Phone Privacy Settings: Get Them Right and Keep Them Right

For many people, time on their cell phones has replaced much of the time they used to spend on their computers. Smartphones have evolved so much that many of us now use our phones for many of the daily functions previously conducted on computers. All that mobile access has dramatically increased the need for secure connections to all kinds of private data for our business and personal lives.

Any device connected to a wireless network is at risk of being hacked. Additionally, an unattended mobile device needs stronger phone privacy settings than the most basic protections to guard against snooping and cyber theft.

Q: How important is setting a strong passcode and biometric security on an iPhone?

A: A strong passcode is your first line of defense. Apple recommends using a custom six-digit or alphanumeric code instead of four digits, making it much harder for attackers to guess your code. Adding Face ID or Touch ID gives an extra biometric layer that’s convenient and secure.

iPhone Screen Lock Settings: How to Change a Phone Password

Cyber security best practices suggest you should limit the time your iPhone’s screen display remains on before locking. The screen lock time can be set as follows:

How to Change a Password for the iPhone Screen Lock Setting (or Face or Touch ID)

Everyone should know how to change a phone password. The iPhone screen lock setting is an integral part of front-line security and phone privacy settings. Therefore, it should be taken very seriously. You can change and customize the screen lock settings at any time by taking the following steps:

Q: How can I protect my iPhone when connecting to WiFi or Bluetooth?

A: Public WiFi and Bluetooth can be exploited. To stay safe, disable Auto Join for new networks, turn off Bluetooth/AirDrop when not in use, and avoid sensitive activity on unknown WiFi networks. Using a reputable VPN encrypts your data end-to-end to block eavesdropping or man-in-the-middle attacks.

Do I Need to Worry About Strong Passwords?

The short answer: Yes.

Creating and managing strong passwords is a fundamental part of cyber security. It is bad enough when a phone is lost or stolen. It is much worse when the thief can immediately access private information and business data stored on your phone. Cyber security isn’t guesswork. A robust, layered approach to protecting your data and online work is an essential part of securing your hard-earned business data in today’s expanded remote-access work environment. But it’s not just a threat to your mobile phone. All devices connected to a network are potential attack targets for cybercriminals. Therefore, cell phones connected to your business network can be portals to the rest of your company’s most sensitive files.

Q: Should I review app permissions on my iPhone?

A: Yes, you should habitually audit app permissions. Many apps request access to data, such as location, photos or contacts that they don’t need. Regularly go to Settings > Privacy to review and revoke permissions you find unnecessary. Being selective about which apps get access tightly controls your personal data footprint.

Case Study: Lost Phone

A lawyer was out to dinner in Manhattan. When he and his guest got up to leave, he left his cell phone under a napkin on the table. The lawyer caught a cab outside the restaurant and didn’t realize he had left his phone until he was across town and almost home. When he called the restaurant, the manager put him on hold to look for the phone and came back to tell him they couldn’t find it. Unbeknownst to the lawyer, his phone screen was set to stay unlocked for five minutes.

Meanwhile, the fellow patron who stole his phone on the way out of the restaurant was on his home computer, copying all the lawyer’s phone data and the passwords to many of his online accounts. By the following morning, staffers at the lawyer’s firm became aware of an attempted cyberattack on their systems. Fortunately, they received an early alert of the data breach and could mitigate the data loss before private client files were hacked.

The prevalence of remote-access work has exposed many new network vulnerabilities and a complementary list of new forms of cyberattacks. As hackers become more sophisticated, individuals and companies must stay one step ahead of them. And as your small or midsized business (SMB) grows, expands its network and adds more devices such as smart controls, wireless access and remote access, your network vulnerability and need for regular network cyber security will grow, too.

From the little details of securely managing passwords to the vast undertaking of protecting your network and client data from cyberattacks, your business cannot afford to ignore these ever-evolving threats. The importance of remote workforce access, technology and security management, and ensuring proper protections are in place has never been greater.

Make sure you know everything you need to know about iPhone screen lock settings and phone privacy settings, from how to change a lock screen password to how to change a phone password. It’ll save you from disaster, whether you get hacked on public WiFi or leave your phone in a restaurant.

Have your IT services company review smart phone security, especially when employees use personal phones to access the company network. It is much less expensive and time consuming to prevent a cyber attack than to recover from one.