Previous posts in this series have focused on iOS 10 Touch ID and Passcodes. Passcodes are important for protecting the data-at-rest on a digital device. The next few posts are going to cover iOS 10 system hardening. The steps outlined here cover a number of potential vulnerabilities including defending data-at-rest, preventing malware execution, and controlling the device’s Wi-Fi, cellular, and Bluetooth interfaces.
The previous three posts in this series have covered passcodes, passcode best practices, and Touch ID. This post will cover iOS 10’s remaining Touch ID and Passcode settings.
Touch ID allows you to use your fingerprint as an authentication factor for certain functions. By pressing your finger on the home button, your fingerprint is read and access to the appropriate function is granted. Touch ID is an interesting feature; it has allowed millions of people to conveniently protect their devices that might not have otherwise. It is not perfect, however.
In the last post in this series I discussed the various passcode options available on iOS 10 devices, and the specific merits of each. This post will focus on generalities. Regardless of which passcode option you choose, there are some passcode best practices that will reduce the likelihood your passcode will be discovered. Continue reading “iOS 10 Passcode Best Practices”
iOS 10 passcodes are perhaps one of the most important considerations to the security of a data-at-rest on an iOS device. Apple has used very strong full-disk encryption on iOS devices since iOS 3 and the iPhone 3GS. This encryption is “non-configurable” by the end user, meaning it cannot be disabled, intentionally or unintentionally. However, to take advantage of this encryption you must passcode-protect the device. Continue reading “iOS 10 Passcodes Part 1: Passcode Types”
A lot of you have been asking when Your Ultimate Security Guide: iOS 10 will be available. Unforunately, I am pulled in many directions right now, and am quite confident I will not be able to get it out in any kind of timely manner (I’m already over a quarter of its life-cycle behind the curve). Writing a book of this nature is technically demanding as the content changes almost daily, so creating a definitive work is frustrating in the best of times. However, I want to get the content out to you! Continue reading “Your Ultimate Security Guide: iOS 10”