Page 12 - AO 1st QT 2017 PL
P. 12
6. Make smart app purchases
Cernak recommends only purchasing apps from recognized app stores such as Google or iTunes, because those purchased from third par es may not have the same level of tes ng for aws.
Also make sure to read the privacy policies so you know who has access to your informa on, what informa on is being accessed, and with whom it will be shared. Beware of downloading any apps that prompt you to do a quick download, because these versions may include malicious code or security aws that would allow hackers access to your device.
7. Turn o the Bluetooth op on
When you’re not using the Bluetooth feature on a device, turn it o to prevent any ambient listening or access by unauthorized persons. Most mobile phones, tablets, and other items o er this type of func onality. Devices such as baby monitors and smart speakers can then be hacked through the Bluetooth func on.