Managing apps

Managing apps
Getty Images

Are you using Apple privacy settings on your iPhone? If not, you may want to reconsider just how much personal information can be exposed. Arbitrary details, such as where you shop, where you work or how you get around town may seem irrelevant but when data is collected and compiled by third-party apps, privacy can easily be breached. Using security features is important to secure your iPhone and prevent a cybercriminal from infiltrating your smartphone. While your info isn’t always safe, the good news is, iPhones rarely get viruses.

The iPhone doesn’t have a privacy mode, as Android phones do, but there are Apple privacy settings users can enable to reduce the likelihood their personal information will be compromised. Managing apps permissions is an important step to take back some control of what private information is shared about you and gathered online. When you check your privacy settings, you may be surprised by what your smartphone knows about you.

Check out these hidden iPhone hacks you never knew about.

Advertisement

iPhone privacy features

iPhone privacy features
Getty Images

iPhones are known to be better than Androids when it comes to privacy and security “primarily because Apple does a better job of forcing users to keep their operating system up to date,” says Jack Vonder Heide, president of Technology Briefing Centers, Inc. and a frequent speaker on privacy and security topics. Privacy features on Apple devices include passwords, Touch ID, Face ID and two-factor authentication.

Don’t miss these things to never post about your relationship on social media.

Passwords

Passwords
Getty Images

Passwords are a combination of words and letters to access and unlock a device that the user sets. It’s important to create a complex passcode that isn’t easy to crack. It’s also important to use them; iPhones give you the option to turn them off and if you do and your phone winds up in the wrong hands, you’ll have lost this initial layer of defence.

Find out how to tell if your computer has been hacked.

Touch ID

Touch ID
Getty Images

Touch ID is a type of biometric technology, using fingerprints as a layer of security to unlock your device as an alternative to a password. The first iPhones to have Touch ID are the iPhone 5s and models up to iPhone 8 Plus and iPhone SE have Touch ID installed. Having Touch ID, along with locking your phone, are also essential steps for knowing how to hide messages on an iPhone and keeping your conversations private.

Interested in smartphone security? Here’s everything you need to know to keep your phone safe.

Face ID

Face ID
Getty Images

When iPhone X debuted without a home button, Apple introduced Face ID. This facial recognition, a form of biometric technology, allows users to unlock their devices, make payments, and access sensitive information by holding their phones up to their faces. iPhones X through iPhone 12 Pro Max have Face ID.

Two-factor authentication (2FA)

Two-factor authentication (2FA)
Getty Images

This is a layered process that requires a one-time code sent to another device, such as your computer or tablet, along with your password for more security. “The best protection is 2FA because it is unlikely that a hacker would have the two vital pieces of information needed to log into your accounts,” says professor of digital marketing, Jonathan Simon. Additionally, there have been situations where biometrics have been replicated by fingerprint scanners and the like, compromising users’ personal data.

Find out what to do if your data has been hacked.

Location settings

Location settings
Getty Images

Apple devices are constantly collecting data about you, including tracking your location – when, where, and how frequently you visit a place – to identify your significant locations and offer location-based services ranging from helping you locate the nearest service station to alerting responders to your location in an emergency. While Apple states they don’t sell your data, the apps you use might to third parties for targeted marketing. “In most cases, you give permission for the app to monitor your location on a continuous basis and to share that data with others. […] that analyse your activity and push customised advertising to your phone,” Heide says.

Managing your location settings is fundamental to minimising the amount of personal information you inadvertently give, especially with apps that don’t need your location to function properly. “People tend to believe they don’t have a thing to hide […but] anyone should be cautious of location tracking and manage it accordingly,” says Daniel Markuson, digital privacy expert at NordVPN. “Technology called fingerprinting cross-matched with the location parameters makes it possible to know who you are and what you were up to without your consent,” he warns.

How to manage app permissions

How to manage app permissions
Getty Images

Managing app permissions is key to minimising how much personal information is collected from you. “Apps are always tracking your data,” Simon says. “They know when you downloaded the app, when you open it, how much time you are spending in it, and any action you take in the app.” Although there is some information you can eliminate without removing the app, “you should determine what value you are getting from each app and then decide if the information you are required to give is worth it,” Heide suggests. Before installing any app, read the Privacy Policy. “You should never give a ‘go’ to everything an app is asking for, except for the permissions an app cannot function without,” Markuson recommends. Some apps, for example, need to track your location in order to function, such as weather apps, ride-sharing, or food delivery ones, but you can choose to turn off tracking when you’re not actively using the app. Many smartphone apps steal your data so it’s a good idea to monitor your privacy settings.

How to check app permissions on your iPhone

How to check app permissions on your iPhone
Getty Images

To check your app permissions, go to Settings —> Privacy. A list of different categories, such as Location Tracking, Bluetooth, Contacts, Microphone, Photos, and more will appear. You can click on each specific category to see which apps have access to that data. You can grant or revoke permissions as you see fit.

Sign up here to get Reader’s Digest’s favourite stories straight to your inbox!

Source: RD.com

Never miss a deal again - sign up now!

Connect with us: