Smartphone, Tablet, Computer: Laptop & Desktop repairing:
- Other hand sharing devices can leak personal data.
- Hardware and software and OS can be misused for targets.
- Spare parts can be replaced.
- Other hand sharing devices can leak personal data. Privacy Concern.
- Normal Reset and Hard reset is not mean to all data deleted permanently from your device storage.
- If a device is dead for any reason but ROM storage is alive, it can recover data by forensics data recovery process.
- Device identity like IMEI, IMSI number for identifying specific devices can misuse at any time.
- For smartphones and tablets always avoid reselling or exchanging with existing devices.
- Strongly not recommended any storage supported devices for reselling or exchange.
- For Computer: Laptop & Desktop reselling or exchanging with existing devices, make sure to replace internal memory (Ex: SSD, Hard Disk), Don’t share existing running or dead internal memory. Install a new storage and then resell or exchange.
- Must note third-party or recipient correct information with proper evidence, because using this device identity can misuse at any time in future.
- Make sure to enable encryption and security services.
- Always operating system updated with the latest version and security patches.
- Always use the original operating system and application softwares.
- Don’t use crack and pirated OS and Apps.
- Use a strong complex password and different passwords for every online account.
- Don’t share passwords, backup code, OTP & security question answers to anyone.
- Use two step authentication for online accounts.
- After losing a smartphone, tablet, laptop, hard disk, pendrive, etc must report to the incident area local police station as soon as possible with proper information.
- With a police complaint report, register the same report to the national portal.
- If a device found after losing by police operation or any other sources, try to avoid using the same device in future, it can compromise confidential information or can misuse anytime. If you want your same device after found back, make sure you have personally cross checked hardware details by disassemble and also check operating system and internal functions, app, and much more information which can be monitored.
- During confidential discussion physically : make sure all digital devices including IOT services connected devices are switched off properly (Ex: mobile phone, laptop, desktop, web cam, smart watch, spy pen, spy camera, CCTV, smart camera, external mic, wireless earphone, smart speaker, etc).
Published• Apr 16, 2020