11 Tips for protecting mobile phones and privacy

Being mindful of your own privacy and security is not a question of acute violent situations. However, especially in case of violent relationships or during and after separations, it is important to protect personal data and thus yourself. Why it is important to protect your own data is also explained here: Why technical security?

Stalking and (ex) partner violence can be dangerous, as can break-up situations. You can find a subpage on security planning here. A specialist counselling centre can help you decide when it is a good time to secure your devices in such a situation, and when you should perhaps wait to do so. Find a counselling centre near you here.

1. Always protect your mobile phone with a password

Most mobile phones can be protected against unauthorised access with a PIN or key combination. This password will make it more difficult for others to use the phone, read message histories or install malware. Even if your mobile phone is stolen, it is harder for anyone to obtain your personal information.

Using swipe patterns as a screen lock is not secure. The grease on our fingers leaves traces on the screen. This makes it possible to trace the pattern. Nor are fingerprints and facial recognition secure, as they make it easier to unlock the screen secretly or when under duress.

2. Using strong passwords and PINs

The passwords and key combinations used should not be easy to guess (e.g. your own birthday). PINs that are longer than 4 digits can usually also be used to protect smartphones. Different passwords should always be used for different accounts.

In case of specific security threats, it may make sense to change existing passwords. Otherwise, it is not necessary to change passwords regularly. It is more important to use a secure and unique password for each service and device. You can find additional information on creating passwords here: Secure passwords

3. Checking privacy and security settings

The smartphone's security settings allow basic control over which applications installed on the mobile phone have access to certain data and features. The settings can usually be made in the smartphone menu under ‘settings’. By using the right security settings, your own data (e.g. pictures, contacts, locations, call histories, etc.) can be protected.

4. Avoiding the ‘share location’ function

Many smartphones use GPS (Global Positioning System) to determine their location. This allows apps and other applications to collect information about your whereabouts and movements, and share it with others. It is recommended that you always switch off the ‘share location’ function. Under ‘settings’, you can set which applications and apps should have access to the GPS function. Some smartphones and apps do not offer specific settings, and there are apps that only work if the ‘share location’ function is activated. When downloading new apps, you should therefore note which functions are preset.

Configuring location services on iOS in a data-minimising way (in German)

Setting location functions for Android (in German)

5. Deactivating the Bluetooth feature

Bluetooth is used to connect with other devices, such as hands-free car kits. However, other people can also access our information via Bluetooth, for example through security loopholes in an outdated operating system. Whenever the Bluetooth feature is not used, it should always be disabled.

If you suspect that a Bluetooth tracker (e.g. AirTag) has been planted on you, you can search for it with the help of an app. These apps need access to Bluetooth and your location. To search for trackers, you can make an exception to the rule that Bluetooth and location should be switched off.  A women's counselling centre can help to weigh up what is more important at any given time. See also the subpage on security planning

6. Do not save passwords in apps and browsers

In order to have quick access to online accounts, some applications are preset in such a way that the smartphone is always connected to the respective account. This avoids the hassle of logging in before each use of the application. However, this also means that anyone who has access to the unlocked smartphone or the browser on your laptop can access the accounts directly without knowing the login details.

It is better to store the passwords in a password manager. You can find more information on this in the article: "Using digital services securely".

7. Checking your own apps

Any apps you do not know, and which you have not downloaded yourself, should be deleted.

If you think you do not know the app, it may just be an app you downloaded a while ago, which is no longer being used. However, there are also apps that are designed to monitor smartphone activities, such as calls and search queries, or to pass on information to the person who installed the app on the mobile phone. It is therefore important to keep an eye on which apps are installed on your mobile phone.

Apps that have been installed by the mobile phone manufacturer or the operating system needed for the mobile phone to function cannot normally be uninstalled. This means you won’t need to worry about accidentally deleting something.

It is okay to be a little unsure if, for example, you have never checked app permissions, or set up a new Wi-Fi router.  Instructions for many things can be found on the Web, such as those provided by device manufacturers or consumer centres. Regardless of whether you do it on your own or with someone helping you, it feels really empowering when you manage to do it – and you can do it!

8. Securing online accounts linked to the smartphone

In addition to the smartphone and its settings, the online accounts that are linked to the smartphone must also be properly secured. This may include: the online account with the mobile phone provider, Google Play/Apple App Store, iCloud & Google Drive, email access and social media accounts. Here, too, the security settings and passwords should be checked and, if possible, further measures taken to protect your data. By way of example, "two-factor authentication" can be set up with the mobile phone provider. In this case, registration and/or logging in takes place in two separate steps, for example through a password and a one-time password sent to you.

As a general rule, online activities should be spread across different devices. Not all existing accounts should be linked to the mobile phone.

9. Do not save sensitive data on your smartphone

The less sensitive data (such as passwords, official documents, access data or photos) is stored on the smartphone, the lower the chance that this data will be used by another person.

10. Checking Wi-Fi, smartphone clouds and apps for connected devices

Information can be intercepted with a secret login, for example, through an added device that is logged into the iCloud / Google Cloud of your smartphone. The person secretly logged in can then view all the data that is synchronised into the cloud. It is also possible to activate access to messengers, such as WhatsApp, from a browser. Data traffic and telephone connections can sometimes be spied on when accessing a router. As a result, it is important to remove unknown devices, or any that are logged in but unwanted, from all devices and services.

11. Getting support

If you have problems with your mobile phone settings or questions about security and privacy, specialists can help. It is safest to seek support from professionals. However, you can also ask trusted friends for help. In some cases, counsellors from specialist counselling centres can help or recommend experts. Media projects or organisations that are concerned with data protection can also provide information on security settings.

You can find plenty of useful information on the subpage, which provides further support and information (in German)