devices have access to your account details and if in the wrong hands, they can be used to hack into your account.
Many of us replace our phones every few years and never come back to wipe down the old device. Sometimes hackers can access your account through older devices (it’s rare, but it can happen).
On your Google account
- On your PC, go to your Google account page and search for the Security tab on the left side of the screen.
- Scroll to Your devices section and select Manage all devices.
- You’ll see all devices currently linked to your Google Account.
- If you don’t recognize a device or you know it’s an old, outdated phone that you no longer use, click on it.
- Click on Logout to remove access to your Google account from the device.
- You can also click Don’t recognize this device? then click Sign out on device. In this case, you will be prompted to change your password as an additional security measure.
On your iCloud account
- Go to the iCloud website and sign in to your account.
- You may be prompted to enter a verification code sent to your iPhone.
- Under your account details, click find my phone.
- Click on All Devices at the top of the screen to see a list of devices connected to your iCloud account.
- Next, click on the device you want to remove.
- Click on Remove from account and follow the prompt to verify your decision.
Correct your password and make it unique
Common passwords are children’s names, important dates, and other memorable events. People who aren’t even close to you can figure them out, thanks to the wealth of publicly available information anyone can access online. Tap or click here for detailed steps to opt out of people search sites.
If you want to prevent hackers from accessing your phone, you need to create strong and unique passwords for all your accounts.
Use these best practices and change your passwords and secure your life:
- Write a nonsense password which consists of different numbers, letters and cases. Spend a minute each day trying to remember this. Once you remember it, use it as your password. Be sure to keep your note in a safe place in case you forget it.
- Add symbols to your passwords. You may have noticed that many sites now require a special character when creating a password. Adding exclamation marks, symbols, and the pound sign greatly improves your password security.
- Create a long password with small modifiers added. If you remember a 12-character password, you can add modifiers at the end to have different passwords for each account you use. You never want to use the same password for multiple accounts.
- You can simplify this process with a password manager. Tap or click here to see how these useful tools work.
Secure all your accounts and devices to prevent hackers from accessing your phone
Cyberattacks are on the rise, and the more we rely on our devices for work, school, and personal life, the more we have to lose. There’s a lot to preserve and protect, whether it’s bank accounts, personal data, photos or conversations. That’s why Kim recommends our sponsor, TotalAV.
TotalAV’s advanced security suite is easy to use and offers the best protection on the market. In fact, they received the famous VB100 award for detecting more than 99% of malware samples for the last three consecutive years.
Not only do you get continuous protection against the latest threats, but their AI-driven Web Shield browser extension automatically blocks dangerous websites, and their Junk Cleaner can help you quickly wipe out your old files.
Right now, get an annual plan of TotalAV Internet Security for just $19 at ProtectWithKim.com. That’s over 85% off the regular price!
Did you enjoy learning how to prevent hackers from accessing your phone? Get more safety tips
7 Important iPhone Security Settings to Change Right Now
6 Hidden Uses of Password Managers