O'Reilly logo

Mobile Security: How to Secure, Privatize, and Recover Your Devices by Mari Heiser, Jaya Nampalli, Joseph Anderson, Darla Nykamp, Tim Speed

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Getting Your Life Back After You've Been Hacked

By following the advice contained in this book, you will be able to reduce the likelihood of your device or information getting hacked. However, it is important to remember that hackers may still, despite our best intentions, be successful in their attempts at hacking our devices. Every user should prepare a list of steps, phone numbers, and device information in the event that a device or information is hacked. With such a list in hand, a user will reduce the time and frustration entailed in containing the damage and getting life back on track after an incident.

This chapter will show:

  • What is included in a device profile and why this is important to you
  • Why backups are important
  • What to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required