{"id":84325,"date":"2018-02-10T07:00:34","date_gmt":"2018-02-10T15:00:34","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=84325"},"modified":"2025-08-05T09:27:17","modified_gmt":"2025-08-05T16:27:17","slug":"8-ways-hack-proof-familys-smartphones","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/","title":{"rendered":"8 Easy Ways to Hack-Proof Your Family\u2019s Smartphones"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-84326\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/shutterstock_383679217-300x200.jpg\" alt=\"\" width=\"360\" height=\"240\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/shutterstock_383679217-300x200.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/shutterstock_383679217-768x512.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/shutterstock_383679217-750x500.jpg 750w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/shutterstock_383679217.jpg 1000w\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" \/>Smartphones have changed the face of parenting in profound ways. But for all the efficiency they\u2019ve introduced into family life, those same devices simultaneously bring risk.<\/p>\n<p>With smartphone and tablet use growing at ten times the rate of PCs, hackers know precisely where to shift their focus these days. Cyber thieves love smartphones because once inside, they can access private information, location, email, photos, social media, and bank accounts.<\/p>\n<p>If you\u2019re a parent, a smartphone breach is an even bigger deal. Shoring up the security gaps in your phone isn\u2019t a big deal but what about the other four or more smartphones under your roof? If you were to multiply the risk, you\u2019d soon realize the potential havoc that\u2019s looming.<\/p>\n<p>While you can\u2019t shut out every digital risk, you can tackle the most prominent ones. Let\u2019s get started!<\/p>\n<h2><strong>8 Ways to Hack-Proof Your Family\u2019s Smartphones<\/strong><\/h2>\n<ol>\n<li><strong>Think Like a Criminal.<\/strong> Work a potential hack backward. Look at every possible entryway into your phone and ask yourself, \u201cHow could I get into this phone if I were determined?\u201d Then, methodically lock up each digital door. Challenge yourself to find every security gap. Examine your password strength, social profiles, web browsing security, general and app settings.<\/li>\n<li><strong>Juice Up Your Password.<\/strong> How do you create a password that a criminal can\u2019t hack? With great intention and a few extra layers. <strong>1)<\/strong> Avoid the common error of using easy passwords such as \u201c12345\u201d or \u201cpassword.\u201d Get complex and create a combination that isn\u2019t logical. <strong>2)<\/strong> Use multi-factor authentication (MFA). Having multiple factors to authenticate your phone use such as your fingerprint, face, or a trusted device, increases security. Most smartphones offer MFA so, even if it seems tedious, use it. The more factors \u2014 or digital layers \u2014 you can combine, the more protected your smartphone will be. Too many passwords crowding your brain? Consider a <a href=\"https:\/\/www.truekey.com\/\">password manager.<\/a><\/li>\n<li><strong>Trust No App.<\/strong> Not all apps you download to your phone are created equal. Many third-party apps do not go through rigorous security vetting of Google or Apple. Hackers can infect apps with malware or viruses that demolish your phone\u2019s security and allow hackers access to your data. Beware. Examine all apps, read reviews, and steer clear of apps that ask for too much access. Even legitimate apps can be used for malicious purposes such as listening in via a phone\u2019s microphones and <a href=\"http:\/\/www.abc.net.au\/news\/2017-10-24\/spyware-apps-that-can-track-your-every-move\/9042680\">even spying<\/a> using a phone\u2019s camera. To pull back an app\u2019s access, just go to your settings. On Android: Go to Apps and Notifications, choose App Permissions and make changes. On iOS: Go to your settings, select Privacy, and make changes to app permissions accordingly.<\/li>\n<li><strong>Passcode, Track Your Phone.<\/strong> Be proactive in case your phone gets stolen or lost. Make sure your device is passcode and fingerprint protected. Take a few minutes to enable phone tracking. For Android, you\u2019ll download the app Find My Device and for Apple use Find My iPhone. Make sure those apps are always enabled on your phone. If your phone is lost or stolen it can be tracked online. <img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-84327\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/shutterstock_582260458-200x300.jpg\" alt=\"\" width=\"257\" height=\"386\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/shutterstock_582260458-200x300.jpg 200w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/shutterstock_582260458-334x500.jpg 334w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/shutterstock_582260458.jpg 667w\" sizes=\"auto, (max-width: 257px) 100vw, 257px\" \/><\/li>\n<li><strong>Log out, Lock Online Services.<\/strong> If you bank, shop, or access sensitive accounts via your smartphone do it with extreme care. This means logging out and locking those accounts when not in use and avoiding using auto-login features. Instead, use a password manager app the forces you to re-enter a master password each time you want to access an account. It\u2019s worth the extra step. An essential part of this equation is disabling keychain and auto-fill in your browser. You can do this by finding your web browser in Settings and toggling each option to OFF. Also, avoid using public Wi-Fi for accessing sensitive accounts or conducting any transactions.<\/li>\n<li><strong>Turn Off Bluetooth.<\/strong> Bluetooth carries inherent vulnerabilities and is another open door for hackers to enter. When Bluetooth is turned on it is constantly looking for other open connections. Hackers work quickly through open Bluetooth connections, and often victims don\u2019t even know there\u2019s been a breach (there\u2019s no evidence a phone has connected with a criminal source). Make sure to switch Bluetooth off if you are not using it.<\/li>\n<li><strong>Take Updates Seriously.<\/strong> Because people design phones, phones will be flawed. And, it&#8217;s just a matter of time before a hacker discovers and exploits those flaws. Developers use updates to combat all kinds of breaches, which make them critical to your phone\u2019s security. Along with staying on top of updates, consider the added safeguard of antivirus, identity, and <a href=\"https:\/\/www.mcafee.com\/consumer\/en-us\/store\/m0\/catalog\/mtp_521\/mcafee-total-protection.html?pkgid=521\">privacy protection<\/a> that covers all family devices.<\/li>\n<li><strong>Stop! Don\u2019t Click that Link.<\/strong> Unless you are 100% sure of the legitimacy of a link sent to you through text, email, or direct message, do not click it. Random links sent by hackers to access your data are getting more and more sophisticated as well as destructive.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-83320\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/12\/Toni_headshot2017_FNL-copy-300x300.jpg\" alt=\"toni page birdsong\" width=\"123\" height=\"122\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/12\/Toni_headshot2017_FNL-copy-300x300.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/12\/Toni_headshot2017_FNL-copy-150x150.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/12\/Toni_headshot2017_FNL-copy-768x768.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/12\/Toni_headshot2017_FNL-copy-1024x1024.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/12\/Toni_headshot2017_FNL-copy-500x500.jpg 500w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/12\/Toni_headshot2017_FNL-copy-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/12\/Toni_headshot2017_FNL-copy-50x50.jpg 50w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/12\/Toni_headshot2017_FNL-copy-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/12\/Toni_headshot2017_FNL-copy-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/12\/Toni_headshot2017_FNL-copy-128x128.jpg 128w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/12\/Toni_headshot2017_FNL-copy.jpg 1728w\" sizes=\"auto, (max-width: 123px) 100vw, 123px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><em>Toni\u00a0Birdsong is a <\/em><em>Family Safety Evangelist<\/em><em> to <\/em><a href=\"http:\/\/home.mcafee.com\"><em>McAfee<\/em><\/a><em>. You can find her on Twitter <\/em><a href=\"https:\/\/twitter.com\/McAfee_Family\"><em>@McAfee_Family<\/em><\/a><em>. (<\/em><em>Disclosures<\/em><em>).\u00a0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Smartphones have changed the face of parenting in profound ways. But for all the efficiency they\u2019ve introduced into family life,&#8230;<\/p>\n","protected":false},"author":642,"featured_media":154456,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1838,12],"tags":[3953,3944,76,3949,4452,5391,5390,4449,142,180,214,4185,2205,5392,4222,321],"coauthors":[3359],"class_list":["post-84325","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","category-family-safety","tag-antiphishing","tag-antivirus","tag-cybercrime","tag-cybersafety","tag-cybersecurity","tag-family-smartphones","tag-hack-proof","tag-hacking","tag-tag-identity-theft","tag-malware","tag-mobile-security1","tag-phishing","tag-protecting-kids-online","tag-smartphones","tag-social-media","tag-social-networking"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>8 Easy Ways to Hack-Proof Your Family\u2019s Smartphones | McAfee Blog<\/title>\n<meta name=\"description\" content=\"We love our smartphones but so do hackers. Here&#039;s how to make sure your family&#039;s favorite device \u2014 the smartphone \u2014 is safeguarded.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8 Easy Ways to Hack-Proof Your Family\u2019s Smartphones | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"We love our smartphones but so do hackers. Here&#039;s how to make sure your family&#039;s favorite device \u2014 the smartphone \u2014 is safeguarded.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-10T15:00:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-05T16:27:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/shutterstock_383679217.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Toni Birdsong\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Toni Birdsong\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/\"},\"author\":{\"name\":\"Toni Birdsong\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/43ae9712cde24fe81854f2daa0af1228\"},\"headline\":\"8 Easy Ways to Hack-Proof Your Family\u2019s Smartphones\",\"datePublished\":\"2018-02-10T15:00:34+00:00\",\"dateModified\":\"2025-08-05T16:27:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/\"},\"wordCount\":845,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png\",\"keywords\":[\"antiphishing\",\"antivirus\",\"cybercrime\",\"cybersafety\",\"cybersecurity\",\"family smartphones\",\"hack-proof\",\"hacking\",\"identity theft\",\"malware\",\"mobile security\",\"Phishing\",\"protecting kids online\",\"smartphones\",\"social media\",\"social networking\"],\"articleSection\":[\"Mobile Security\",\"Family Safety\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/\",\"name\":\"8 Easy Ways to Hack-Proof Your Family\u2019s Smartphones | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png\",\"datePublished\":\"2018-02-10T15:00:34+00:00\",\"dateModified\":\"2025-08-05T16:27:17+00:00\",\"description\":\"We love our smartphones but so do hackers. Here's how to make sure your family's favorite device \u2014 the smartphone \u2014 is safeguarded.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png\",\"width\":1250,\"height\":675,\"caption\":\"mobile finance apps\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"8 Easy Ways to Hack-Proof Your Family\u2019s Smartphones\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/43ae9712cde24fe81854f2daa0af1228\",\"name\":\"Toni Birdsong\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/de48b651aa67772c9c2a8d7e7eee076a\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2016\/10\/Toni-Black-Shirt-Headshot-150x150.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2016\/10\/Toni-Black-Shirt-Headshot-150x150.jpeg\",\"caption\":\"Toni Birdsong\"},\"description\":\"Toni Birdsong began her career as a reporter in Los Angeles and later became a writer for Walt Disney Imagineering. Her passion for digital safety started 10 years ago as a way to gain the survival skills she needed to parent her own connected teenagers. Her goal with each post is to give busy parents the insight they need raise wiser, more compassionate digital kids. When she\u2019s not writing (her first love), you can find Toni hiking, watching TikTok, or trying not to break an important body part at CrossFit.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/toni-birdsong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"8 Easy Ways to Hack-Proof Your Family\u2019s Smartphones | McAfee Blog","description":"We love our smartphones but so do hackers. Here's how to make sure your family's favorite device \u2014 the smartphone \u2014 is safeguarded.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"8 Easy Ways to Hack-Proof Your Family\u2019s Smartphones | McAfee Blog","og_description":"We love our smartphones but so do hackers. Here's how to make sure your family's favorite device \u2014 the smartphone \u2014 is safeguarded.","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-02-10T15:00:34+00:00","article_modified_time":"2025-08-05T16:27:17+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/shutterstock_383679217.jpg","type":"image\/jpeg"}],"author":"Toni Birdsong","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Toni Birdsong","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/"},"author":{"name":"Toni Birdsong","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/43ae9712cde24fe81854f2daa0af1228"},"headline":"8 Easy Ways to Hack-Proof Your Family\u2019s Smartphones","datePublished":"2018-02-10T15:00:34+00:00","dateModified":"2025-08-05T16:27:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/"},"wordCount":845,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png","keywords":["antiphishing","antivirus","cybercrime","cybersafety","cybersecurity","family smartphones","hack-proof","hacking","identity theft","malware","mobile security","Phishing","protecting kids online","smartphones","social media","social networking"],"articleSection":["Mobile Security","Family Safety"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/","name":"8 Easy Ways to Hack-Proof Your Family\u2019s Smartphones | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png","datePublished":"2018-02-10T15:00:34+00:00","dateModified":"2025-08-05T16:27:17+00:00","description":"We love our smartphones but so do hackers. Here's how to make sure your family's favorite device \u2014 the smartphone \u2014 is safeguarded.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png","width":1250,"height":675,"caption":"mobile finance apps"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/8-ways-hack-proof-familys-smartphones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"8 Easy Ways to Hack-Proof Your Family\u2019s Smartphones"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/43ae9712cde24fe81854f2daa0af1228","name":"Toni Birdsong","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/de48b651aa67772c9c2a8d7e7eee076a","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2016\/10\/Toni-Black-Shirt-Headshot-150x150.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2016\/10\/Toni-Black-Shirt-Headshot-150x150.jpeg","caption":"Toni Birdsong"},"description":"Toni Birdsong began her career as a reporter in Los Angeles and later became a writer for Walt Disney Imagineering. Her passion for digital safety started 10 years ago as a way to gain the survival skills she needed to parent her own connected teenagers. Her goal with each post is to give busy parents the insight they need raise wiser, more compassionate digital kids. When she\u2019s not writing (her first love), you can find Toni hiking, watching TikTok, or trying not to break an important body part at CrossFit.","url":"https:\/\/www.mcafee.com\/blogs\/author\/toni-birdsong\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/642"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=84325"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84325\/revisions"}],"predecessor-version":[{"id":214149,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84325\/revisions\/214149"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/154456"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=84325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=84325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=84325"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=84325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}