Phone Privacy Settings - Get Them Right and Keep Them Right
For many people, time on their cell phones has replaced much of the time they used to spend on their computers. Smartphones have evolved so much that users now perform many functions previously reserved exclusively for their computers on them. In addition, the pandemic has dramatically increased the need for secure remote access to all kinds of private data for our business and personal lives.
With progress comes new vulnerabilities. Now, any device connected to a wireless network is at risk of being hacked. Also, an unattended cell phone needs better than entry-level protections to guard against snooping and cyber theft.
iPhone Screen Lock Settings
For basic security, a time should be set on your iPhone for how long the screen display will remain on before locking the phone. The screen lock time can be set as follows:
- Open Settings on your phone.
- Open Display and Brightness
- Tap the "Auto-Lock" tab.
- Select the length of time you wish your iPhone to remain on when you’ve stopped actively using it. You can select any time from 30 seconds, one to five minutes or “Never.” Choose the shortest length of time that is appropriate for you. You do not want your phone to remain “On” indefinitely when not being used. Leaving your screen permanently unlocked will open it to easily avoidable security threats and waste battery life.
How to Change the Lock Screen Password (for Face or Touch ID)
Everyone should know how to change a phone password. The iPhone screen lock setting is an integral part of front-line security and phone privacy settings. Therefore, it should be taken very seriously. You can change and customize the screen lock settings at any time by taking the following steps:
- Open the “Settings” Tab
- Select “Face ID and Passcode”
- Enter your current four- or six-digit passcode
- Scroll down to “Change Passcode”
- Enter your old passcode again
- When prompted for a new passcode, select “Passcode Options.”
- Select setting for a 4-digit, six-digit or one of the two types of custom passcodes.
Do I Need to Worry About Strong Passwords?
The short answer: Yes.
Creating and managing strong passwords is a fundamental part of cyber security. It is bad enough when a phone is lost or stolen. It is much worse when the thief can immediately access private information and business data stored on your phone. Cyber security isn’t guesswork. A robust, layered approach to protecting your data and online work is an essential part of securing your hard-earned business data in today’s expanded remote-access work environment. But it’s not just a threat to your mobile phone. All devices connected to a network are potential attack targets for cybercriminals. Therefore, cell phones online with your business network can be portals to the rest of your company’s most sensitive files.
Case Study
A lawyer was out to dinner in Manhattan. When he and his guest got up to leave, he left his cell phone under a napkin on the table. The lawyer caught a cab outside of the restaurant and didn’t realize he had left his phone until he was across town and almost home. When he called the restaurant, the manager put him on hold to look for the phone and came back to tell him they couldn’t find it. Unbeknownst to the lawyer, he had his phone screen set to stay unlocked for five minutes.
Meanwhile, the fellow patron who stole his phone on the way out of the restaurant was on his home computer, copying all the lawyer’s phone data and passwords to many of his online accounts. By the following morning, staffers at the lawyer’s firm became aware of an attempted cyberattack on its systems. Fortunately, they received an early alert of the data breach and could mitigate the data loss before private client files were hacked.
The recent dramatic increase in remote-access work has exposed many new network vulnerabilities and a complementary list of new forms of cyberattacks. As the hackers get better, we must stay one step ahead of them. And as your small to midsized business grows, expands its network and adds more devices such as smart controls, wireless access and remote access, your network vulnerability and need for regular Network Cyber Security will grow, too. From the little details of securely managing passwords to the vast undertaking of protecting your network and hard-earned data from severe cyberattacks, your business cannot afford to ignore these ever-evolving threats. Since the pandemic, the importance of remote workforce access, technology and security management and ensuring proper protections are in place has never been greater.
Whether you work at a home office or remotely, there are affordable solutions to help manage all your IT needs. GEEK-AID® Computer and Network Support specializes in customized Managed IT Services for small to midsized businesses. In addition, GEEK-AID® knows how to protect your privacy online. GEEK-AID®’s team of experts is comprised of specialists in different areas of IT services, serving clients on-site and remotely. The GEEK-AID® team doesn’t clock out at five o’clock on Friday. They are available 24/7 to ensure your computers, network and data stay healthy and secure. Hardware and software installation and maintenance, repair, security and network protection must be consistent, proactive and not wait for a system failure or data breach.
Call (877) GEEK-AID (877-433-5243) to evaluate and discuss your IT needs. Remember, we are here for you 24/7.