DO YOU NEED an expert investigator ? Investigative assistance ?
that are at least eight to 10 characters in length . The longer the better , and the use of a unique passphrase is fine . Avoid using facial recognition or fingerprint scanning as biometric-based security is less secure . Enable the auto lock feature and set it to lock if the phone is idle for no more than five minutes . A setting of one minute would be even better . Also enable the find my phone feature . This feature will help you locate a lost or stolen phone and will also help you remotely delete your phone ’ s data should that ever prove necessary . Enable an auto factory reset after 10 to 15 incorrect attempts to unlock the phone . This will delete most data , to include downloaded apps should someone try to gain access to a phone ’ s data . And finally , make sure the encryption function is turned on as one additional step to protect the data stored on each device . Note , that on some smartphones , data encryption is built in .
DO YOU NEED an expert investigator ? Investigative assistance ?
Keep all phone operating systems and apps up to date – Enable auto update and accept those updates whenever they are made available . Users may need to manually check for app updates , which should be done at least monthly .
Install a robust security app on all smartphones – Examples include Bitdefender , Norton , Trend Micro , and VIPRE . Avoid using free versions of security apps as free versions will not provide the same level of protection . If the security app comes with a VPN , turn that on . If it doesn ’ t , then also install a VPN app on all phones . While any data stored on a smartphone is encrypted , if encryption is enabled , data traveling to or from a smartphone isn ’ t . The use of a VPN addresses that concern . Here again , avoid the use of free VPNs if you want to have your data stream be as secure as possible . Examples of trusted VPN providers include CyberGhost , NordVPN , and ProtonVPN .
Disable Wi-Fi auto connect and Bluetooth auto pairing . In addition , it ’ s a good idea to turn off Wi-Fi and Bluetooth when they are not in use . In short , you don ’ t want to the leave potential entry points open and unmonitored .
Institute a firmwide policy that prohibits the downloading of any apps from untrusted sources . Stick to using apps available from your devices ’ official app store , for example the Google Play Store and the Apple App Store . Many apps from untrusted sources contain malware that can steal data and install viruses just for starters . In addition , train users to be cautious about accepting all requested app permissions . Permission should only be granted to phone features the app needs to function properly . For example , why would a flashlight app need access to a phone ’ s camera , location data , and contact list ? Don ’ t grant these kinds of permissions to any app that doesn ’ t need them .
Finally , never donate , recycle , resell , or otherwise replace a smartphone without erasing all the data , signing out of and then deleting all downloaded apps , and resetting the phone to factory defaults . Letting go of a smartphone without properly deleting all data is just asking for trouble .
FRANCIS W . GASPER , founder of Gasper Investigations , LLC is an award winning retired FBI Agent , attorney and licensed private investigator located in North Dakota , who specializes in working with attorneys to prepare and engage in complex litigation ; clients include corporations and banks addressing fraud , employee malfeasance as well as background reviews .
HIGHLY SKILLED AT CONDUCTING :
• Comprehensive research
• Reviewing large amounts of financial records and data
• Identifying , locating , and interviewing witnesses
• Gathering and summarizing admissible documentary evidence
• Asset searches
CONTACT :
Francis W . Gasper Gasperinvestigations . com frank @ gasperinvestigations . com ( 914 ) 584-2225
Private Investigator ND # 588 , MN # 2321 , IL # 115002658 , NY # 1100221129 , Member of NY Bar
SPRING 2023 15