Debido a la inactividad, tu sesión finalizará en aproximadamente 2 minutos. Prolonga tu sesión haciendo clic en "Aceptar" a continuación.

Tu sesión ha terminado debido a inactividad. Vuelve a ingresar para continuar.

Cómo proteger tus dispositivos móviles

    1. About securing your device

    Si eres usuario de un smartphone o tablet, es muy probable que tengas mucha información personal guardada en tu dispositivo. Emails, passwords, photos and financial data can be accessible with a swipe of a finger. Tener un acceso instantáneo a tu información es cómodo, pero tenerla en tu dispositivo móvil puede dejarte un tanto vulnerable si lo pierdes o te lo roban.

    Los siguientes pasos pueden ayudarte a asegurar tu dispositivo, dejando tu información personal segura, incluso si tu dispositivo cae en manos equivocadas.

    2. Secure your screen with a strong password

    Your device may have a variety of options to secure the screen, which can include a 4-digit PIN, a finger swipe pattern and even facial recognition. While each method varies in level of security, one of the best methods to secure your screen is by using a strong password. The features of a strong password are:

    • At least 8 random characters
    • A variety of character types including letters, numbers and symbols

    Avoid using dictionary terms and personal information that's commonly known or can be easily guessed, like a family member's name or birthday.

    En los dispositivos Apple®, busca las configuraciones de contraseñas en la pantalla Settings dentro de contraseña.

    For instructions on setting screen security on other devices, visit your device's Device Tutorial, and look under the First Time Use section.

    3. Turn on your device's auto-lock feature

    Configurar tu dispositivo para que la pantalla se bloquee automáticamente luego de un período de tiempo de inactividad puede protegerlo de accesos no deseados. Utilizar el bloque automático junto con una contraseña garantiza que otras no puedan acceder fácilmente a tu dispositivo, incluso cuando lo dejas sin tu supervisión.

    Para obtener más información sobre las configuraciones de bloqueo automático, consulta el manual del usuario de tu dispositivo.

    4. Install a trusted security app

    Security apps, like the Verizon Protect app, help protect your device and your sensitive information from viruses, malware and theft.

    5. Be cautious when installing apps

    Only install apps from trusted sources, like Google Play™ Store or Apple ® App StoreSM. Avoid installing unofficial versions of popular apps and apps from unknown developers. Read app reviews and check app permissions, making sure the permissions granted are necessary for the app to function.

    6. Install operating system (OS) updates when available

    OS updates often contain new security features and important patches. Be sure to install OS updates when prompted.

    For more information on available updates for your device, check our Software Updates page.

    7. Avoid using unsecured, public Wi-Fi networks

    Public Wi-Fi networks generally don't include security, leaving the data on your phone unprotected. Cuando realizas transacciones bancarias móviles o realizas compras en línea, pasa el dispositivo a datos móviles o espera hasta poder conectarte a una red Wi-Fi segura y confiable.

    Siempre debes salir de los sitios de compras o financieros luego de realizar un pago o ver información confidencial y no guardes contraseñas en tu dispositivo.

    8. Turn off Bluetooth® and Wi-Fi when not in use

    Bluetooth and Wi-Fi allow you to connect to other devices and networks, but they can also leave your device open to unwanted connections. Asegúrate de conectarte únicamente a dispositivos confiables y redes seguras, y de desactivarlas cuando no las estás utilizando.

    For instructions on turning on Bluetooth and Wi-Fi, visit your device's Device Tutorial.

    9. Beware of suspicious emails, text messages, and links

    Your mobile device has similar vulnerabilities to a computer when it comes to suspicious communications and phishing. Don't open, tap on or reply to anything that looks suspicious. Beware of messages that look as if they're coming from a legitimate entity or person but have a generic greeting, ask you to verify personal or account information and include a false sense of urgency.

    If you receive an email that seems fraudulent, you can send it to phishing@verizonwireless.com for our internal review.

    Si recibes un mensaje de texto sospechoso, puedes reenviarlo al 7726 (seguridad corporativa de Verizon) desde tu dispositivo y luego borrarlo.

    Learn more about phishing.

    10. Turn off location tracking services

    Location tracking services are typically used by apps to deliver personalized, location-based information, including driving directions, traffic updates, and local weather. While these services are often useful, leaving location tracking on may allow others to know where you are and your location history.

    For instructions on turning off location tracking, visit your device's user manual.

Apple y App Store son marcas comerciales registradas de Apple Inc.