When installing new applications, carefully review the permissions it requests. Consider whether an app really needs access to contacts, location, camera, microphone, etc. Excessive access may not only compromise your privacy, but also provide potential malware with more avenues to exploit.