In Today’s modern time mobile is the most engaging gadget we use everyday. Research shows that almost everyday 4 hrs is spent by people on using mobile. So we can imagine that how important is mobile app right now to consumers. Most of the eCommerce brand gets much more orders from mobile apps than through website. So making an app in mobile is not a secondary now-a-days, its required. Then the debate comes what technology we will use developing the mobile app. Here i am briefing some important points that we all keep in mind while choosing a Technology.


Hybrid Mobile Apps:

Hybrid mobile apps are those apps which are built in technologies like ionic, Phonegap , etc. They are basically a website wrapped in a native container which can connect the phone underlying hardware. Here are some advantages of it:

  1. We can build  a mobile app in ionic and that app can be used both in IOS and ANDROID. So basically building a single app with some customization based on mobile os we can use that app in both major mobile os platform.
  2. They are comparatively cheaper to built because we are building one app for multiple platforms, though some customization needed to port it to different mobile OS.
  3. Upgrading is easy because we have to upgrade one codebase and that will be applicable to all the platforms
  4. User Interface will look same in IOS and Android.

We had looked some advantages of Hybrid App. Lets have a look at some disadvantages now

  1. They are hugely slow in User Interface than Native Apps.
  2. The look and feel of User Interface is more like website than an app.
  3. Some features are not supported by Hybrid Apps.
  4. Your apps can get outdated if Google or Apple stop giving support for some libraries that this hybrid apps .support to contact the phone hardware.

Now lets discuss Native Apps

Native Apps: 

Native apps are those apps which are built on the platform that are given or built by the owners of respective mobile os companies like android and ios. For Android we use Java and for IOS we use swift. Both have their respective IDE for android its Android Studio and for IOS is Xcode. Lets discuss some advantages of it:

  1. They are fast and User Interface is very smooth.
  2. They don’t look like websites , they look like more mobile apps and their UI resembles their OS. So for example the app in android will look like android and same for IOS.
  3. Support for technology will be provided by the OS manufacturer so you need not to worry about that.
  4. The user experience will be much better and hence it will be uninstalled much less than any hybrid apps.

Lets look at the disadvantages of Native Apps :

  1.  They are more costly because we need to built separate apps for separate platforms
  2.  Upgradation is time consuming because we need to upgrade in both platforms.

So we saw the advantages and disadvantages of both technologies . We Digifrizz Tecnnolies LLP develop both type of Apps but our recommendation to client is always native. It is because it feels more like an app than a website and user experience is far more superior.

So contact us  Today for free evaluation of your business need for mobile apps and we are happy to serve you.

Happy Business

India is a vast country with the best talents in Information Technology Industry. The cost in India is cheap compared to the USA, UK, etc. Easy available of talents and low rate of talents prove beneficial to companies to outsource the projects to India. The main reasons are as follows:

  1. Cheap talent available around $15/hr
  2. Quality of talent is excellent
  3. Good ROI
  4. You can more focus on advertising rather than development
  5. More spending in an advertisement for acquiring new clients and less spending development hence greater ROI In an advertisement
  6. Peace of mind
  7. Development setup not needed thus saves a lot of costs
  8. Easy contactable to the developer through skype and other IM tools
  9. Very Good setup in India without worrying for monthly rates.
  10. Greater overall satisfaction.

So why wait for contact Digifrizz now for free consultation.

Who doesn’t want to persuade the significant number of customers and drive them to choose own offerings?

Ultimate marketing success hinges on a comprehensive understanding of customer behavior and establishment of sustainable customer-centric relationship.

Now the question is ‘How?’

Interaction is the base pillar of everything whether you are doing business, or serving your audiences. However, advance technology implications in the business market, as well as an advanced lifestyle of consumers, gigantically change the eyesight of marketing.

Nothing is there to tell you how digital marketing service transforms the path of your marketing. But, the story doesn’t end here. Do you know how can you have complete utilization of digital marketing functions to improve your marketing communication? 

Amazingly, marketers have gained traction over the past few years through high intense communication process by fueling their digital marketing services in Kolkata. Digital technology installed devices grant the ease in the flowing process of digital marketing services.


Improve your customer engagement with better communication!

The most fundamental and complex part of digital marketing services in Kolkata is the effort marketers contribute.

  1. Active Interaction through Social Media channels

Let me clarify before you take me wrong!

Being in social media and significant utilization of social networks is completely different.

  • May all of your target audience NOT actively pay heed on your social network sites. So, you must have to reach out to your INACTIVE AUDIENCE.
  • In digital marketing services, promoting your products through social networks is the base idea. But, providing information is not enough; you have to promote it with the intention of influencing customers’ buying behavior.
  • Know certain times of the day when your audiences are actively engaged on social networks. This is the time when you have the highest impact on them.
  1. Personalized Email Communication

Email marketing performance has a crucial impact on email communication which rates your digital marketing services in Kolkata.


In most of the cases, marketers generate 4 to 5 buyer personas without considering its accuracy level. You must check which customer fits best in which segment by identifying every little detail.

  • Content repetition is BLUNDER!

Know the need and influential factors of each segment, and create content which influences their psychological traits the most.

Bring comprehensive alignment between your marketing communication, customer-centric engagement approach, and digital marketing services to high your sales enormously.


Nearly 90% of brands opt for influencer marketing and found it effective. 

Positive return on investment is everyone’s goal, but how many of you actually know the driving tactics of surviving the brand competition?

You may find yourself asking all the time “Why others are ahead of me when I too applied the same digital marketing policies?”

Influencer marketing is not as new as you live and breathe it while doing online marketing nowadays. Did you get what you had expected before executing your influencer marketing campaigns?


Well, the problem is not in the policy you applied, rather it is the lack of smartness. Your journey will decide on your destination. Think different to get different!

All you have to do is to consider the MOST CRUCIAL things when tracking influencer marketing.

Track right to get better—


You should always have a clear visual impression of ‘what you expect’ and ‘what you need’. When your needs collide your expectation, the ultimate goal is formulated.

Obtaining the main target is broader in concept. So, split your ultimate goal into small targets to achieve it easily.


Before you define your ideal influencer, you have to define your needs or wants. Let me explain it for better understanding.

Suppose, your target is to enhance brand awareness, they must choose top influencers. On the flip side, in case, you are targeting to attain audience, you may work with micro-influencers (follower base of up to 10,000 are known as Micro-Influencers).

Factors you need to check when choosing your ideal influencer for influencer marketing:

  • Have the ability to engage a large number of audience
  • Have the ability to add value to the content
  • Relevancy with your industry or campaign or brand
  • The link between your target market and influencer’s follower base


You can change your brand perception in the eyes of your target market by sponsoring your brand by influencers.

Influencers have a gigantic number of followers and hence they can effectively promote your brand to a large audience even if your brand is new in the market. Influencer marketing lifts your brand in the right market where most of your audience belongs to.


Deliver user-centric content through influencer marketing so that your audience can connect themselves with your offerings. Create different content for different marketing platforms so that you can grab your customers’ attention everywhere.

Now, you should keep changing your strategy from time to time, by checking your customers’ response towards your content. This would help you to generate more user-centric content.


Social listening tools connect you to your customers and help you in understanding their psychological traits. Pay heed on the sentiments people shares for your brand while doing influencer marketing.

Honesty is the best policy! Be honest when you are connecting to your target market to build brand trust.


You goal-based performance metrics should be—

  • Degree of content authenticity: Number of original and authentic content created that audience can rely on.
  • Product launch promotion: Level of engagement 
  • Conversion: Number of generated conversions, click-throughs, and so on.
  • Brand awareness: Engagement level, number of click-throughs, impressions, and so on. 



Influencer marketing is not only about tracking the overall campaign. After you promote your brand by your selected influencers, you need to keep close-eye to each influencer. Then only you understand which influencer’s activity leaves a better impact on your audience.

Are you afraid of the complexity of hyper connected world? People are getting smarter with everyday internet use, and here you are still giving perplexed look with a pop-up over your head ‘HOW TO?’

I know it’s a real life problem that you are embarrassed of sharing with others. Trust me! There is nothing ashamed of for being layman. May be, you don’t know, but you are not alone. The difference is that, they are hovering over ‘HOW TO’ in every possible time.

You really don’t need to have technical background in order to start-up your business or attain success.

Well, all you need is a ‘HOW TO GUIDE’ for all ‘MUST-KNOW FACTS’.

1. How to secure your data on public Wi-Fi networks?

5 tips to follow to secure your data on public Wi-Fi—

  1. Safety with VPN (Virtual Private Network):

Public Wi-Fi network is the popular hunting ground for cyber criminals. Nothing makes you happy like letting you access free public Wi-Fi. Isn’t it? VPN is the most secure option to keep your information safe when logged on to public networks. It actually encrypts your internet activity while are using public Wi-Fi network. Cyber hackers cannot access the tunnel between you and server.

  1. Network Verification:

Before you browse through public Wi-Fi, verify whether the network is legitimate or not. It’s better not to get connected to any network in order to avoid being victim.

  1. Turn Off Sharing:

Do you turn on sharing preference while connected to public Wi-Fi? It’s a ‘NO-NEVER’ advice. Every operating system has ‘turn off’ option to stop file sharing. You just have to use that option before you connect your device with public network.

  1. Protect with Antivirus:

Install only the latest version of antivirus program so that it can detect the malware while you are using public network. The advantage is the installed antivirus program will alert your device when it is at risk of getting malicious attacks and suspicious activity.

  1. Safeguard with HTTPs

Do visit only (I repeat ‘ONLY’) the encrypted sites when you are not able to access VPN. While you are accessing different websites, make sure that website has HTTPs at the beginning. If there is a padlock symbol at the beginning of the web address, this means that particular sites use encryption.

2. How to safeguard your Wi-Fi network?

To how many suspicious devices your Wi-Fi network is serving? Do you know if anyone eavesdrops or sniffs on your Wi-Fi network? When your private password gets accessed by anyone, it becomes quite difficult to keep unwanted intruders out of your network. Without implying security precautions, you cannot control if anyone misuses your network.

Accessing Admin Panel with ONLY Ethernet

You are risking your network while accessing the admin panel over wireless. Why? Simply because — Your login credentials are sent over the air while you are logging without using Ethernet.

Enable your Firewall Feature

There is build-in firewall feature in most of the routers. All you have to do is to enable your SPI Firewall. It will block incoming connection if it is suspected.

Change Default Login Settings

When you have a router for the time, a default admin username along with password is given to you. Most of the people prefer to keep it and set it as default. These login credentials are easily accessible by anyone who searches it by the router model number. So you must change the credentials as early as possible.

Encryption is Must

DO NOT use any kind of weak encryption like WEP encryption which can be easily cracked. Use WPA Personal or WPA2 Personal mode to encrypt your network.

3. How to send encrypted Emails?

Snooping government officials and cyber criminals are there to intercept mails when it is sent via regular email. You are at risk to breach confidentiality when you are sending you confidential data through unencrypted emails.


 You are allowed to encrypt or decrypt emails with OpenPGP encryption in a free browser extension Mailvelope. Mailvelope is compatible with Yahoo,, Posteo, Outlook, GMX, and Gmail as well.


It is compatible with Yahoo, Hotmail, Outlook, Gmail, along with few other providers. You will get end-to-end email encryption feature.

Send 2.0

It is compatible with Gmail and Outlook with military grade encryption. You will get both free and paid plans.


It is compatible with Gmail and Outlook with PGP encryption. You will get both free and paid plans.

4. How to memorize all your passwords?

You may have 25 different accounts for different purposes, but I’m pretty much sure you don’t have 25 different passwords. It is obvious not able to memorize a large number of passwords all the time. You tend to create single or few passwords, and use it for all your accounts. Technically, you make it easier for cyber criminals to crack all access through hacking only one password.

Lastpass App /

It is one of the most popular password managers which demand you to remember one master password and it will remember all of your passwords.

What’s more?

Even if you cannot memorize that one master password, you will still be able to access all your passwords securely through its ‘Fingerprint Support’ feature.

KeePass 2

It is open source software where you can generate password database files with .kdbx extension. These files are highly encrypted, and all you need to do is to access all your files through accessing one master password. If someone has your file, he/ she cannot access any of your passwords without having that one master password.

5. How to un-send an SMS message?

Did you just hit the send button for the message consists of racist tirade awful language? I know it’s really difficult to have patience when client is getting into your nerve. But, sending profanity ridden message to your client due to running out of patience is not something what you want.

On Second Thought /

  • Free Android messaging app

You will have full ONE MINUTE to un-send a SMS text message. After installation of ‘One Second Thought’, set it as your default messaging app. You can choose any amount of buffer time between 0 to 60 seconds to un-send your message.

TigerText App

You can delete your text message only if the person on the other end has not yet opened the message. You will get to know whether you successfully recall your message by the green colored icon next to your message. Green icon indicates that the recipient already received your message. On contrary, if you recall your text message, and the green icon is not there, that means you are successful in un-sending your message.

6. How to get your own disposable email address?

You have to provide your email address to access certain information via certain websites. Are you comfortable to provide your personal information to any website without knowing whether it is reliable or not. It is highly recommended that you should be aware of identity theft, threat of fraud and spam.

Have you ever thought about temporary disposable email address? Yes, you heard me right!

Guerrilla Mail

  1. On this website, you are able to create your temporary disposable email address and further you can use it where you don’t want to provide your real email id. In multiple domains are available, and it allows you to choose any of it.
  2. You can create scrambled version of your disposable email id through selecting the option ‘Scramble Address’. Scramble version will stop others to view your received emails.
  3. Keep a note: Guerrilla Mail server deletes all your received emails after an hour.
  4. To check your incoming emails, you just have to connect to Guerrilla Mail website, and put your unscrambled email address.
  5. Once your need is over, just choose the option ‘Forget Me’ to delete your disposable account permanently.


7. How to know which websites you can trust?

Trustworthiness of a website is a question in today’s increasing fraudulent internet activities. World becomes modern, and here you are still pursuing old foolproof ways of justifying reliability of a website.

WOT (Web of Trust)

  1. This is a free browser extension that helps you to decide whether the web address you are visiting is safe or not. Thousands of users shared personal experiences, ratings, and reviews that help you to rate trustworthiness of a website.
  2. You have to install ‘Web of Trust’ in your choice of browser. Safety rating icon will be visible in your browser every time you visit a website. Green icon indicates the website is trustworthy, in contrast, red icon indicates danger.
  3. It is recommended to share your experience too in WOT to help other users.

8. How to block ads on internet?

Surfing a web address without being bombarded with web advertising is like fantasy. Isn’t it? Let’s make your fantasy come real. Yes, you can block all the annoying advertisements while surfing internet in real. Google, YouTube, Facebook are the tech giants where people across the world are present to make money through advertisement. But, such advertisements may be of little use to you.

Adblock Plus

  1. You have to install Adblock Plus in your browser with free download to block all the web ads. After you install this, all web advertisements will automatically be blocked from any website you visit.
  2. No matter whether you are surfing Google, or YouTube, or Facebook, Adblock Plus will block all kinds of ads text ads, video ads, banner ads, or any kind of pop-up ads.

9. How to make your online accounts hack proof?

The cold hard truth is, today hacking becomes easier because we become casual to the power of the internet. Its doom and gloom that we can make our online accounts 100% digitally secure by staying off internet. ‘Not using internet’— Next to impossible. Isn’t it?

No worry! Making your online accounts hack proof is simple. Just keep some tricks!

  1. Say ‘NO’ to Basic Password

We all have the tendency to make extremely basic passwords so that we don’t forget our password. You have to make your password easy by keeping its strength high. Use alternatives for words. Let me explain it more for you— you can use ‘0’ for the word ‘O’, ‘$’ for the word ‘S’, ‘@’ for the word ‘A’ and so on. Add your favorite or lucky numbers at the beginning or end of your main bunch of words.

  1. Make Unique Password and Get Password Manager

Is there any point of making password hard to crack but you use it for all your online accounts? In that case, you are risking all your accounts. You may have password manager like LastPass (How to memorize all your passwords?) to remember all your passwords. Make it difficult for the hackers to crack your password by contributing uniqueness for all your online accounts’ security locks.

  1. Two-Factor Authentication

Creating incredibly strong and unique password is not enough for ensuring security. You need a second line of defenses!

Unfortunately, your password manager like LastPass has a major weakness; that is the degree of security of your master password. What if your master password gets hacked? In that case, Two Factor Authentication will be your second line of defense.

Get Google Authenticator which is supported in LastPass. Google Authenticator will generate code in every 30 seconds, and you need to insert the current code at the time of login. So, even if your password gets hacked, hacker needs your phone to access your account.

10. How to secure your chat on Google, Facebook, and the web?

Google Hangouts and Facebook Messengers are popular platform where we make confidential conversations too. But are they secure? Today securing your confidential conversation from prying eyes of competitors or malicious users, and stop them from eavesdropping on your chat is difficult. Though, nowadays encryption is there in every app, still you should use strong encryption to double secure your chat while dealing with confidential information.


This app doubles your security by allowing you start your chat immediately encrypting it. Not only in iOS and Android, you can use it on the computer platform as well.

What’s more?

This app supports all popular chat accounts on websites like Google, Facebook and many more. It’s up to you which platform you want to use for your business talk.

11. How to password protect your WhatsApp messages?

WhatsApp is for both personal and professional chat and it is there in ready-to-open form in our cell phone. Once in life, we all have been in a situation where we have to let our coworkers or friends borrow our phone. What if they start reading your personal messages in WhatsApp? Have you ever thought of restricting your WhatsApp access from others? The first question you will come with is ‘HOW?’.

App Lock

This particular app will allow you to restrict access to any application including WhatsApp by securing them with single password. Just make sure you recover your password in case you forget your password. Let me make you clear!

Once you install App Lock in your phone, you need to set a recovery email address along with password. If you forget your password, you can reset it from your inserted email address.

With the security lock, your phone can never be in wrong hand. Every time someone tries to open your WhatsApp app, they will be asked to insert the password you set earlier.

12. How to recover deleted photographs / videos from SD card?

Have you ever deleted important photographs or videos accidentally and sat holding your head down?

No worry! Few steps to follow and you will have all your deleted photos.

  1. Remove your SD card

First, in order to avoid accidental overwriting of data, you have to remove your SD card from the device where it was used.

  1. Install RECUVA

You can install any recovery software, but I will suggest you to install free solution like Recuva. Unfortunately, there is no version for Android yet, you will have version for Windows only. You need a computer or laptop to install this recovery application. Recuva can restore any image with png, jpg, gift or many other formats. First Recuva will ask you few basic questions through which you will get your result.

  1. Connect your SD card to your computer

You need an SD card reader to connect your SD card to your laptop or computer.

  1. Select option ‘Scan for non-deleted files’

Next, go to ‘Options’ dialogue box and select ‘Actions’ tab. You will have an option ‘Scam for non-deleted files (for recovery from damaged or reformatted disks)’. You have to enable that box. This will allow you to scan your entire SD card space for deleted files as well.

  1. Select option ‘Deep scan’

You will have another option ‘Deep scan (increase scan time)’. You have to enable the box for scanning the entire hard drive.

  1. Final Scan

Run scan option once you are done with your settings. It will scan your drive for deleted files.

  1. Save

Once the system is done with the scan process, you can filter results by file type, file name and date. Make sure you don’t save them to the SD card back where they got lost before. You have to save them to a different space.

13. How to back up important data on hard drive?

Suppose, your hard disk gets crashed and all of your important data got lost. Even thinking like such thing gives you a mini heart attack. Well, why to wait for something like this to happen? Make your private data secure by backing the up regularly.

Google Drive

Today, no one is out there who doesn’t know what Good Drive is, and very few are there who don’t use Google Drive App. Apart from this, few use it but not on daily basis. I will recommend you to save your data in Google cloud and stay risk free. Uploading in Google Drive is easy and takes few seconds. There will be no risk of losing data and you can access your data anytime anywhere over the web.

14. How to stay secure from ‘Phishing Scams’?

Are you one the way of becoming one of the victims of Phishing scams? Stop giving perplexed look on the term ‘Phishing Scams’. It’s something we all know but unaware of the ways to avoid risk.

‘Phishing Scams’ are the fraudulent activities that cybercriminals do by asking your personal details (like username, passwords, credit card numbers as so on) with a link attached. Such mails or messages pretend to be a trustworthy source and you get trapped with just single click.

Basic Suggestions:

  1. Even if the sources seem trustworthy, never ever try to access those links you received from anywhere. Always visit official websites by typing their URL address and then log in with your personal details.
  2. NEVER EVER share your confidential information just because you received a call and are asked to follow few processes.



Now you can check trustworthiness of the web links through Before you click on any link from your device, it is highly advisable that you should make sure the link is safe and it is not phishing attack. PhishTank with large crowd sourced database will help you to judge the reliability of a web link.

15. How to browse the web anonymously and stop being tracked?

Anonymous internet search seems not possible as Google tracks each and everything in every second. The next moment we are bombarded with ads for what we have been looking on the web. Concealing our web activity on Google means visiting history page and selecting ‘delete all’ or ‘delete manually’. What if you forget to do so?

Suppose, you used your client’s laptop for some reason and searched something you don’t want to disclose to your client. Blatantly, you forgot to delete history data and returned the laptop. What if they go through your history page? There is high probability; your client will look for your web activity.

Well, don’t get much stress on your nerve!

Start Page — An alternative search engine

Surf internet anonymously with a good alternative search engine ‘Start Page’. You won’t get any difference in the search results while browsing through The only difference is the privacy terms ‘Start Page’ maintains for its users. Your privacy will be protected through keeping tracking cookies away, and protecting your IP address and location as well.

16. How to not get tracked by social networks?

You can’t pass a day without sharing your personal views on social networks like Facebook, Instagram, Twitter, Snapchat, Google Plus and so on. You love to share personal news and don’t want to be tracked. Right?

Advertisers are keeping their presence everywhere to track consumers and their interests. Now some of you are completely OKAY with the fact if advertisers approach you for their products or services. But is that all? — Unfortunately NO.

You are tracked by the social networks even when you are not connected with them. You probably noticed you searched for something in Amazon, and then you got ads on Facebook for the same products. Sometimes you are sharing very personal information, or something that makes others identify your psychological traits. This information is not limited to your friends and relatives, but it goes beyond. Cybercriminals, vindictive acquaintances, spam bots could take an interest, too.

STAY SAFE by keeping yourself away from trackers!



You can stop being tracked by using Blur which blocks tracking strength of social networks.

  1. Visit or www.donottrackme.html
  2. First, install the Blur app in browser of your choice (Mozilla Firefox and Google Chrome are recommended).
  3. Enter your email address and generate a password to register in Blur

  1. Now you are free to visit any website without having any fear of being tracked. Once you install Blur, it will stop all the social networks to track your web activities.
  2. Want to look for number of trackers Blur blocked for you? Simple! You will find the Blur icon on the top right corner on your browser. Just click on the icon and you will get the number of trackers blocked.


17. How to stop Google to track your Smartphone?

Your family may not know where you are, but Google knows where exactly you were and you are.

Intention behind constantly tracking your location is to serve you customized information about the products and services available nearby. Now this is scary if your location information gets tracked by wrong hand through this feature of Google. In that case, it is advisable that you should prevent Google from tracking your Smartphone.

Check your location tracks records on Google:

Google starts recording your location from the time you are into Google apps on your Smartphone. Search for from any of browsers of your choice. After visiting the site, sign into your Google account. With the help of Calendar, you can select any date in past and get to check the locations you visited on selected date.

What’s more?

You can use the ‘Play’ option in order to replay your movement on that selected date, in a more detailed manner. You will be amazed to check how Google stores accurate outcome of your visits.

Well, you can delete history records of your location track on Google.

To conceal tracking, you just have to change the settings of your Smartphone.

Change Settings of Smartphone (Android):

  1. Go to Settings
  2. Go to ‘Location’ option
  3. Go to the option ‘Google Location Reporting’
  4. Disable the ‘Location Reporting’ and ‘Location History’ options
  5. For more privacy concern — Turn off ‘Location’ feature from your phone

Change Settings of Smartphone (iOS):

  1. Go to Settings
  2. Go to ‘Privacy’ option
  3. Go to the option ‘Location Services’
  4. Turn off location access one by one for all the Google apps you are using currently


18. How to be aware before disposing your old mobile phone?

Did you dispose your mobile phone without concerning of erasing data? Yes? Then you are risking your data get misused.

Let me clear the thing! I’m not speaking about ONLY DELETING files. Probably, you don’t know the fact that deleting files doesn’t mean PARMANENT ERASE.

When you are holding a responsible position whether in professional or personal life, you are bound to secure all of your confidential data and information. Henceforth, be aware before you dispose your old mobile phone in order to prevent any kind of potential misuse.

Only deleting is not the solution. The reason is that a number of data recovery software is available, so anyone who wants to recover your deleted data could get them back in a smart way.

Erase all your data and information stored in Phone’s Space—

  1. First encrypt all data stored in your device
  • Go to ‘Settings’ option
  • Go to ‘Security’ option
  • Select ‘Encrypt Device’
  1. Do factory reset to erase data permanently
  • Go to ‘Settings’ option
  • Go to ‘Accounts’ option
  • Select ‘Backup and Reset’
  • Select ‘Factory Data Reset’

As you encrypt it on first hand, and then go for factory reset, you are double securing your data. Now, it is quite difficult for someone to recover your deleted data.

Erase all your data and information stored in SD Card—

  1. In case, you are using SD card for storing your data, then you have two options. One, you can remove your SD card from your old device and use it in your new device. Second is if you want to dispose your SD card, then encrypt all your data. For encryption—
  • Go to ‘Settings’
  • Go to ‘Security’ option
  • Select ‘Encrypt External SD Card’
  1. Format your SD card—
  • Go to ‘Settings’
  • Go to ‘Storage’ option
  • Select ‘Format SD Card’

For iPhone Users—

  • Go to ‘Settings’
  • Go to ‘General’ option
  • Go to ‘Reset’ option
  • Select ‘Erase All Content and Settings’