Vivo and Samsung give tips on how to protect your smartphone

by Kelvin

Chat made between Vivo and Samsung at Digital Labs featured digital security professionals and tips on how to protect your smartphone

THE Vivo invited the press to a conversation about data security and digital connections at Digital Labs, a São Paulo center designed to foster the startup mindset and digital innovation. The chat was attended by representatives of the operator and the Samsung, partner in security solutions.


Nelson Uto, Safety R&D in the Samsung Brazil, begins by explaining that Samsung strives to provide a great user experience on your devices, while maintaining safety concerns.

Nelson Uto talks about security at Samsung event / VivoNelson Uto, Security R&D at Samsung Brazil, says Samsung strives to provide users with the best experience

Uto says it is not enough to offer security, saying that the obligation of engineers and developers should “Help the user to protect themselves”by creating interfaces and providing clear and easy to understand information.

How to create a security solution

Second Nelsonwhat types of threats the user is subjected to – and they are many as seen in NCSC Threat Glossary. The glossary has a series of phrases and phrases intended to create a simple definition set for common cyber security terms. In the case of wireless (Wi-Fi) connections, for example, there is a possibility that the user will be attacked or privacy violated when accessing insecure networks.

Thinking about this risk, the Samsung launched from the Galaxy S10, a wireless security module that detects network insecurity Wifi and prevents the user from connecting to them. Due to sophisticated hacking tactics, protection goes beyond software and is aided by smartphone hardware components.

Continuous analysis

Each day, hackers identify vulnerabilities in one or more electronic devices and use them to design attacks. After this happens, many devices become infected with the malware.

By identifying this occurrence, companies such as Samsung evaluate samples of malware and give it to the reverse engineering team to come up with a solution. Then the patch is developed and distributed, and as such, all devices with the vulnerability are expected to become protected.

Samsung safety net on devicesSamsung Evaluates Malware Samples to Develop Security Patches for Devices That Are Possible to Attack

“Software cannot protect software alone”states Nelson. For this reason, he explains that software measures are created combined with the hardware capabilities of the devices. In some cases, to protect a smartphone, for example, the system even "burn" an internal hardware component, blocking the physical and actual form violation.

Security through Samsung Knox

William Comar, responsible for the solutions Knox gives Samsung focused on the corporate market, comments on this platform that comes embedded in Samsung

“The platform Knox has been under development since the launch of Galaxy S4. The feature already has security approvals granted by several governments around the world. ”

William Comar, Responsible for Solutions Knox gives Samsung

Samsung Knox is present in the latest devicesKnox is Samsung's government-level mobile security platform embedded in newer devices.

O Knox works with additional layers to the device's operating system and includes hardware integrity checks, startup check processes (secured & trusted boot) and device kernel integrity measurement architecture. These are all steps that may block access to malware or illegal activity.

All of this security has also been extended to non-corporate users with the arrival of Secure Folder. Based on the same security criteria as corporate devices, the Secure Folder It is encrypted and creates an environment where the user can save files and even install applications so that they are protected by additional layers of security.

Data Protection

Ruben Longobucco, responsible for the safety of Phone / Vivo, recalls that the operator has areas responsible for digital security, property security and governance.

He begins by talking about the LGPD (Data Protection and Privacy Act), explaining that the operator has already developed a whole working methodology to adapt to the new law, which will come into force in august 2020. The operator will perform workshops with suppliers, where it explains how companies can adapt to this new reality.

Biometry in the services of Vivo

THE Vivo implemented in March 2019, an online facial and documentary biometrics system for customers in authorized own stores and resellers throughout Brazil. The project brings safety and loss reduction, generates convenience, agility, promotes digital experience and enhances customer experience.

Vivo  and Samsung give tips on how to protect your smartphone 5Biometrics is present in the most diverse services in order to bring more data security to users.

It includes customer service, customer selfie photo, document scanning, voice capture, digital contract signing and service scheduling. Everything is done by the attendant of the Vivo, with features installed on a tablet.

Customer data collected by Vivo / Telefônica They help the company identify behavioral patterns that, if broken, can alert the company to fraud.

Stolen Devices: How to Avoid Data Access

THE Vivo recommends that consumers use the device's encryption features (available on Knoxfor example) to minimize data leakage in the event of a lost or stolen smartphone.

Another important feature, but not always activated by the user, is the “Find my device”. Devices Android and iPhones have this kind of tool preinstalled on their smartphone, but not everyone knows that in order for them to work, you need to access, configure and test the feature before an eventuality happens.

How to enable Find My Device on Android and iPhone

The tool provided by companies is extremely important for the protection of your data in case of loss or theft of the device. Learn how to enable the function to lock your data or even erase it from your device remotely:


At the Android, Visit the Find Your Smartphone From Google and select the device to find in the list.

Vivo  and Samsung give tips on how to protect your smartphone 6

Select the action for that device, such as sound an alarm, locate on Google Maps, lock the device or simply clear all data of the device. Remember that the device must be switched on for the chosen action to occur.


Sign in to using a Mac or PC and select the device from the list to find.

Vivo  and Samsung give tips on how to protect your smartphone 7

In the bottom bar, select the action for that device. THE Apple allows the action of sound an alarm, put on lost mode, where the user places contact information on the lock screen to facilitate contact with the owner, or delete datawhere all device data will be deleted. Remember that the Apple allows these actions to be performed on a device offf-line, but the action will occur only when it becomes online.

Liked the safety tips from Vivo and Samsung? Tell in the comments which security measure you use in the comments.