Skip to main content

How to secure your i-Phone in 7 steps

Nowadays smartphone has become a part of our life. From the very beginning of the day to our late night, our phone is our companion. I will not exaggerate but it is true that more than anyone else your phone is your best buddy.

Therefore, It is the duty of ours to defend our buddy from any damage. As you already know, smartphone users are divided into two parts:

1: iOS users
2: Android users.

Lets put the jokes, memes apart, both types have their own pros and cons and this is my personal opinion.

Apple Confirms 30 Compelling Security Reasons To Install iOS 13.4 ...

I am writing this article on demand, therefore we will discuss here iOS security. I assure you guys I will write on android also in my upcoming articles.  So let's begin,

Former FBI computer scientist Randy pargmen says this about i-phone security.

"iPhone owners tend to feel more confident in the security of their phones than Android owners, and for good reason's true that iPhones and the whole Apple ecosystem keep customers safer from malicious apps, but that doesn't mean that all the data stored in the apps are safe from theft, Many apps store sensitive information on servers operated by the app developer or transfer the information unencrypted over the Internet. As soon as your information leaves your iPhone, it is outside of your control to protect it.,"

Therefore you should not ignore basic threats on iOS. Let's take a closer look at your i-phone security posture and let's see what are the precautionary measures one should take to protect your information.

1) Download Genuine Apps:


App Store - Apple DeveloperMake sure you are not downloading any rogue/ duplicate untrusted app left you crying for theft of financial or confidential data. Do some research, read the ratings, comments.  What is the purpose to download that app? (i.g. why your calculator suppose to ask permission for camera access). Think and go ahead if you feel safe and sure.

2)  Updates 

Do you wear bell-bottom pants? Do you wear an 80's polka dot scarf? if you are updated by fashion, your clothes, shoes, etc. You are updated with today's fashion right? Similarly your phone needs to be updated to avoid malware, bugs, misconfiguration that makes your phone under threat. Always enable "Automatic updates" in your setting.

3) Turn off weird permissions
Why your flashlight app needs to know your location? why your calculator want to access your camera? Limit your permission for all apps manually. Beware if an app is misbehaving after denying any permission which is not relevant to it. 

By going to Settings > Privacy, you can view which apps have access to your contacts, calendar, photos, Bluetooth, microphone, camera, and health data. 

4) Passcode 

Dual security authentication is very useful to maintain the security of any phone. Along with the face recognition and fingerprint unlock facility passcode has its own importance. Something that you know and only you know about your phone will prevent you from unauthorized access 

access Settings > Touch ID & Passcode (or Face ID & Passcode). Go to Change Passcode and tap Passcode Options to view the option for Custom Alphanumeric Code.
Never share your passcode to anyone. 

5) Set login limitation


In case of the phone theft or loss you might be worried about your device falling in the wrong hands. there are also chance of brute-forcing for unauthorized access to your phone. To prevent this, you can set your "erase data" option. This automatically deletes all data on your phone after 10 consecutive incorrect login attempts. Access Settings > Touch ID & Passcode and scroll to the bottom to toggle Erase Data to the On position.

6) Safari security


By not going to much technical for general readers, you can protect your self from the website which collects your data from your browser. 

you can change the search engine from google to "duck duck go" if you have privacy issues. you can opt-out interest-based advertising. 

7) Public Wifi access

It is not sure that all public wifi connections are genuine or safe to use. Cybercriminals will often use to broadcast their device as a public access point to intercept the data between you and your belongings.   Always disable wifi and BlueTooth unless its known and genuine. Use a VPN connection to encrypt your activity.


So, These were the basic To-Do's to protect your i-phone from unauthorized access, data theft, etc. 
Share your feedback in comments. 

Stay safe...Stay aware. 

Comments

Popular posts from this blog

CIA Triad for- Base of Information security

The essential security principles of confidentiality, integrity, and availability are often  referred to as the  CIA Triad. All security controls must address these principles. These three  security principles serve as common threads throughout the CISSP CBK. Each domain  addresses these principles in unique ways, so it is important to understand them both in  general terms and within each specific domain: Confidentiality is the principle that objects are not disclosed to unauthorized subjects. Integrity is the principle that objects retain their veracity and are intentionally modified by  authorized subjects only. Availability is the principle that authorized subjects are granted timely access to objects  with sufficient bandwidth to perform the desired interaction. Different security mechanisms address these three principles in different ways and offer varying  degrees of support or application of these principles. Objects must be properly classified

List of Company Slogans

·          3M : "Innovation" ·          Agere Systems : "How Communication Happens" ·          Agilent : "Dreams Made Real" ·          Airbus : "Setting the Standards" ·          Amazon.com : "…and You're Done" ·          AMX : "It's Your World. Take Control" ·          Anritsu : "Discover What's Possible ·          AT&T : "Your World. Delivered" ·          ATG Design Services : "Circuit Design for the RF Impaired" ·          ATI Technologies : "Get In the Game" ·          BAE Systems : "Innovating for a Safer World" ·          Ball Corporation : "The Leader in Small Space and Rocket Systems" ·          BellSouth : "Listening, Answering" ·          Blackhawk : "Powering DSP Development" ·          Boeing : "Forever New Frontiers" ·          Bose Corporation : "Better Sound Through Research" ·          Bowers & Wil

My Article :- હેકર બનવું છે? કઈ રીતે?

મારી ૨ વર્ષ ની કારકિર્દી માં મને કેટલાય  લોકોએ, ખાસ કરીને કોલેજ ના વિદ્યાર્થીઓએ ઘણી વાર પૂછ્યું છે કે "મારે હેકર બનવું છે. તો હું શું કરું? " અને મારા બ્લોગ્સ માં પણ પૂછવામાં આવે છે કે એક સારો હેકર કઈ રીતે બની શકાય? એવું હું શું કરું અથવા તો મારા માં કઈ લાયકત હોવી જોઈએ એક હેકર બનવા માટે? આ પ્રશ્ન નો સંતોષકારક જવાબ આપવા માટે મેં internet પર શોધખોળ કર્યા પછી મને જે કઈ માહિતી મળી તેને હું આજે અહી રજુ કરું છું. મિત્રો, સૌપ્રથમ હેકર કઈ રીતે બનવું એ જાણવા પહેલા એ જાણવું જરૂરી છે કે ખરેખર હેકિંગ શું છે ? અને હેકર કોને કહેવાય. હેકિંગ ની સીધી અને સરળ વ્યાખ્યા નીચે મુજબ છે.  "તમારા કમ્પ્યુટર,નેટવર્ક(ઈન્ટરનેટ કે LAN દ્વારા) કે કોઈ ડીવાઈસ માં (ફોન, ટેબ્લેટ) માં કરવામાં આવતા ગેરકાયદેસર પ્રવેશ અને ઉપયોગ એ હેકિંગ કહેવાય છે."અને હેકિંગ કરતા લોકોને હેકર કહેવાય છે. હવે તમને થશે કે આવું શું કામ કરવું જોઈએ? આ તો ક્રાઈમ છે. તો તમને જણાવી દઉં કે હેકર મુખ્યત્વે ૨ પ્રકારના હોય છે.    વાઈટ હેટ હેકર્સ (એથીકલ હેકર્સ) : ધારો કે તમે તમારો ફેસબુક નો પાસવર્ડ ભૂલી ગયા(ખરેખર ના ભૂલતા ક્યારેય..)કે ત