How to protect your Android phone from malware


Android is the most popular mobile operating system in the world. Its open source nature brings versatility and added functionality and enables manufacturers to add their own tweaks and features.

This obviously has huge benefits but it does have a downside – Android is more susceptible to malware and therefore it is important users protect their phone or tablet in the same way they would their PC.

Luckily, protecting your device is free and very straightforward.

Here are our tips to help you to secure your Android phone:

1. Update your device with the latest version of Android

Make sure that your device is running the latest version of Android, or at least the most recent version that is available on your phone, as this will be the most secure.

You can do this by going to: Settings > About Phone (Tablet) > Software (System) Update. Your device will either update or inform you that your software is up to date.

2. Don’t install apps from unknown sources

Make sure that your device is only setup to download apps available from the Google Play store. Simply go to: Settings > Security > Device Administration > Unknown sources – make sure that this box is unticked.

3. Restrict downloads

You can restrict downloads by adding a password.

This is useful for parents who don’t want their children installing expensive apps without their knowledge.

To check go to: Settings > User Control > Parental Controls and turn the slider to the ON position.

4. Check permissions

Many of us are guilty of skipping through permissions when downloading an app but it is important to read and fully understand them. If not, you could be installing apps that could be potentially damaging.

5. Install antivirus software

There are lots of different free antivirus software available. Choose one from a well-known company and you will save yourself from potential headaches.

6. Use common sense!

Common sense should always come into play when downloading anything.

Always be cautious online and avoid suspicious links and anything that does look suspicious should be deleted. Don’t forget that these links can come from trusted sources so always be vigilant.


Comments are closed.