ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Ten Steps for the Security of Your Apple IOS Smartphone

Updated on July 10, 2017

Apple iOS devices and smartphones are as powerful and functional as many computers. They continue to grow in popularity among users of all ages. As their usage grows, so does the potential for attack by nefarious people and programs. It is more important than ever that you protect yourself and your Apple smartphone and other iOS devices from these cyber security threats.The security tips below can help prevent you from being a victim to bad actors.

Below you will find an outline of the ten steps, along with instructional videos for each step.

Steve Jobs Quote

An iPod, a phone, an internet mobile communicator... these are NOT three separate devices! And we are calling it iPhone! Today Apple is going to reinvent the phone. And here it is. Steve Jobs

Read more at:

Ten Security Steps Below:

  1. Set PINs and passwords
  2. Do not modify your smartphone’s security settings
  3. Backup and secure your data
  4. Only install apps from trusted sources
  5. Understand app permissions before accepting them
  6. Use the free, built-in security features
  7. Accept updates and patches to your smartphone’s software
  8. Be smart on open Wi-Fi networks
  9. Wipe data on your old phone before you donate, resell, or recycle it
  10. Report a stolen smartphone

The following elaborates on each of the ten steps to secure your APplie iOS Smartphone.

Set PINs and passwords.

You should always set a password or Personal Identification Number (PIN) to prevent unauthorized access to your phone. If your phone is stolen, or lost, the password or PIN is the first line of defense in protecting the information on your device. It is important that your r-mail, banking and other personal web sites have a different password for login.

When your phone is idle it should be set to automatically lock after minutes or less. You should always use the SIM password on your Apple iOS device. You can also use the secure, and convenient, Touch ID to secure and unlock your phone.

Do not modify your smartphone’s security settings

Convenience can be your biggest enemy. You should never alter the built in (factory) security features of your Applie iOS device. Built-in security features are undermined when one attempts to, or tries to tamper with their device by rooting, or jail-breaking, their device. It only makes the phone more susceptible to attack.

Pavlovian Ferocity for the iPhone

Here's the problem: I don't like who I've become when my iPhone is within reach. I find myself checking e-mails and responding to texts throughout the day with some kind of Pavlovian ferocity - it's not a conscious act, but a reflexive one. Josh Radnor

Read more at:

Backup and secure your data

You should always, and regularly, backup data on your device. Data such as contacts, documents and photos should be part of that data backup schedule. Backup data can easily be stored on a removable storage card, your computer or in the cloud. If your phone is stolen or lost, it will be more convenient to restore the data back to your Apple iOS device.

Only install apps from trusted sources

You should always ensure an app is legit before downloading it. Do your research and due diligence. Check the app reviews first and fore most. Compare the app official website with what is listed on the app store link for consistency.

Harm to your Apple iOS device, viruses and malware can result if your app is from an untrusted source.

Apps also exist that can warn you of security vulnerabilities on your phone.

Understand app permissions before accepting them

Before you let an app have access to resources on your phone, you should be very cautious. Even with legit apps, you should grant this access sparingly on only on an as needed basis.

Reinventing the phone

We want to reinvent the phone. What's the killer app? The killer app is making calls! It's amazing how hard it is to make calls on most phones. We want to let you use contacts like never before - sync your iPhone with your PC or mac. Steve Jobs

Read more at:

Use the free, built-in security features

If your iPhone is stolen or lost, and iOS 7 or later, it comes with a standard Find My Phone app and Activation Lock. This is designed to secure and find your iOS device.

The Find My Phone app will locate your device and display it n a map. If your phone is lost or stolen, the Activation Lock will prevent anyone from accessing and using your device.

There is also a built in feature that allows you to wipe data from your device.

All of these functions are free and included with the iPhone or part of signing up with iCloud.

Accept updates and patches to your smartphone’s software

By keeping your iOS device current, the risk of exposure to cyber security threats is reduced greatly.

Always follow the Apple's and service provider recommendations to update and patch when they make the updates and patches available and you are prompted.

Leaving your phone without current updates just because an app will not function with the new updates is lending you to trouble. You have now increased the attack surface for your device. One, you have a phone without the most current updates. Secondly, you are using an app that the vendor has not kept current with the most updated iOS updates.

Be smart on open Wi-Fi networks

Criminals love public Wi-Fi networks. They make your phone an easy target when these open to the public networks are used.

You should always attempt to use trusted and protected Wi-Fi when available and avoid public networks when able. This is especially true when you need to access sensitive or personal information and data.

Be cautious and aware when clicking web links and especially when asked to enter personal account or log-in information.

iPhone Quotes

My real big Internet claim to fame is the fact that I was first to jailbreak the iPhone. Chris Hughes

Read more at:

Wipe data on your old phone before you donate, resell, or recycle it

Completely erase the data of of you iOS device and return it to the factory settings. This is just one more step to protect your personal information and data you wish to remain private and personal.

Report a stolen smartphone

In coordination with the FCC, most major carriers have a stolen phone database. You should always report a stolen phone to, not only law enforcement, but your service provider. This will allow for remote locking of the phone so it cant be activated on any other network.

Apple Headquarters Location

Apple Headquarters:
1 Infinite Loop, Cupertino, CA 95014, USA

get directions

Rate and Comment Now!


    0 of 8192 characters used
    Post Comment

    No comments yet.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)