Ten Security Tips for Personally Managed iPhones and iPads - Slide 5

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Ten Security Tips for Personally Managed iPhones and iPads-5 Next

The Auto-Lock feature makes the screen lock automatically after a specified inactivity period. Ensure that Auto-Lock is activated. A value of 3 minutes or less is recommended.

  1. Go to Settings > General > Auto-Lock
  2. Set "Auto-Lock" to 3 Minutes

By itself, Auto-Lock does not constitute a security feature, but when combined with Passcode Lock, it will deter a casual attempt to access your data. Use the Passcode Lock feature to assign a four-digit PIN to your iOS device. With the prompt time set to "Immediately," the device will always require entry of the correct PIN in order to unlock the screen.

  1. Go to Settings > General > Passcode Lock
  2. Set "Passcode Lock" to ON
  3. Set "Require Passcode" to Immediately

Note: On the same screen, turn off Simple Passcode to enable full alpha-numeric passwords.

For additional security, use the Erase Data feature to erase all user-created data after 10 failed passcode attempts. This feature also greatly increases the time between failed access attempts to slow down more persistent attackers.

  1. Go to Settings > General > Passcode Lock
  2. Set "Erase Data" to ON

Smartphones, tablets and other mobile computing devices are becoming our go-to devices when it comes to getting things done, especially outside of the traditional office setting. They're just too convenient, and the increasing power packed into these gadgets means that some of them are worthy (or nearly worthy) of supplanting the laptops and desktops they once supplemented.

However, the smaller form factor of these devices, the "nomadic" nature in which they are used and the proliferation of different strategies (or inadequate ones) for securing these devices means that they create their own kinds of risks to your business data.

Given the risks, it’s important to adhere to strong security practices, especially if your device is personally managed and not administered by your company’s IT department. This slideshow features recommendations from The Information Assurance Mission at the NSA for securing your personally managed iPhone or iPad.

More Slideshows:


Don't Be a Loser: Think Before You Post It doesn't look like online users have learned much, as the number of those with "poster's remorse" has increased since last year.

Eleven Easy Ways to Improve Your Survey Response Rates Tips for getting better results when conducting surveys.


Nine Female Executives to Watch Top female executives to keep your eye on.

 

 

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.