suzanne is a cybersecurity expert. she was approached by alex with a complaint that his payment information has leaked even though he has not made any online payments or shared information with anyone. suzanne concluded that attackers most likely bumped a portable reader against alex's smartphone to make an nfc connection and steal the payment information stored on the phone. what should suzanne suggest to alex to prevent this type of attack from happening in the future?