securing_your_devices
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
securing_your_devices [2019/08/09 09:55] โ [Only install software / apps from trusted sources] neil | securing_your_devices [2021/07/06 09:26] (current) โ external edit 127.0.0.1 | ||
---|---|---|---|
Line 2: | Line 2: | ||
====Key points: ==== | ====Key points: ==== | ||
+ | * [[securing_your_devices# | ||
* [[securing_your_devices# | * [[securing_your_devices# | ||
* [[securing_your_devices# | * [[securing_your_devices# | ||
+ | * [[securing_your_devices# | ||
* [[securing_your_devices# | * [[securing_your_devices# | ||
* [[securing_your_devices# | * [[securing_your_devices# | ||
+ | * [[securing_your_devices# | ||
* [[securing_your_devices# | * [[securing_your_devices# | ||
* [[securing_your_devices# | * [[securing_your_devices# | ||
Line 13: | Line 16: | ||
* [[securing_your_devices# | * [[securing_your_devices# | ||
* [[securing_your_devices# | * [[securing_your_devices# | ||
+ | |||
+ | ====Use strong passwords === | ||
+ | |||
+ | Whether you have a computer with a traditional password, or a mobile device with a PIN, make sure the password or PIN you use to login to your device is [[passwords|strong]]. Same applies for all passwords for your online services. | ||
====Use a privacy screen / shield on your devices==== | ====Use a privacy screen / shield on your devices==== | ||
Line 31: | Line 38: | ||
Most computer privacy screens come with sticky tabs, so you can drop them into place easily. | Most computer privacy screens come with sticky tabs, so you can drop them into place easily. | ||
+ | |||
+ | ====Put contact details on your device' | ||
+ | |||
+ | {{:: | ||
+ | |||
+ | If you lose your device, you can increase the chances of getting it back by putting your contact details on your device' | ||
+ | |||
+ | You could also state that it contains legally privileged information, | ||
+ | |||
+ | ===iOS === | ||
+ | * Create a custom wallpaper of the right size for your device, containing the information you want (perhaps an email address or phone number (but not a phone number which only rings the device in question!)) | ||
+ | * Transfer it to your device (e.g. AirDrop, or email, or iTunes file transfer) | ||
+ | * Make it your device' | ||
+ | |||
+ | ===macOS === | ||
+ | |||
+ | * System Preferences / Security & Privacy | ||
====Limit what is shown on your lock screen ==== | ====Limit what is shown on your lock screen ==== | ||
Line 39: | Line 63: | ||
In particular, if you use your phone for [[two-factor_authentication|two-factor authentication]] via a message, if that message pops up on the lock screen, someone who has stolen or found your phone would see that code. | In particular, if you use your phone for [[two-factor_authentication|two-factor authentication]] via a message, if that message pops up on the lock screen, someone who has stolen or found your phone would see that code. | ||
+ | |||
+ | ====Enable auto-wipe ==== | ||
+ | |||
+ | If your device offers it, set it up to wipe automatically after sufficient incorrect password entries. However, make sure you take regular backups, as an annoyed child or curious toddler could, if left alone with your phone, wipe your device. | ||
+ | |||
+ | ===iOS === | ||
+ | |||
+ | * Settings / Face ID & Passcode / Erase Data | ||
====Replace sensitive identifiers with pseudonyms==== | ====Replace sensitive identifiers with pseudonyms==== | ||
Line 63: | Line 95: | ||
===Device-based protection === | ===Device-based protection === | ||
+ | |||
+ | {{:: | ||
Recent versions of the iOS software require you to put in your passcode before " | Recent versions of the iOS software require you to put in your passcode before " | ||
+ | ====Only use your own cables==== | ||
+ | |||
+ | Although a cable may seem harmless, some cables are small computers in their own right, and some contain enough space in the housing (the plastic bits covering the connectors) to contain a malicious computer, which attempts to access your computer or phone when you connect it. (For example, see [[https:// | ||
+ | |||
+ | Some even contain tiny microphones, | ||
+ | |||
+ | Only use your own cables โ do not borrow cables to charge your device โ and, if you need a replacement cable, get it from a trusted source. | ||
==== Cover your webcam when you are not using it ==== | ==== Cover your webcam when you are not using it ==== | ||
Line 139: | Line 180: | ||
Before you install a major update to your computer' | Before you install a major update to your computer' | ||
+ | |||
+ | ===Enable auto-update if there is a low risk of incompatibility === | ||
+ | |||
+ | For devices where an update is unlikely to break your workflow โ perhaps your mobile device โ consider enabling auto-update. That way, you never need to think about installing software updates yourself. | ||
+ | |||
securing_your_devices.1565344541.txt.gz ยท Last modified: 2021/07/06 09:26 (external edit)