laitimes

Some things that Apple phones must know

author:Stories nag life

Recently there was a headline in the Wall Street Journal: We Hope Your iPhone Never

Gets Stolen. But Just in Case... BY NICOLE NGUYEN AND JOANNA STERN (PARAPHRASED IN PART FROM THE WALL STREET JOURNAL) COVERING A SERIES OF IPHONE THEFTS THAT TOOK AWAY VICTIMS' DIGITAL LIVES, WE'VE HEARD A BIG QUESTION FROM MANY READERS: HOW DO I PROTECT MY VALUABLE ASSETS, FROM PHOTOS IN THE CLOUD TO MONEY IN THE BANK? Thieves watched people enter iPhone passwords and then snatch devices, stealing not only phones, but also important online accounts and other information. An Apple spokesperson said: "We work tirelessly every day to protect our users' accounts and data and are constantly investigating additional protections against such new threats." Here's how to enable security settings, diversify data backups, and freeze your credit.

Protect your Apple ID

Set a stronger password: Your iPhone is the gateway to all your Apple services, and the gateway key might be a simple 4 or 6 digits. Reduce snooping: When changing your password in Settings, tap Password Options and then tap Custom alphanumeric code to enter numbers and letters. Consider using a screen protector with a privacy filter.

Add a Screen Time passcode: If you apply Screen Time parental controls to yourself, the thief who gets the iPhone passcode will need a second passcode to change your account. In Settings, go to Screen Time and scroll down to set a passcode (different from the passcode of your iPhone). Then tap Content & Privacy Restrictions, enable and scroll down to the "Allow changes" section. Select Don't allow for passwords, accounts, and cellular data.

With that, the thief will have to go through a series of complicated steps to reset the Screen Time passcode, buying you time to log into iCloud and wipe your device. (The process is described in detail below.) )

Use security keys: These USB/NFC keys provide strong protection for online accounts, including your Apple ID. Hackers need the physical key on hand to reset your Apple password remotely.

Protect your passwords

 Use a third-party password manager: The password saved in Apple's built-in iCloud keychain can be accessed using your phone's password.

Remove sensitive sign-in information, including bank accounts. Then set up a standalone password manager, such as Password or Dashlane, which will ask for a master password if Face ID or Touch ID fails. Install Manager on multiple devices.

 Choose a secure authenticator app: Thieves can see the verification code sent to your mobile number.

Instead, use an authenticator app to protect your two-factor code. Authy allows you to open apps using Face ID or Touch ID; If that fails, Authy asks you to type in a preset PIN. Set up Authy on multiple devices in case you lose one of them.

 Review recovery contact information: If you lose access, make sure you can reset passwords for important accounts. For example, if you have a Google account, set up a recovery email and phone number.

Protect your files

Using secondary cloud services: Victims locked out of Apple accounts are hit hard by losing photos and other files stored in iCloud. So back up your cloud backup. In addition to Apple Photos, we also use Google Photos. Amazon Photos, Microsoft OneDrive and Dropbox are other options.

Buy a hard drive: If you don't want to pay for another cloud service, buy a good external USB drive. We recommend SSDs like this SanDisk Extreme portable hard drive. Faster and more durable than traditional hard drives.

Set up automatic backups: You can manually back up files to the drive by dragging and dropping them, or you can use automatic backups. On Mac computers, Apple's built-in Time Machine tool periodically processes specified files.

You can automatically include the photos that you have downloaded to your Mac. On Windows, you can use iCloud for Windows to download your Apple photos. You can then use Microsoft's built-in backup and recovery tools.

Keep Your Money Safe Hide sensitive information: Some thieves open credit cards using Social Security information that victims find on the phone. Search the Notes and Photos apps and remove any sensitive data like passport photos. (You can save sensitive documents in locked notes, or better yet, in a third-party password manager.) Freeze your credit: Setting up a security freeze in advance prevents intruders from offering credit in your name. You can enable this feature online for free for the three major credit companies: Equifax, Experian and TransUnion. (You must unfreeze to open a new line of credit.) Set debit card limits: Thieves link debit cards stored in Apple Pay to Apple Cash to deplete financial accounts. Call your bank to lower your debit card's daily purchase and withdrawal limits.

Add PINs to cash and cryptocurrency apps: Financial services that may not have built-in banking protections require extra care. You can add protection to the Venmo and Cash apps by requiring a PIN to log in.

For PayPal, enable biometric login in the app's settings. If Face ID or Touch ID fails, the app will ask for a passcode.

Cryptocurrency exchanges don't usually return stolen funds, so set a separate password to protect the Coinbase or Robinhood app in your security settings.

If your phone is stolen...

 Login iCloud.com: From any device's browser, enter your username and password.

(Make sure you've memorized it!) Tap Find device, and then select the stolen device. You may need to take a screenshot of the location for the authority. Click "Erase iPhone" to erase all data of your phone remotely.

Suspend your mobile number: Thieves can use your number to get a verification code, so know how to lock your SIM card mobile service quickly. T-Mobile has a specific phone number, while Verizon and AT&T customers can pause online service.

 Call your card issuer: Keep a list of phone numbers from credit and debit card providers in a safe place. If your phone is stolen, call them and ask them to hang the card.

Revoke phone access: If you can't wipe your iPhone, sign in to online services like Amazon and Google and delete the stolen device from your account.

In addition, for friends who love to toss, it is not recommended to jailbreak your iPhone, because this may lead to security vulnerabilities and system stability problems. In addition, jailbreaking can also make you lose the warranty and technical support provided by Apple. In today's technology, no matter what system of mobile phones, but also become one of the indispensable tools, and its function is not limited to the original simple phone communication method, in short, protect your mobile phone equipment, is very important. With a few simple steps you take, you can make your device more secure from being stolen or hacked. Remember, prevention is better than cure, and the above mainly refers to some suggestions for iPhone users.

Read on