0% found this document useful (0 votes)
64 views2 pages

Mobile Scan Checklist All Things Secured

Uploaded by

mselias17
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views2 pages

Mobile Scan Checklist All Things Secured

Uploaded by

mselias17
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

iOS MOBILE SCAN CHECKLIST

Periodic Scan (Quarterly or Annually):


Do a full scan of the phone using reputable software like Certo Software

Review installed apps and remove unused or unfamiliar ones

Make sure the OS is updated and set to "Automatic Updates - ON"

Review all subscriptions (App Store —> Account —> Subscriptions)

Review all camera and microphone permissions (Privacy & Security settings)

Do a Safety Check (Privacy & Security —> Safety Check)

Turn off unnecessary location data (Privacy & Security —> Location Services)

Check 2FA Setup for Apple ID (Apple ID —> Sign-In & Security)

Check for unknown VPN configurations (Settings —> VPN)

Ensure the Personal Hotspot setting is turned off

Turn on Advanced Data Protection (watch this tutorial)

Turn on Stolen Device Protection (Settings —> FaceID & Passcode)

If You Believe Your Device is Compromised:


Start by turning off all WiFi & Network connections

Check for unknown devices (Settings —> Apple ID —> scroll down)

Change all important passwords (if possible, from another device)

Set up new 2FA for Apple ID & other accounts (watch this tutorial)

Turn on Lockdown Mode (watch this tutorial)

Consider changing to new SIM or eSIM service (good eSIM options)

Turn off all Share My Location options (Apple ID —> Find My)

AllThingsSecured.com
Tips for Greater Security & Privacy
When possible, it’s best to use 2-factor
authentication (2FA) that is based on an
authenticator app or a security key. SMS text has been shown time and
again to be vulnerable to attack.

If you don’t trust Apple or Google anymore, there are open source mobile
operating systems such as Graphene OS that allow you to "flash" certain
mobile devices and use a de-Googled phone.

If you need to use a SIM-enabled phone at times but don’t want it


constantly broadcasting your
location and system data to your
mobile provider, there is a solution
known as a Faraday Bag in which
you can put your phone and block
all incoming and outgoing signals.

Instead of having one phone


number that you give out to every
person and company, there is value
in purchasing a virtual phone
number that allows you to have a
"throwaway" number in addition to
the number that actually rings your
device.

DO NOT use the same 4- or 6-digit code that unlocks your phone for every
other numeric passcode. Come up with one passcode for your phone and
a separate one for everything else.

Did you know that you can purchase a data-only eSIM? It’s still possible
for mobile providers to track you with this eSIM, but you eliminate certain
threat vectors without access to unencrypted phone and SMS text. This
isn’t the most convenient option, but it might be one to consider for some
people.

AllThingsSecured.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy