Don’t Lose Your Phone: Here’s What Can Happen (and How to Prepare)

Mobile phones are amazing devices. They’re much more than just having your email or social media at your fingertips; they’re truly portable general-purpose computers that also happen to be able to make phone calls.

We do a lot with our phones. Because they’re always with us, they’re one of our primary means of content consumption — everything from social media to news to maps to ebooks and more — as well as our primary means of communication (though ironically, rarely by actually using the telephone) and one of our primary content-creation devices as well, in the form of photos and videos.

As tiny computers, we’ve come to rely on them to store data, act as security keys, wallets, fitness trackers, automotive trackers, and dozens of things I can’t even think of right now.

Given everything we use our phones for, to say that we shouldn’t lose them is stating the obvious. And yet lose them we do. I’m going to review some of the things you need to be aware of when (not if) you lose your phone, and some of the ways you can mitigate the damage when it happens.

Read moreDon’t Lose Your Phone: Here’s What Can Happen (and How to Prepare)

Two-Factor Authentication Keeps the Hackers Out

We rely on passwords to protect our online world. At the same time, hackers seem to be getting better at deciphering them.

In response, security folks created something called “two-factor” or “multi-factor” authentication.

It’s something I strongly suggest you understand and consider using.

Two-factor authentication relies on two different types of information, both of which must be correct in order to confirm your identity.

Read moreTwo-Factor Authentication Keeps the Hackers Out