When talking to colleagues and friends, it appears that folks do not understand how their smartphones work and the data that can be accessed through them. This prompted me to again give basic steps that can be used to protect personal information that can be accessed, legitimately and in an unauthorized manner through the settings … Continue Reading