There are many services that you use on your iPhone on a daily basis.
Texting….Social Media…Taking Pictures…Getting Directions…Online Shopping
It’s safe to say that when your iPhone is in your hand, it can help you do some pretty great things. But, what about when it is not in your hand? What about when you leave it in a cab or at your desk? Worse yet, what happens when you connect to an unsecure Wi-Fi network?
Here are a few tips to help keep your organization’s data, as well as your own personal information, secure.
1.) Erase All the Data Before Return, Repair, or Resale of Your iPhone: Potential attackers come in all shapes and sizes. They could be the person allegedly fixing your phone or the person who just purchased your device off the Internet. Make a mental note to never allow your phone to carry personal information while it’s in the possession of another individual.
2.) Disable message previews in lock screen for Messages and Emails: When your iPhone displays previews in lock mode, anyone with a clear view of your mobile device can access your personal information. By disabling the preview function, you are ensuring that your information is always protected and your information is hidden.
3.) Delete individual calls from your call history: Similar to the issue above, it is not always wise to keep a log of past call history. To protect your iPhone and personal privacy, simply go to the PHONE app, hit the RECENT calls icon and swipe over the number you wish to delete. When you see a red DELETE button, tap it once and the call will be erased from your call history.
4.) Disable Bluetooth once you are done using it: Be mindful of when you are connected to your Bluetooth device. While it is helpful to keep it on when you’re trying to multitask, it can also attract potential threats. If an attacker notices your iOS device, he, she (or in the case of a bot- it!) may try to connect to it.
Safelight Security | Information Security Awareness Training | More Mobile Security
Safelight‘s employees are security experts who are also educators. The company combines real-world security skills with innovative adult learning methodologies, focusing on the best ways to teach information security to everyone in customers’ organizations.