Ten Security Tips for Personally Managed iPhones and iPads - Slide 8

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Ten Security Tips for Personally Managed iPhones and iPads-8 Next

Location Services can be used by applications on your iOS device to track your location. Unless there is some critical need for applications to know your location at all times, Location Services should be turned off, or toggled on and off only as needed.

  1. Go to Settings (Settings > General on iPads)
  2. Set "Location Services" to OFF

Applications that use Location Services will ask to use Location Services the first time they are launched. Consider these requests carefully and only enable Location Services when absolutely necessary.

Smartphones, tablets and other mobile computing devices are becoming our go-to devices when it comes to getting things done, especially outside of the traditional office setting. They're just too convenient, and the increasing power packed into these gadgets means that some of them are worthy (or nearly worthy) of supplanting the laptops and desktops they once supplemented.

However, the smaller form factor of these devices, the "nomadic" nature in which they are used and the proliferation of different strategies (or inadequate ones) for securing these devices means that they create their own kinds of risks to your business data.

Given the risks, it’s important to adhere to strong security practices, especially if your device is personally managed and not administered by your company’s IT department. This slideshow features recommendations from The Information Assurance Mission at the NSA for securing your personally managed iPhone or iPad.

More Slideshows:


Don't Be a Loser: Think Before You Post It doesn't look like online users have learned much, as the number of those with "poster's remorse" has increased since last year.

Eleven Easy Ways to Improve Your Survey Response Rates Tips for getting better results when conducting surveys.


Nine Female Executives to Watch Top female executives to keep your eye on.

 

 

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.