User Tools

Site Tools


securing_your_devices

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
securing_your_devices [2019/08/08 18:21] – neilsecuring_your_devices [2021/07/06 09:26] (current) – external edit 127.0.0.1
Line 2: Line 2:
  
 ====Key points: ==== ====Key points: ====
-  * [[#Use a privacy screen / shield on your devices|Use a privacy screen / shield on your devices]] +  * [[securing_your_devices#Use strong passwords|Use strong passwords]] 
-  * [[#Replace sensitive identifiers with pseudonyms|Replace sensitive identifiers with pseudonyms]] +  * [[securing_your_devices#Use a privacy screen / shield on your devices|Use a privacy screen / shield on your devices]] 
-  * [[#Don't charge from public USB ports|Don't charge from public USB ports]] +  * [[securing_your_devices#Limit what is shown on your lock screen|Limit what is shown on your lock screen]] 
-  * [[#Cover your webcam when you are not using it|Cover your webcam when you are not using it]] +  * [[securing_your_devices#Enable auto-wipe|Enable auto-wipe]] 
-  * [[#Disconnect your microphone or at least try to get a notification when it turns on|Disconnect your microphone or at least try to get a notification when it turns on]] +  * [[securing_your_devices#Replace sensitive identifiers with pseudonyms|Replace sensitive identifiers with pseudonyms]] 
-  * [[#Only install software / apps from trusted sources|Only install software / apps from trusted sources]] +  * [[securing_your_devices#Don't charge from public USB ports|Don't charge from public USB ports]] 
-  * [[#Check what permissions your software is requesting|Check what permissions your software is requesting]] +  * [[securing_your_devices#Only use your own cables|Only use your own cables]] 
-  * [[#Enable remote wipe functionality|Enable remote wipe functionality]] +  * [[securing_your_devices#Cover your webcam when you are not using it|Cover your webcam when you are not using it]] 
-  * [[#Install software updates promptly|Install software updates promptly]] +  * [[securing_your_devices#Disconnect your microphone or at least try to get a notification when it turns on|Disconnect your microphone or at least try to get a notification when it turns on]] 
-  * [[#Keep a log of your key software, and alternative options|Keep a log of your key software, and alternative options]]+  * [[securing_your_devices#Only install software / apps from trusted sources|Only install software / apps from trusted sources]] 
 +  * [[securing_your_devices#Check what permissions your software is requesting|Check what permissions your software is requesting]] 
 +  * [[securing_your_devices#Enable remote wipe functionality|Enable remote wipe functionality]] 
 +  * [[securing_your_devices#Install software updates promptly|Install software updates promptly]] 
 +  * [[securing_your_devices#Keep a log of your key software, and alternative options|Keep a log of your key software, and alternative options]] 
 + 
 +====Use strong passwords === 
 + 
 +Whether you have a computer with a traditional password, or a mobile device with a PIN, make sure the password or PIN you use to login to your device is [[passwords|strong]]. Same applies for all passwords for your online services.
  
 ====Use a privacy screen / shield on your devices==== ====Use a privacy screen / shield on your devices====
Line 30: Line 38:
  
 Most computer privacy screens come with sticky tabs, so you can drop them into place easily. Most computer privacy screens come with sticky tabs, so you can drop them into place easily.
 +
 +====Put contact details on your device's lock screen ====
 +
 +{{::img_0518.jpg?400|}}
 +
 +If you lose your device, you can increase the chances of getting it back by putting your contact details on your device's lock screen.
 +
 +You could also state that it contains legally privileged information, if that might help avoid an unwanted search or seizure.
 +
 +===iOS ===
 +  * Create a custom wallpaper of the right size for your device, containing the information you want (perhaps an email address or phone number (but not a phone number which only rings the device in question!))
 +  * Transfer it to your device (e.g. AirDrop, or email, or iTunes file transfer)
 +  * Make it your device's lock screen: Settings / Wallpaper / Choose a New Wallpaper / Set as lock screen.
 +
 +===macOS ===
 +
 +  * System Preferences / Security & Privacy  / General / Show a message when the screen is locked
 +
 +====Limit what is shown on your lock screen ====
 +
 +Many applications will let you preview messages when your device is locked — for example, the content of a text message, or the first line or two of an email.
 +
 +If you lose your device, someone can still see information about you or your clients.
 +
 +In particular, if you use your phone for [[two-factor_authentication|two-factor authentication]] via a message, if that message pops up on the lock screen, someone who has stolen or found your phone would see that code.
 +
 +====Enable auto-wipe ====
 +
 +If your device offers it, set it up to wipe automatically after sufficient incorrect password entries. However, make sure you take regular backups, as an annoyed child or curious toddler could, if left alone with your phone, wipe your device.
 +
 +===iOS ===
 +
 +  * Settings / Face ID & Passcode / Erase Data
  
 ====Replace sensitive identifiers with pseudonyms==== ====Replace sensitive identifiers with pseudonyms====
Line 54: Line 95:
  
 ===Device-based protection === ===Device-based protection ===
 +
 +{{::img_058c2d4adde5-1.jpeg?400|}}
  
 Recent versions of the iOS software require you to put in your passcode before "trusting" a device to send information to, or read information from, your phone or tablet. Recent versions of the iOS software require you to put in your passcode before "trusting" a device to send information to, or read information from, your phone or tablet.
  
 +====Only use your own cables====
 +
 +Although a cable may seem harmless, some cables are small computers in their own right, and some contain enough space in the housing (the plastic bits covering the connectors) to contain a malicious computer, which attempts to access your computer or phone when you connect it. (For example, see [[https://www.vice.com/en_us/article/evj4qw/these-iphone-lightning-cables-will-hack-your-computer|here]].)
 +
 +Some even contain tiny microphones, and SIM cards for relaying the audio back to an attacker.
 +
 +Only use your own cables — do not borrow cables to charge your device — and, if you need a replacement cable, get it from a trusted source.
  
 ==== Cover your webcam when you are not using it ==== ==== Cover your webcam when you are not using it ====
Line 97: Line 147:
 For example, for macOS or iOS, this is Apple's App Store. For example, for macOS or iOS, this is Apple's App Store.
  
 +If you do want to install software from outside a trusted source — and there is lots of great software which is not available through app stores — consider testing it on a spare machine first, and consider looking at its network traffic, to see if it is phoning home unnecessarily, or trying to exfiltrate data.
 ====Check what permissions your software is requesting==== ====Check what permissions your software is requesting====
  
Line 129: Line 180:
  
 Before you install a major update to your computer's operating system, check that any software you rely on works with, and has been tested with, the updated version. Otherwise, while you might have the most up-to-date and secure operating system, your ability to use your computer productively could be severely impacted. Before you install a major update to your computer's operating system, check that any software you rely on works with, and has been tested with, the updated version. Otherwise, while you might have the most up-to-date and secure operating system, your ability to use your computer productively could be severely impacted.
 +
 +===Enable auto-update if there is a low risk of incompatibility ===
 +
 +For devices where an update is unlikely to break your workflow — perhaps your mobile device — consider enabling auto-update. That way, you never need to think about installing software updates yourself.
 +
  
  
 ====Keep a log of your key software, and alternative options ==== ====Keep a log of your key software, and alternative options ====
-Worth keeping a log of what software you rely on, and identifying an alternative so that, if your chosen software suddenly became unavailable, you know where to go. It may not be perfect — it may not need to be — but it might just keep you working rather than panicking. 
  
-May make you shy away from file types which can only be opened in one particular piece of software â€” something which you can open with a different, replacement piece of software gives you greater control and flexibility.+From a business continuity perspective, it is worth keeping a log of the software you rely on, and identifying an alternative so that, if your chosen software suddenly becomes unavailable or support is withdrawn, you have a fallback in mind.  
 + 
 +Your fallback may not be perfect, but it should keep you working rather than panicking. 
 + 
 +By the same token, be aware of locking yourself in to proprietary formats which does not offer easy export into common interchangeable formats: if you lock yourself into a particular format, moving to other software is support becomes unavailable might be difficult. If you can, storing data in a format which you can open with a different, replacement piece of software gives you greater control and flexibility.
securing_your_devices.1565288505.txt.gz · Last modified: 2021/07/06 09:26 (external edit)