The more layers of defense you set up, the better. Consider how often you have had important personal information left on your voicemail (and how many times you've left important details on someone else's voicemail) -- information like lab results, financial details, credit card numbers, your birth date or Social Security number -- to name a few. Hackers can break into your voicemail. To protect yourself, set up a password for retrieving voicemail and be careful about the details you leave on someone else's voicemail.
Be aware of the personal identification numbers (PINs), account information or passwords you have stored in your phone. Not only can hackers hack your cell phone, but what happens if you lose this receptacle of valuable information? Consider using the password-protected safety feature on your phone to keep these precious details away from greedy hands.
The whole phone
Most cell phones have password protection capability. Check in the set-up function where you'll find that your password protection option is probably disabled -- activating it and then choosing a password will protect the entire phone in case it's lost or stolen. Just like you would never leave your open wallet sitting around, you should never leave your phone without protection either. Lock your phone the same way you lock your computer when you aren't using it.
Cell phone account
Not only should you protect your phone, you also should protect your cell phone account. Using a PIN to authorize any changes to your cell phone service makes it harder for others to gain access and make any unauthorized changes.
Beware what you download
The same goes for downloading to your phone as it does for your computer -- before you buy (and download), be sure you're purchasing from a trusted source. Some of those cool applications you're putting on your phone may be the latest version of the Trojan horse, sneaking in under cover and accessing important information -- such as location and contact details. For apps, stick with trusted marketplaces and vendors. If you are considering downloading an app from an unfamiliar place, check reviews and research for other details first to be sure you're installing a safe app. Also, just like when you're using your PC, don't click strange links in your email or download attachments from strangers -- they may be phishing scams.
Always keep your software and apps updated. Outdated software can leave you vulnerable to attacks.
More about protecting your identity
What makes shopping online unsafe?
6 Online shopping habits to avoid
10 Signs you may be a victim of identity theft