Your iPhone offers you the freedom to conduct your life from practically anywhere. Whether you re chatting, working, shopping, or banking online, your iPhone is managing your passwords for email, social networks, and bank accounts, collecting credit card information to process online transactions, storing personal media and tracking your online movements. In the event that your phone is lost or stolen, this sensitive data may be compromised. To improve your digital security, Gazelle recommends the following:
Apple has added hardware-based disk encryption to the iPhone 3GS. This technology allows you to instantly purge all the personal data on your iPhone. This feature can be activated locally, by enabling the data erase feature, or remotely, using Apple's MobileMe service. iOS version 4 or higher is required. If you have an iPhone 3GS running iOS version 3, you can upgrade your software and automatically enable encryption with these steps:
Your lock screen passcode forms the first and most basic defense against unauthorized access to your applications. To adjust your passcode security settings, navigate through the Settings > General > Passcode Lock menus and select "Turn Passcode On."
When picking a number, you can increase the strength of security by following a few guidelines:
Once you secure your device with a strong passcode, regularly backup your personal data through iTunes. When you activate data encryption, iTunes copies your iPhone files in a way that makes the data unreadable by users without your password. Here's how:
Because your iPhone is highly portable and thus more vulnerable to loss or theft keep your most sensitive data at home. With frequent backups, you can enable the automatic data erase or initiate a remote wipe without the risk of completely losing your data.
In February 2011, Germany's Fraunhofer Institute for Secure Information Technology publicized an iPhone hack that bypassed the screen lock, accessed the device's password keychain, and retrieved sensitive data including log-in and password information for Gmail and Exchange mail accounts, Wi-Fi networks and numerous other apps. The entire process required six minutes to complete. Although Fraunhofer Institute's method is not public knowledge, a number of other well-documented and freely available programs like jail-breaking software circumvent the iPhone lock screen. For an additional layer of security beyond passwords and encrypted backups, associate your iPhone with Apple's Find My iPhone service.
With iCloud replacing MobileMe last year backing up your data is simpler than ever before. All iOS devices and Macs have iCloud built right into the device. iCloud requires you to have a mobile device running iOS 5 or greater, a mac running OS X Lion 10.72, or a Windows PC running Windows 7 or Vista SP2. iCloud can perform all the following below:
Once the Find My iPhone feature has been activated on your Apple computer or other iDevice, you can track the location from any computer by logging in with your Apple ID at www.icloud.com. Alternatively, you can access your data from any other iOS device using the free Find My iPhone app. In the event of loss or theft, you can use these tools to send a message to the device to arrange its return, remotely lock your device with a passcode, or initiate a remote data wipe of your device. Additionally, the GPS data logged by your iOS device may prove invaluable over the course of a police investigation. If your iPhone is stolen, initiate a remote wipe of your device as soon as possible. Connecting a device to a computer to bypass the lock screen takes time. By acting immediately to erase your data, you close the window of opportunity for a thief to collect your personal information.
If your iPhone is stolen, initiate a remote wipe of your device as soon as possible. Connecting a device to a computer to bypass the lock screen takes time. By acting immediately to erase your data, you close the window of opportunity for a thief to collect your personal information.
Unlike a city park built for free access and recreation for everyone, the walled garden restricts entrance to a few specific points. The owner of a walled garden may want to control the sort of clientele they admit, or enforce proper etiquette of visitors in the garden. In the tech industry, companies such as Apple build metaphorical walled gardens by legislating the permissible use of software, media, and other content. While some users object to Apple's control over App Store content and choose to "jail-break" their iPhones from the walled garden, the casual iPhone owner may be better served by Apple's process of inspecting and approving all software submissions rather than risk installing software from less trustworthy third-party repositories. Before you install new software, consider the reputation of the software publisher, the number of downloads and the frequency of positive reviews of the program.