{"id":4828,"date":"2014-09-30T10:07:30","date_gmt":"2014-09-30T14:07:30","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=4828"},"modified":"2020-02-26T15:10:27","modified_gmt":"2020-02-26T15:10:27","slug":"iphone-maximum-security-tips","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/iphone-maximum-security-tips\/4828\/","title":{"rendered":"10 tips to make your iPhone even more secure"},"content":{"rendered":"<p>How many secrets do you think your iPhone can reveal to strangers? Even when it\u2019s in your hands, placed on the table, or being charged from a laptop it can reveal quite a few\u2014from personal correspondence and photos, to financial information and credentials. So how do you protect yourself? Well, you can follow our tips in order to maximize your iPhone security.<\/p>\n<p>Keep in mind that doing everything we mention here will deprive your iPhone of some of its helpful features, but at the same time it will better protect your private data. You don\u2019t have to follow all of the tips, so feel free to choose what you\u2019re ready to sacrifice for the sake of security \u2014 it\u2019s completely up to you.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>10 tips on how to stop your #iPhone from revealing your secrets<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FFZy2&amp;text=10+tips+on+how+to+stop+your+%23iPhone+from+revealing+your+secrets\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<h3>1.Use a strong password instead of a 4 digit code<\/h3>\n<p>The simplest and most efficient way to protect your data is <a href=\"http:\/\/support.apple.com\/kb\/HT4113\" target=\"_blank\" rel=\"noopener nofollow\">to use a strong password<\/a> instead of a simple 4 digit pin code for unlocking your iPhone. It\u2019s a good idea to use a combination of letters, digits and symbols. It\u2019s even better if the password is requested immediately after the lock screen, without any delay. As an extra option, you can also turn the \u201cerase data\u201d feature on, so the device will wipe everything from its memory after 10 failed passcode attempts. But keep in mind that all the data will be erased forever and you won\u2019t be able to recover it, so it\u2019s best not to forget your password.<\/p>\n<p><strong>How will it help?<\/strong> It will reduce the chances of a criminal being able to guess your password.<br>\n<strong>Where can you set these requirements?<\/strong> Go to \u201cSettings\u201d \u2013&gt; \u201cPasscode\u201d (or \u201cTouch ID and passcode\u201d) \u2013&gt; \u201cRequire passcode: immediately\u201d; \u201cSimple passcode: off\u201d.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/09\/05192457\/Settings1-169x300.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6137 size-medium\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/09\/05192457\/Settings1-169x300.png\" alt=\"Settings1\" width=\"169\" height=\"300\"><\/a><em>Use a strong password instead of 4 digit passcode and get rid of all notifications on a lock screen.<\/em><\/p>\n<h3>2.Turn off lock screen notifications<\/h3>\n<p>Any password, even the strongest one, won\u2019t prevent your data from being revealed if it appears on a lock screen. Messages, emails, and other information in your apps can contain some sensitive data like confirmation codes, private appointments, financial data, etc. The less your iPhone shows on a lock screen, the safer your data is.<\/p>\n<p><strong>How will it help?<\/strong> It won\u2019t let strangers oversee information showing up on a lock screen.<br>\n<strong> Where can you set these requirements?<\/strong> Go to \u201cSettings\u201d \u2013&gt; \u201cPasscode\u201d (or \u201cTouch ID and passcode\u201d) \u2013&gt; \u201cAllow access when locked\u201d section.<\/p>\n<h3>3.Turn on two-step verification for Apple ID and iCloud<\/h3>\n<p>One lock is good, but two is better. That\u2019s why it\u2019s highly recommended that you set up two-step verification whenever it\u2019s available\u00a0<a href=\"http:\/\/support.apple.com\/kb\/HT5570\" target=\"_blank\" rel=\"noopener nofollow\">for Apple ID and iCloud<\/a>. When you set up two-step verification, you register one or more trusted devices (devices you control) that can receive 4-digit verification codes using either SMS or the Find My iPhone service. Then, any time you sign in to manage your Apple ID, sign in to the iCloud, or make an iTunes, iBooks, or App Store purchase from a new device, you\u2019ll need to verify your identity by entering both your password and a 4-digit verification code.<\/p>\n<p><strong>How will it help?<\/strong>\u00a0It will prevent your Apple account from being used by somebody that is not authorized.<br>\n<strong> Where can you set these requirements?<\/strong> Go to <a href=\"https:\/\/appleid.apple.com\/\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/appleid.apple.com<\/a> \u2013&gt; \u201cManage your Apple ID\u201d \u2013&gt; \u201cPassword and Security\u201d \u2013&gt; \u201cTwo-Step Verification\u201d.<\/p>\n<h3>4. Disable Siri on a lock screen<\/h3>\n<div class=\"pullquote\">Anybody can use Siri on a lock screen while you\u2019re away from your iPhone.<\/div>\n<p>Siri is a great Phone feature, but sometimes this nice personal assistant can give away some information that you would prefer to keep confidential. It\u2019s not necessary to turn it off completely, but you will be much more secure if you prevent it from activating from a lock screen or on a \u201cHey Siri\u201d voice command. Don\u2019t forget: Siri can communicate with anyone, not just with an owner of the device it works on.<\/p>\n<p><strong> How will it help?<\/strong> It will eliminate the possibility of data extraction from the smartphone using Siri.<br>\n<strong> Where can you set these requirements?<\/strong> Go to \u201cSettings\u201d \u2013&gt; \u201cPasscode\u201d (or \u201cTouch ID and passcode\u201d) \u2013&gt; \u201cAllow access when locked\u201d section \u2013&gt; \u201cSiri: off\u201d and \u201cSettings\u201d \u2013&gt; \u201cGeneral\u201d \u2013&gt; \u201cSiri\u201d \u2013&gt; \u201cAllow \u201cHey Siri\u201d: off\u201d.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/09\/05192457\/Settings2-169x300.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6138 size-medium\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/09\/05192457\/Settings2-169x300.png\" alt=\"Settings2\" width=\"169\" height=\"300\"><\/a><em>In your iCloud settings you can turn off automatic synchronization for any type of data.<\/em><\/p>\n<h3>5. Turn off automatic sync to iCloud<\/h3>\n<p>As you might know, a lot of pictures from a recent leak were originally stored on Apple\u2019s iCloud servers, which drove many celebs crazy. They thought that deleting a photo from a phone would solve the problem, but it doesn\u2019t: after syncing to the \u201ccloud\u201d the data stays there, even if you get rid of it locally. Actually it happens with almost any kind of data if we are talking about iPhones and iCloud: messages, notes, contacts, documents \u2014 everything syncs automatically unless you turn it off. And that\u2019s what we\u2019d recommend, especially if you have just a couple of Apple devices and don\u2019t need to sync them on a daily basis.<\/p>\n<p><strong>How will it help?<\/strong> It will reduce the risk of compromising your data while it\u2019s on the iCloud servers, or if you loose one of your Apple devices.<br>\n<strong> Where can you set these requirements?<\/strong> Go to \u201cSettings\u201d \u2013&gt; \u201ciCloud\u201d.<\/p>\n<h3>6. Discard automatic WiFi connections to known networks<\/h3>\n<p>iPhones have a very good feature which allows you to automatically connect to known WiFi hotspots without your permission. On the one hand, this is a very useful option, as you don\u2019t need to do anything to switch from mobile Internet to local WiFi. But on the other hand, there\u2019s a chance that a cybercriminal will establish his own <a href=\"https:\/\/www.kaspersky.com\/blog\/fake-hotspots\/\" target=\"_blank\" rel=\"noopener nofollow\">fake wireless network<\/a> with the same name as a trusted public hotspot. In this scenario you might not even recognize that your iPhone is working within the malicious WiFi network, giving away all of your data <a href=\"https:\/\/www.kaspersky.com\/blog\/wi-fi-sao-paulo\/\" target=\"_blank\" rel=\"noopener nofollow\">to the scammer<\/a>. That\u2019s why we recommend that you either be very aware of every WiFi hotspot you are in, or turn this option off.<\/p>\n<p><strong>How will it help?<\/strong> It will reduce a risk of connecting to malicious wireless network.<br>\n<strong> Where can you set these requirements?<\/strong> Go to \u201cSettings\u201d \u2013&gt; \u201cWi-Fi\u201d \u2013&gt; \u201cAsk to join networks: on\u201d.<\/p>\n<h3>7. Get used to VPN<\/h3>\n<div class=\"pullquote\">The AutoFill option in a browser can compromise your credentials. So it\u2019s better to turn this feature off.<\/div>\n<p>We speak about VPN <a href=\"https:\/\/www.kaspersky.ru\/blog\/?s=vpn&amp;submit=Search\" target=\"_blank\" rel=\"noopener\">quite often<\/a> on this blog. A Virtual Private Network is a must-have tool which can bring <a href=\"https:\/\/www.kaspersky.ru\/blog\/secure-iphone\/\" target=\"_blank\" rel=\"noopener\">extra security<\/a> to everyone who uses an iPhone in different wireless networks, including unknown ones. Some VPN services are free of charge, some aren\u2019t, but several dollars a week is more than a fair price for keeping your data protected.<\/p>\n<p><strong>How will it help?<\/strong> It will encrypt all incoming and outgoing Internet traffic making it useless to intercept and analyze.<br>\n<strong> Where can you set these requirements?<\/strong> Go to \u201cSettings\u201d \u2013&gt; \u201cGeneral\u201d \u2013&gt; \u201cVPN\u201d \u2013&gt; \u201cAdd VPN Configuration\u2026\u201d.<\/p>\n<p>P.S.: All of the information that you have to enter will be given to you by your VPN provider.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksec\">\n<h3>8. Turn off cookies in your browsers<\/h3>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/cracking-cookies\/\" target=\"_blank\" rel=\"noopener nofollow\">Cookies<\/a> are small files which almost any website generates and leaves on your device. They may contain some information about you, your computer or smartphone, and your preferences. It helps websites keep you logged in, or to show you some relevant content including ads, but in some cases they may be very helpful to cybercriminals as they can contain credentials and other sensitive data. To be honest, turning off cookies might bring you more stress than relief, but it helps your data by being more secure. Plus, some discomfort is not the biggest price you have to pay for data protection.<\/p>\n<p><strong>How will it help?<\/strong> It will reduce the risk of unauthorized use of your login data and some other private information stored in cookie files.<br>\n<strong> Where can you set these requirements?<\/strong>\u00a0For Safari: Go to \u201cSettings\u201d \u2013&gt; \u201cSafari\u201d \u2013&gt; \u201cPrivacy &amp; Security\u201d section \u2013&gt; \u201cDo Not Track: on\u201d, \u201cBlock Cookies: Always Block\u201d; For third party browsers: see similar browser settings.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/09\/05192456\/Settings3-169x300.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6139 size-medium\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/09\/05192456\/Settings3-169x300.png\" alt=\"Settings3\" width=\"169\" height=\"300\"><\/a><em>In Safari settings you can turn off cookies and the AutoFill option.<\/em><\/p>\n<h3>9. Turn off the AutoFill option in your browsers<\/h3>\n<p>The same goes for the AutoFill option: if somebody gets your iPhone, then chances are this person will be able to log in as you on a number of sites. You don\u2019t want this to happen, do you? Then switch it off! Again, you\u2019ll experience some inconveniences, but it\u2019s worth it.<\/p>\n<p><strong>How will it help?<\/strong> It will reduce the risk of someone logging into websites with your credentials when your iPhone is stolen or given to somebody.<br>\n<strong> Where can you set these requirements?<\/strong> For Safari: Go to \u201cSettings\u201d \u2013&gt; \u201cSafari\u201d \u2013&gt; \u201cGeneral\u201d section \u2013&gt; \u201cPasswords &amp; AutoFill\u201d; For third party browsers: see similar browser settings.<\/p>\n<h3>10. Don\u2019t let apps access your contacts, photos, messages and other private data<\/h3>\n<p>This tip is quite extreme, but if you already followed every single recommendation we gave, then you might as well go ahead with the last one. In iOS 8 there\u2019s a significant number of features and data types that almost any app can access: from GPS, to contacts, to messages. For example, if you install a third party keyboard you must give it full access to everything you are typing in order for you to be able to use it. If this sounds quite non-secure to you, then you have no choice but to go to \u201cSettings\u201d and prevent all these corporation-driven apps from accessing your data. After that you probably won\u2019t be able to use some of the apps that you have, but that\u2019s the way it is.<\/p>\n<p><strong>How will it help?<\/strong> At least it will give you some confidence in knowing that large companies like Google or Facebook won\u2019t get any information about where you are, what you are doing and what kind of pizza you like.<br>\n<strong> Where can you set these requirements?<\/strong> Go to \u201cSettings\u201d \u2013&gt; \u201cPrivacy\u201d.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Even when your iPhone is in your hands or on the table, it can reveal some of your secrets to strangers. Here are 10 tips to prevent this from happening.<\/p>\n","protected":false},"author":214,"featured_media":4829,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2026,9],"tags":[14,26,43,97,807,131],"class_list":{"0":"post-4828","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-apple","10":"tag-iphone","11":"tag-privacy","12":"tag-security-2","13":"tag-settings","14":"tag-tips-2"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/iphone-maximum-security-tips\/4828\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/iphone-maximum-security-tips\/4165\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/iphone-maximum-security-tips\/4074\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/iphone-maximum-security-tips\/4583\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/iphone-maximum-security-tips\/5382\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/iphone-maximum-security-tips\/6132\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/iphone-maximum-security-tips\/5010\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/iphone-maximum-security-tips\/5382\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/iphone-maximum-security-tips\/6132\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/iphone-maximum-security-tips\/6132\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/apple\/","name":"apple"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=4828"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4828\/revisions"}],"predecessor-version":[{"id":19136,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4828\/revisions\/19136"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/4829"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=4828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=4828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=4828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}