{"id":165,"date":"2020-07-09T02:41:47","date_gmt":"2020-07-09T02:41:47","guid":{"rendered":"https:\/\/www.shipndestroy.com\/blog\/?p=165"},"modified":"2020-07-09T02:41:47","modified_gmt":"2020-07-09T02:41:47","slug":"avoid-a-smartphone-security-breach","status":"publish","type":"post","link":"https:\/\/www.shipndestroy.com\/blog\/avoid-a-smartphone-security-breach\/","title":{"rendered":"Avoid a Smartphone Security Breach"},"content":{"rendered":"\n<p>Your smartphone is now a critical extension of your business, not just a novelty or convenience. Its tiny footprint often makes it easy to lose or misplace, or become a target of theft. Should disaster strike, your preparation in protecting your privacy and assets will spell the difference between a relatively minor financial loss and a complete disaster. Here are some steps you can take to secure your smart device and protect your assets:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Update your OS and apps promptly<\/li><li>Lock your devices<\/li><li>Use Find My Device&nbsp;<\/li><li>Be Mindful of your Wi-Fi usage<\/li><li>Use two-factor identification whenever possible.<\/li><li>Ignore spam and phishing emails<\/li><li>Backup your data<\/li><li>Securely dispose of old devices.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Use Ship n Destroy<\/strong><\/h2>\n\n\n\n<p>If you find vulnerabilities in your hardware, or need to upgrade, let us safely and securely destroy your hard drives, smart devices and desktops with our simple Ship n Destroy process. Learn more at <a href=\"https:\/\/shipndestroy.com\">https:\/\/shipndestroy.com<\/a><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Your smartphone is now a critical extension of your business, not just a novelty or convenience. Its tiny footprint often makes it easy to lose or misplace, or become a target of theft. Should disaster strike, your preparation in protecting your privacy and assets will spell the difference between a relatively minor financial loss and &hellip; <a href=\"https:\/\/www.shipndestroy.com\/blog\/avoid-a-smartphone-security-breach\/\">More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-165","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/posts\/165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/comments?post=165"}],"version-history":[{"count":1,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/posts\/165\/revisions"}],"predecessor-version":[{"id":166,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/posts\/165\/revisions\/166"}],"wp:attachment":[{"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/media?parent=165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/categories?post=165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/tags?post=165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}