Sorry, you need to enable JavaScript to visit this website.

Securing a new iPhone in three simple steps

  • Secure your accounts and devices, whether a first-time owner or just upgrading
  • As a device central to our lives, critical to make smartphone security a priority
Securing a new iPhone in three simple steps

MANY people are questioning the security of Apple’s iCloud following news of stolen celebrity nude photos, security specialist said in a statement.
 
Symantec has released three steps to help secure Apple accounts and devices, whether you’re a first-time owner or just upgrading.
 
Step 1: Enable Touch ID fingerprint recognition
Securing a new iPhone in three simple steps 
You’ll be asked if you want to enable Touch ID. Be sure to do it, Symantec said.
 
Apple's Touch ID is a fingerprint reader built right into the iPhone 5S, 6, and 6 Plus models to authenticate the user. Your fingerprint can be used to unlock the iPhone and to make purchases through iTunes, the App Store, and Apple Pay.
 
If you don't enable Touch ID when you first set up your phone, you can enable it later in Settings, Symantec noted.
 
Even if you don’t have the latest iPhone, be sure to set a passcode on your device. That way, if your phone is ever lost or stolen, whoever has it won’t be able to easily unlock it, as Symantec highlighted in its Smartphone Honey Stick Project.
 
According to a recent survey by Consumer Reports, only 36% of smartphone users enable passcodes (with at least four digits), while 34% do nothing to secure their devices at all.
 
Step 2: Use a strong Apple ID password and make it unique

An Apple ID is required to make purchases through iTunes and Apple’s App Store. An Apple ID is also required to enable iCloud features on your iPhone or iPad. This password is very important so be sure to use a good one, Symantec said.
 
Apple has basic password requirements in place for Apple IDs, including the use of one lowercase and one uppercase letter, one number, and a minimum of eight characters.
 
You can improve the strength of your password by using more than the minimum requirement of eight characters and by using random characters. Even clever substitutions of letters instead of symbols, like ‘P@ssw0rd’ for instance, may meet basic requirements but is still weak. Something like ‘d*&Z0jWv7Y2E$e’ is better.
 
Not only should your passwords be stronger, but they should also be unique. Reusing passwords across different sites and services is a big risk.
 
Just as you would not use the same key to unlock your front door and your car, you should never use the same password for more than one account, Symantec said.
 
Creating and remembering multiple strong and unique passwords is challenging, so use a password manager such as the following:

Step 3: Enable two-step verification

Securing a new iPhone in three simple steps

Passwords are not enough to keep you protected. Symantec recommends enabling two-step verification.
 
Attackers routinely target owners of Apple devices with phishing scams in order to steal Apple IDs and passwords. Once enabled, two-step verification protects your Apple ID and your iCloud data from being accessed by an attacker with your username and password.
 
Two-step verification (also known as two-factor authentication or 2FA) is just an added layer of protection for your Apple ID.
 
Basically, in order for someone to log in to your account and make changes, they need more than just your password. They will also need a verification code sent to one of your trusted devices – something phishers are unlikely to have.
 
To enable two-step verification, log into to your Apple ID and select the Password and Security option. You will be asked to register a trusted device, like your phone or tablet.
 
Securing a new iPhone in three simple stepsBe sure to print out the Apple recovery key in the event you lose your phone or don’t have immediate access to it and need to log in to your account.
 
Now go boldly

Symantec said the steps outlined above are worth the time and effort, and the company strongly recommends users of Apple devices to follow them.
 
Today, smartphones are ubiquitous. We take them with us wherever we go. We use them to capture digital memories, manage our finances, work on the go, and keep in touch with the most important people in our lives.
 
As a device central to our lives, it is critical to make the security of it a priority, the company said.
 
Click infographic below to enlarge:

Securing a new iPhone in three simple steps

 
The article above first appeared in as a Symantec blog (with additional information) and is reprinted here with the company’s kind permission.
 
Related Stories:
 
Naked celebrity pictures: How safe is your cloud?
 
New Apple wares excite … only up to a point: Analysts
 
If it wants to, Apple can read your iMessages: Quarkslab
 
‘Apple has its head in the sand’
 
 
For more technology news and the latest updates, follow us on TwitterLinkedIn or Like us on Facebook.

 
Keyword(s) :
 
Author Name :
 
Download Digerati50 2020-2021 PDF

Digerati50 2020-2021

Get and download a digital copy of Digerati50 2020-2021