ios

Manual to act in case your personal security is at risk

Table of contents:

Anonim

Manual for your personal safety

Privacy is something that Apple has always attached great importance to. Since the arrival of iOS 14 it has strengthened the tools on our devices to be able to manage that privacy and to inform us about all apps and websites that can access it.

He is also concerned about people who may have their personal safety at risk and has published a manual where he explains, step by step, how to act if we find ourselves in that dangerous situation.

The manual is, for the moment, in English, but we are going to translate the most important aspects of each point.

Apple Guide on Device and Data Access When Personal Security is at Risk:

Then we leave you the direct link to the Apple manual in PDF. Now we are going to name and translate the most important points:

Update your device software to the latest available version:

Updating your software is one of the most important things you can do to protect your device and your information.

Restore your device to factory settings:

If you are not running the latest version of iOS and you are concerned that someone else has had physical access to your device, you should back up your device information and restore it to factory settings. This process may take some time, but it will ensure that only you can access your device, while preserving all of your information.

Protect your device:

To prevent anyone but you from using your devices and accessing your information, be sure to use passwords or unique passwords that only you know and use Touch ID or Face ID on your iPhone or iPad.

Protect your Apple ID:

Your Apple ID is the personal account you use to sign in to your device and access Apple services. This includes services like the App Store, iCloud, iMessage, FaceTime, and Find My, and personal information you store with Apple and share between devices, like contacts, payment information, photos, device backups, and more. Here are some basic notions:

  1. Don't share your Apple ID password with anyone, even family members.
  2. Use two-factor authentication for your Apple ID.
  3. Pay attention to notifications about your Apple ID.

If you believe your Apple ID has been compromised, follow these steps to review and protect your account information:

  1. Change your Apple ID password and choose a strong password: eight or more characters, including uppercase and lowercase letters, and at least one number.
  2. Review all personal and security information on your account. Please update any information that is not correct or that you do not recognize.
  3. If you have two-factor authentication enabled, check your trusted devices in iOS. If you see a device you don't recognize you can select it and remove it.
  4. Set up two-factor authentication.

If you don't recognize a login location:

When you sign in on a new device, you get a notification on your other trusted devices.The notification includes a map of the new device's location. This is an approximate location based on the IP address or network the device is currently using, rather than the exact location of the device.

If you see a notification that your Apple ID is being used to sign in to a new device and you're not signing in, tap Don't Allow to block the sign-in attempt.

Check privacy settings:

Your device's privacy settings have been carefully designed to put you in control of your data. For example, you can allow a social networking application to use your camera so that you can take and upload photos to that application. You can also grant access to Contacts so that a messaging app can find friends who are already using the same app.

In Settings/Privacy , you can see which apps you've allowed to access certain information, like Location Services, Contacts, Camera, Files & Folders, and more, as well as grant or revoke any future access to it info.

Use the Search app:

The Find app for iPhone, iPad and Mac helps you stay connected to your device even if it's lost or stolen and lets you share your location with friends and family .

You can use Search to locate friends and family and to share your location. Your location is not shared by default. If you are sharing it and you do not want to share it with someone, you must access the application and stop sharing your location with the contact you want.

Sharing your location:

With your permission, Location Services allows apps and websites (including Maps, Camera, Weather, and other apps) to use location information, such as from cellular networks, Wi-Fi, Global Positioning System ( GPS) and Bluetooth to determine your approximate location. The first time an app tries to access your location, it must ask for your permission.You'll see a message explaining which app is requesting permission to use your location, as well as the app developer's reason for requesting it. You can revoke that request or accept it.

To stop sharing your location with apps and services, even for a short period of time, go to Settings/Privacy/Location Services and turn off Location Services.

iCloud Sharing:

iCloud securely stores your photos, videos, documents, music, apps, and more. Keeps updated on all your devices. iCloud also lets you share photos, calendars, your location, and more with friends and family.

You can see and change iCloud settings on every device, including Apple apps and third-party apps that use iCloud, iCloud backup, and more. We can also sign out of iCloud completely on our device. If we do, it no longer backs up the information on that device.

Shared Photo Albums:

With Photo Sharing Albums, you choose the photos and videos you want to share and the people you want to share them with. You can change your sharing settings at any time.

Shared Calendars:

If you've previously invited someone to share your calendar, you can manage your calendar settings or stop sharing your calendar with that person.

Share your activity with Apple Watch:

If you have an Apple Watch and you previously shared your activity rings with someone, that person can see information about your activity level and workouts. It does not give them any information about your location.

Remove unknown third-party apps:

If you notice that an app has permission to access your data and you don't remember installing it or giving it permission to access your data, you may want to delete the app.

Delete unknown configuration profiles:

Businesses or educational institutions may use device profiles, mobile device management (MDM) tools, and custom apps to manage devices, and these tools may allow access to data or location information on the device.

If you see a profile installed on your device and you don't know why, you can delete it and remove the associated apps. If your device belongs to your school or organization, check with your system administrator before deleting a required app or profile.

When using Family Sharing:

Share purchases, photos, a calendar, and more with another person using Family Sharing. This makes it easy to share: App Store purchases, music, movies, TV, and books, Apple Music, Apple Arcade, or Apple TV+ subscriptions, iCloud storage, and more—without sharing each other's Apple accounts.

Phishing and fraudulent requests to share information:

Phishing refers to fraudulent attempts to obtain your personal information.

Be careful if you receive unsolicited messages asking you to accept gifts, download documents, install software, or follow suspicious links. People who want access to your personal information use every means they can (spoofed emails and text messages, deceptive pop-up ads, fake downloads, calendar spam, and even fake phone calls) to trick you, like your Apple ID or password. , or to provide a verification code for two-factor authentication.

BE VERY CAREFUL WITH THIS!!!. Here info on Phishing attempts by Apple .

Without further ado and hoping that we have helped you and that you have liked this tutorial, we will be calling you shortly for more news, tricks, apps for your Apple devices.

Greetings.