Stop brute-force attacks in their tracks with two-factor authentication. A brute-force attack systematically checks all possible combination keys and passwords. This attack might be used when all other potential weaknesses have been exhausted. Typically brute-force attacks take much longer then dictionary attacks and require the assistance of a computation program.
A brute-force attack, or exhaustive key search, can theoretically be used against any encrypted data repository.
Brute-force attacks are conducted externally, and while you control access to your cell phone, you eliminate the possibility of this attack.