{"id":126270,"date":"2022-11-14T16:26:07","date_gmt":"2022-11-14T21:26:07","guid":{"rendered":"https:\/\/rbach.net\/?p=126270"},"modified":"2023-01-13T15:02:56","modified_gmt":"2023-01-13T20:02:56","slug":"6-things-to-never-save-on-your-mobile-phone","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/6-things-to-never-save-on-your-mobile-phone\/","title":{"rendered":"6 Things to Never Save on Your Mobile Phone"},"content":{"rendered":"\r\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-116409\" title=\"6 Things to Never Save on Your Mobile Phone\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cell_in_can-2-e1615231862662-150x134.jpg?resize=110%2C98&#038;ssl=1\" alt=\"6 Things to Never Save on Your Mobile Phone\" width=\"110\" height=\"98\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cell_in_can-2-e1615231862662.jpg?resize=150%2C134&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cell_in_can-2-e1615231862662.jpg?resize=75%2C67&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cell_in_can-2-e1615231862662.jpg?w=445&amp;ssl=1 445w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/>Two out of every three people are <strong><a href=\"https:\/\/techjury.net\/blog\/smartphone-addiction-statistics\/\" target=\"_blank\" rel=\"nofollow noopener\">addicted to their mobile phone<\/a><\/strong>. The average user touches their smart phone <a href=\"https:\/\/techjury.net\/blog\/smartphone-addiction-statistics\/\" target=\"_blank\" rel=\"nofollow noopener\">2,617 times a day<\/a>. It is no wonder that most people view their cell phone as detailed summary of their personal life. This convenience comes at a price. A recent from report from <a href=\"https:\/\/www.kensington.com\/about-us\/\" target=\"_blank\" rel=\"nofollow noopener\">Kensington<\/a> found that 70 million smartphones are lost each year, with only 7 percent recovered.<\/p>\r\n<p><a href=\"https:\/\/web.archive.org\/web\/20210305101727\/https:\/\/wellmind.com\/2017\/11\/managing-stress\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-115791\" title=\"dangerous to your privacy and your wallet\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/man_Stressed_out-1.jpg?resize=110%2C93&#038;ssl=1\" alt=\"dangerous to your privacy and your wallet\" width=\"110\" height=\"93\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/man_Stressed_out-1.jpg?resize=150%2C127&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/man_Stressed_out-1.jpg?resize=1024%2C865&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/man_Stressed_out-1.jpg?resize=75%2C63&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/man_Stressed_out-1.jpg?resize=768%2C649&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/man_Stressed_out-1.jpg?w=1500&amp;ssl=1 1500w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/man_Stressed_out-1.jpg?w=960&amp;ssl=1 960w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/man_Stressed_out-1.jpg?w=1440&amp;ssl=1 1440w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>There are things you should never store in your cell phone. <em><a href=\"https:\/\/www.readersdigest.ca\/\" target=\"_blank\" rel=\"nofollow noopener\">Readers Digest<\/a><\/em> <a href=\"https:\/\/www.readersdigest.ca\/home-garden\/tips\/things-to-never-store-on-your-smartphone\/\" target=\"_blank\" rel=\"nofollow noopener\">says<\/a> that keeping valuable info on your mobile is dangerous to your privacy and your wallet. You open yourself up to an invasion of privacy, identity theft and straight-up theft. Here are some things you should not keep on your phone.<\/p>\r\n<h3>Your passwords<\/h3>\r\n<p>If you keep your passwords on your mobile, you are putting you privacy at risk. Even if you keep them in a note, a document or even in auto-fill on your mobile, you\u2019re putting your data at risk. The article says if you lose your phone, someone might easily see your \u201ccheat sheet.\u201d\u00a0 Because <a href=\"https:\/\/wp.me\/p2wgaW-588\" target=\"_blank\" rel=\"nofollow noopener\">everyone snoops<\/a> through mobile phones. Even if you store your passwords on your mobile phone they can end up stored in the cloud, still putting your accounts at risk. Instead consider a password manager such as <a href=\"https:\/\/www.keepersecurity.com\/\" target=\"_blank\" rel=\"nofollow noopener\">Keeper<\/a>, or <a href=\"https:\/\/www.lastpass.com\/\" target=\"_blank\" rel=\"nofollow noopener\">LastPass.<\/a> That way all of your passwords can be accessed by you using one strong master password.<\/p>\r\n<h3>Your face and fingerprints<\/h3>\r\n<p><a href=\"https:\/\/www.nwivisas.com\/nwi-blog\/south-africa\/what-is-a-biometrics-system-and-why-does-home-affairs-require-this\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-126373\" title=\"don\u2019t use biometrics to open your phone\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/biometrics_finger-1.jpg?resize=110%2C74&#038;ssl=1\" alt=\"don\u2019t use biometrics to open your phone\" width=\"110\" height=\"74\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/biometrics_finger-1.jpg?w=150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/biometrics_finger-1.jpg?resize=75%2C51&amp;ssl=1 75w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>If you really want to keep your cell phone secure, don\u2019t use <a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/biometrics\" target=\"_blank\" rel=\"nofollow noopener\">biometrics<\/a> to open your phone (or any of its apps or accounts). There are many reasons why biometrics like <a href=\"https:\/\/wp.me\/p2wgaW-lHn\" target=\"_blank\" rel=\"noopener\">fingerprints don&#8217;t make you more secure<\/a>. <a href=\"https:\/\/wp.me\/p2wgaW-tQw\" target=\"_blank\" rel=\"noopener\">Facial recognition<\/a> apps are more dangerous that using a password. The author says the simple fact is that a phone that requires a password to unlock it requires more steps to unlock. That makes the mobile phone more secure.<\/p>\r\n<h3>Your private photos and videos<\/h3>\r\n<p>You may have <a href=\"https:\/\/www.prweb.com\/releases\/71_of_hiring_decision_makers_agree_social_media_is_effective_for_screening_applicants\/prweb17467312.htm#:~:text=Seventy%2Done%20percent%20of%20U.S.,commissioned%20by%20Express%20Employment%20Professionals.\" target=\"_blank\" rel=\"nofollow noopener\">cleaned up your Facebook account<\/a>, but what about your phone? What photos and videos do you store on your phone? If you have photos you wouldn\u2019t want your spouse, children, or boss to see, then you shouldn\u2019t store those photos on your smartphone according to the article. <strong>Media stored on your phone is saved in the cloud outside of your control<\/strong>.<\/p>\r\n<p>Your naughty photos are one problem. Another is any photos containing private information. While photos of credit cards and ID can help you keep track of \u201cwhat\u2019s in your wallet,\u201d they can also leave your information vulnerable to hacking. Again the photos are stored on the cloud. As with your naughty photos, <em>Readers Digest<\/em> suggests you store your pictures ID on a PC that only you have access to in a password-protected album.<\/p>\r\n<h3>Anything on your work phone<\/h3>\r\n<p><strong><a href=\"https:\/\/www.unicornenlight.com\/grumpy-boss\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-126374\" title=\"Do not save anything personal on an employer-provided mobile\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/boss_angry-1.jpg?resize=111%2C69&#038;ssl=1\" alt=\"Do not save anything personal on an employer-provided mobile\" width=\"111\" height=\"69\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/boss_angry-1.jpg?resize=150%2C93&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/boss_angry-1.jpg?resize=75%2C47&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/boss_angry-1.jpg?w=422&amp;ssl=1 422w\" sizes=\"auto, (max-width: 111px) 100vw, 111px\" \/><\/a>Do not save anything personal on an employer-provided mobile<\/strong>. There\u2019s no such thing as a free lunch. The phone you were issued by your employer comes at a steep price: your privacy. You should have <a href=\"https:\/\/www.lawinfo.com\/resources\/employment-law-employee\/how-much-privacy-must-my-employer-give-me-at.html\" target=\"_blank\" rel=\"nofollow noopener\"><strong>no expectation of privacy<\/strong><\/a> for anything you do on that phone. For your personal life the article recommends using a separate phone and phone number. One budget-minded option is a burner phone.<\/p>\r\n<h3>Your online bank account<\/h3>\r\n<p><strong>Digital banking<\/strong> in the US is <a href=\"https:\/\/www.statista.com\/statistics\/1285962\/digital-banking-users-usa\/\" target=\"_blank\" rel=\"nofollow noopener\">expected to grow<\/a> from 197 million users in March 2021 to 217 million by 2025. But the convenience online banking affords\u2014the ability to bank anywhere, anytime\u2014 <strong>comes at a cost: your privacy<\/strong>. Carrying your bank account with you on your phone means that you\u2019re risking losing control of it in the event you lose your phone\u2026or even lose track of an old phone that you no longer use they warn.<\/p>\r\n<p>To manage the risk, you might consider <strong>avoiding doing your online banking on your phone<\/strong>. Instead, do it on a computer that never leaves your home. If you find that you simply must take your online banking with you wherever you go, just be sure to <strong>use a strong, unique password<\/strong> to unlock your banking app.<\/p>\r\n<h3>Your home address<\/h3>\r\n<p>Storing y<strong>our home address in navigation app<\/strong> like <a href=\"https:\/\/www.waze.com\/signin\" target=\"_blank\" rel=\"nofollow noopener\">Waze<\/a> or <a href=\"https:\/\/www.google.com\/maps\" target=\"_blank\" rel=\"nofollow noopener\">Google Maps<\/a> makes getting home from anywhere super-easy. But it can also leave you vulnerable. If a thief ends up with your phone, they can simply click on \u201chome,\u201d or \u201cwork,\u201d and see what you\u2019ve stored, and pay you a visit.<\/p>\r\n<p>If you <strong>lose your mobile phone<\/strong> that are some steps you need to take <a href=\"https:\/\/www.consumerreports.org\/smartphones\/steps-to-protect-your-smartphone-from-theft-or-loss-a1204843165\/\" target=\"_blank\" rel=\"nofollow noopener\">according<\/a> to <a href=\"https:\/\/www.consumerreports.org\/\" target=\"_blank\" rel=\"nofollow noopener\">Consumer Reports<\/a>. As soon as you get your new mobile phone.<\/p>\r\n<h3>Use strong password protection on your mobile phone<\/h3>\r\n<p><a href=\"https:\/\/www.computing.co.uk\/news\/4035593\/random-words-safer-complex-passwords-ncsc\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-111593\" title=\"Use strong password protection\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/passwords-3-e1668457381264-150x106.jpg?resize=110%2C78&#038;ssl=1\" alt=\"Use strong password protection\" width=\"110\" height=\"78\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/passwords-3-e1668457381264.jpg?resize=150%2C106&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/passwords-3-e1668457381264.jpg?resize=75%2C53&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/passwords-3-e1668457381264.jpg?w=500&amp;ssl=1 500w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>This is your first and strongest line of defense. You <strong>need a strong password<\/strong>, because one that\u2019s easy to guess could unlock your phone and allow someone to override the biometric safeguards.<\/p>\r\n<p><strong>Skip the simple 4-digit PIN<\/strong> and instead create a strong password that contains a string of at least eight characters that include some combination of letters, numbers, and special characters that don\u2019t form recognizable words or phrases, especially those that could be associated with you.<\/p>\r\n<p>Password protection comes with another safeguard according to Consumer Reports. After several unsuccessful tries to enter a passcode, some <strong>phones will lock your device for a short period<\/strong> of time. This slows down attempts to access your phone. There\u2019s also a setting on the latest Android phones that automatically erases all of your personal data after 10 unsuccessful log in attempts. Here\u2019s how to activate it. Go to:<\/p>\r\n<ul>\r\n<li>Settings | Lock Screen | Secure Lock Settings | and toggle the Auto Factory Reset option to switch it on. (The labels may vary slightly on other Android models.)<\/li>\r\n<\/ul>\r\n<h3>Enable location tracking<\/h3>\r\n<p>You must <strong>turn on the global positioning settings<\/strong> (GPS) in order to find a missing phone on a map. To enable this setting on an Android phone go to:<\/p>\r\n<ul>\r\n<li>Settings | Security | Find My Device and toggle Find My Device.<\/li>\r\n<\/ul>\r\n<h3>Back up your photos and videos<\/h3>\r\n<p><a href=\"https:\/\/www.datacenterknowledge.com\/archives\/2013\/08\/05\/nasdaq-finqloud-host-cloud-powered-compliance\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-126380\" title=\"Consider using a carrier-neutral service to back up your mobile\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cloud_storage-1.jpg?resize=110%2C78&#038;ssl=1\" alt=\"Consider using a carrier-neutral service to back up your mobile\" width=\"110\" height=\"78\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cloud_storage-1.jpg?resize=150%2C106&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cloud_storage-1.jpg?resize=75%2C53&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cloud_storage-1.jpg?w=470&amp;ssl=1 470w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>Consider using a carrier-neutral service to <strong>back up your mobile<\/strong>. Apple\u2019s iCloud or Android\u2019s Google Drive may make it easier to retrieve your memories should your next phone be from a different carrier. Phone carriers, phone makers, and operating systems also offer free over-the-air backup for photos, settings, and more. These options can limit you if you select a new carrier for your next mobile phone.<\/p>\r\n<h3>Write down your phone\u2019s unique ID number<\/h3>\r\n<p>Smartphones have a <strong>unique serial number<\/strong> known as an IMEI (International Mobile Equipment Identity) or MEID (Mobile Equipment Identifier). Unlike other information stored on the phone\u2019s removable SIM card, these numbers are etched into its circuits and are difficult to alter. Your carrier already has this number and can use it to put the phone on a missing phone list. Some police departments ask for either of these numbers when you report a stolen phone. With the numbers they\u2019ll be able to return a phone to you if it\u2019s recovered. To find your phone\u2019s unique IMEI or MEID number, use any of the following steps:<\/p>\r\n<ul>\r\n<li>Dial *#06# from your phone. The number may pop up on your screen.<\/li>\r\n<li>On an Android phone go to: Settings | About Phone. The number should be on that screen.<\/li>\r\n<\/ul>\r\n<p>After the phone is gone, t<strong>he sooner you act, the better your chances<\/strong> of retrieving your phone and securing your data. Here are key actions to take according to <em>CR<\/em>.<\/p>\r\n<h3>Seek and (possibly) destroy your mobile phone<\/h3>\r\n<p><a href=\"https:\/\/web.archive.org\/web\/20201021204351\/https:\/\/www.dreamstime.com\/royalty-free-stock-photos-hard-drive-crash-image18488\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-126376 size-full\" title=\"erase the data on yourphone\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_destruction-1-e1668457594121.jpg?resize=101%2C68&#038;ssl=1\" alt=\"erase the data on yourphone\" width=\"101\" height=\"68\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_destruction-1-e1668457594121.jpg?w=101&amp;ssl=1 101w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_destruction-1-e1668457594121.jpg?resize=75%2C50&amp;ssl=1 75w\" sizes=\"auto, (max-width: 101px) 100vw, 101px\" \/><\/a>It is important that the minute you learn your phone is missing, you send it commands you think are appropriate. Time is of the essence because these next steps requires your phone to be on and have some battery life left.<\/p>\r\n<p>As soon as possible, <strong>call or text your phone<\/strong> from another device. That might be all it takes if your phone is just misplaced nearby.<\/p>\r\n<p>Then log on to your <strong>Find My Phone service<\/strong> from a secure device. For an Android phone, go to <a href=\"https:\/\/myaccount.google.com\/intro\/find-your-phone\" target=\"_blank\" rel=\"nofollow noopener\">Google\u2019s Find My Device<\/a> in a browser. Use the service to make your phone play a sound. You can also lock the screen and display a message for someone who finds your phone. An honest person may come across your device and notify you via the contact info on the screen. If you think the bad guys have your phone, you can <strong>erase the data on it using Find My Device<\/strong>.<\/p>\r\n<h3>Report the Loss to Your Service Provider<\/h3>\r\n<p><strong>Inform your mobile carrier<\/strong> that your phone has been lost or stolen. It can suspend service to prevent anyone from using the device on its network. They may also mark the phone as unusable even on a new carrier or with a different SIM card. Note that your device will still be usable over WiFi. You can notify your provider by going to one of its stores, calling, or logging on to its website.<\/p>\r\n<ul>\r\n<li>AT&amp;T: Call 800-331-0500 or go to <a href=\"https:\/\/www.att.com\/support\/article\/wireless\/KM1046747\/\" target=\"_blank\" rel=\"nofollow noopener\">AT&amp;T\u2019s Suspend page<\/a>.<\/li>\r\n<li>T-Mobile: Call 800-937-8997 or go to <a href=\"https:\/\/account.t-mobile.com\/signin\/v2\/\" target=\"_blank\" rel=\"nofollow noopener\">My T-Mobile<\/a>, and in the My Line section click on your device name to find the Report Lost or Stolen option.<\/li>\r\n<li>Verizon: Call 800-922-0204 or go to the Suspend or Reconnect Service page in <a href=\"https:\/\/ssoauth.verizon.com\/vzauth\/UI\/Login\" target=\"_blank\" rel=\"nofollow noopener\">My Verizon<\/a> and follow the prompts.<\/li>\r\n<\/ul>\r\n<h3>Change Your Important Passwords<\/h3>\r\n<p>Once you realize your phone is in danger, go to a secure PC,\u00a0 log in to every account you had on your phone (banking, shopping, email, etc.) and <strong>change your passwords<\/strong>. Start with your email account. Then change the financial and shopping accounts that have your credit card on file, such as Amazon or your bank. Next move on to social networks. If you\u2019ve set up a password manager, this task will be easy.<\/p>\r\n<h3>Report the Loss to the Police and File an Insurance Claim<\/h3>\r\n<p><strong>Notify the police<\/strong>. This not only launches an official recovery attempt but also helps speed up the process of making an insurance claim (if your covered). You might also need a police report to dispute fraudulent credit card charges, and some credit card issuers will reimburse you for a stolen phone.<\/p>\r\n<h3>Wipe your mobile phone anyway<\/h3>\r\n<p><a href=\"https:\/\/www.information-age.com\/smartphones-now-account-60-malware-infections-mobile-network-1003\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-126377\" title=\"malicious app or spyware\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile-malware2-1.jpg?resize=110%2C110&#038;ssl=1\" alt=\"malicious app or spyware\" width=\"110\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile-malware2-1.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile-malware2-1.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile-malware2-1.jpg?w=600&amp;ssl=1 600w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>If you recover your phone You never know what malicious app or spyware someone may have installed while the phone was out of your hands. To be on the safe side, r<strong>eset the phone to factory settings<\/strong>. If you see an option to erase everything, make sure you select it. Before you nuke the phone, check your backups to make sure that you have copies of all the photos and videos that were on your phone.\u00a0 On an Android phone, go to:<\/p>\r\n<ul>\r\n<li>Settings | System | Advanced | Reset Options | Erase All Data (factory reset).<\/li>\r\n<\/ul>\r\n<p>&nbsp;<\/p>\r\n<p style=\"text-align: center;\"><em><strong><a href=\"https:\/\/www.obama.org\/updates\/help-ukraine\/\" target=\"_blank\" rel=\"nofollow noopener\">How you can help Ukraine!<\/a><\/strong><\/em><\/p>\r\n<p><strong>Related article<\/strong><\/p>\r\n<ul>\r\n<li><a title=\"Why You Should Upgrade Your Android Phone Every Two Years\" href=\"https:\/\/www.reviewgeek.com\/109655\/why-you-should-upgrade-your-android-phone-every-two-years\/\" target=\"_blank\" rel=\"nofollow noopener\">Why You Should Upgrade Your Android Phone Every Two Years<\/a>\u00a0(<a title=\"Review Geek\" href=\"https:\/\/www.reviewgeek.com\/\" target=\"_blank\" rel=\"nofollow noopener\">Review Geek<\/a>)<\/li>\r\n<\/ul>\r\n<p>&nbsp;<\/p>\r\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a>\u00a0about IT, careers, and anything else that catches his attention since 2005. You can follow him on\u00a0<a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\r\n<p>&nbsp;<\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>Keeping valuable info on your mobile phone is dangerous. You are open to an invasion of privacy, identity theft and straight-up theft. Some things you should not keep on your phone.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[3627,202,101,109,1452,32,2227,2639,608,304,566,2193,129,999,1071,2658],"class_list":["post-126270","post","type-post","status-publish","format-standard","hentry","tag-3627","tag-android","tag-apple","tag-att","tag-biometrics","tag-business","tag-facial-recognition","tag-fingerprint","tag-identity-theft","tag-iphone","tag-mobile-phone","tag-password-management","tag-smartphone","tag-t-mobile","tag-theft","tag-verizion"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/126270","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=126270"}],"version-history":[{"count":16,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/126270\/revisions"}],"predecessor-version":[{"id":131527,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/126270\/revisions\/131527"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=126270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=126270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=126270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}