Apple
happens to own a whole technology ecosystem, from its proprietary processor,
iOS down to app store, everything seems to revolve around one big Apple tree.
Having
understood these , don't get too excited yet, despite that Apple implement
all-around security there are still cases of FBI getting access to a locked
device without Apple's assistance, well don't panic yet, actually what it means
is that your being in the Apple platform does not make you immune to
information theft.
Lately,
almost every tech firm has become Data miners, it seems everyone is gathering
enough information to train its AI neural network, so the race for a human-like
computer is at the expense of our footprint on the internet, actually, it sounds
cool, more like you are doing the industry a good thing by making information
available to its Baby Ai, however your view, it is a bad help in the long run.
Hackers too
are working day and night shift to have a glimpse of your vital information
especially those related to credit card and other sensitive security details, obviously what giant tech firms are doing is quite ethical but these guys at the
other spectrum are to be dreaded, in that your life savings could drown on the
internet without any trace. this's basically one of the good bad guy industry
that has kept the internet evolving at unprecedented speed. An attack and
counterattack sort of progress.
The list of
people across the internet who are interested in you is endless, as much as
there are spread across the internet there are also measures you could adhere
to in other to minimize your chances of falling a victim to privacy or
information attack.
Warning: Never assume
it's never coming your way, never give out personal information on a chat room. Below are some Privacy theft tactics and how to secure your data.
Physical
Threat: This protection is within your control, your device and privacy are
yours until you turn it over to someone, at this level of security we encourage
you to prevent people from having direct access to your device by having it
passworded, in addition, do not repeat your password across platforms as it
could easily match a password guess.
Jail
Breaking: Though on the decrease yet users still indulge in this act without
considering its implication, Apple is careful not to risk iPhone consumer
security, that's why the company has maintained its Walled Garden platform but
some users feel it's unfair not to enjoy individual customization, that's where
Jailbreaking comes in, the procedure is supported by third-party apps, it kind
of remove apple's edge over a device. in as much as you will enjoy full control
of the device afterwards, note that it comes to your detriment in the long run
as it will not only void your warranty but will make your device vulnerable to
data theft.
Regular OS
Update: iOS has really come a long way, it has evolved into a robust platform
yet it keeps getting better, as at the time of writing this post, iDevices are
running the version 12.3, due to the current cybersecurity challenge Apple
maintains a regular OTA update of its devices, so if you are yet to upgrade your
device operating system, I encourage you to do so as it's another way of
staying ahead of information-miners.
Malicious
Apps: Not every app on the app store is safe let alone third-party App stores,
some of these Apps are integrated with codes that could compromise your
privacy, these apps request permission that if granted could render your
activities mirrored.
Be mindful
of any App that requests any of these permissions listed below.
Accounts access: It helps a hacker
download your data including contact lists and e-mail addresses.
admin permission: If
granted, this permission can help a hacker take remote control of your phone,
track it live and even wipe it remotely.
SMS permission: It can be
used to send sms to premium-rate numbers and drain out your balance.
Microphone access: It can be
triggered to record phone conversations remotely.
Contacts Permission: This permission could
enable remote access to your contact list.
Email
Attachment: Phishing is one of the oldest methods employed by fraudsters to
collect data through email, it's a fake email and attachment in disguise, it's
meant to make it recipient to hand over confidential info ignorantly, this
email often contains a link which redirects to another site on a click,
sometimes it comes with a "unsubscribe button" which when clicked downloads a
malware to the device upon installation grants a third party full access to the
device. To stay safe ensure you know the full web address and email address of
your financial institution and other critical related info, as phishing is
built around deceit
Turn
Location Off: Though not really necessary but if you think your location should not be disclosed you may have to turn off location on your device.
VPN:
This is another way of staying invisible on the internet, VPN could
be very very helpful as it gives prospective data miners fake information about
your location and identity online.
Red Flag
Websites: Clone websites are scattered across the internet in a bid to trick
unsuspecting internet users to hand over their credit card and other sensitive
information, these websites are designed to appear like the original, some popup
forms on your screen requesting you to fill it, not to worry there are many ways
to identify this kind of sites.
Make sure you are running the latest browser, secondly before you make any online related transaction ensure the site is secured with SSL Technology ( Browser to Server Communication protocol and vice versa) to know whether a website is secured with this encryption technology, always check the URL it should be HTTPS not HTTP to indicate it's secured in addition there's always a lock icon on your Safari Browser screen to indicate SSL connection.
Make sure you are running the latest browser, secondly before you make any online related transaction ensure the site is secured with SSL Technology ( Browser to Server Communication protocol and vice versa) to know whether a website is secured with this encryption technology, always check the URL it should be HTTPS not HTTP to indicate it's secured in addition there's always a lock icon on your Safari Browser screen to indicate SSL connection.
Anti Virus: You need Anti-Virus software to counter software attacks, not some sophisticated hardware,
Anti Virus seems to be the defacto software for securing a device against
attack, since they have evolved along with virus over the years, lately
Antivirus software is being compromised, the very thing that was meant to protect is
being used to execute malware on a device, this malware and other non-ethical
code could mirror all your activities and even capture keystroke and return it
to its designated server, to stay ahead we advise you to download Legitimate antivirus
software, never click on anti-virus pop up that are generated from websites,
most importantly stay away from free App I mean pirated software as they are
known to accommodate malware.
Insecure Network: Most networks like public Wi-Fi are left
unprotected due to minimal technical and financial budgeting as such
anyone connected to the network is at risk as anyone with the right tools and
knowledge could easily have his way into connected devices and steal whatever. if you
must connect to these networks do not access your email or perform any
transaction over it, secondly always use strong encryption like WPA2 on your
Home and office Wi-Fi instead of open or WEP security as they can easily be
bypassed.
You must not
do all of these to be secured, the most important form of security is the one
you create within your environment through a positive relationship with people
online and offline, being right with your self is the first step of being
secured as insecurities come from within.
Emoticon Emoticon