Have the stolen cellular and the leaked data It is one of the great fears of today, since many of the personal information, banks and virtual card applications have the possibility to be used on mobile devices.
To prevent access to the device from happening, cell phones with the iOS system have some features that, when activated, offer greater protection to application data. See five configuration tips to increase the safety of your iPhone.
Activate the protection of the stolen device
With this tool, accounts and personal information becomes more protected when the phone is far from known places, such as home and work.
To increase safety, stolen device protection defines that some applications can only be accessed with biometric authentication by Face ID or Touch ID – without allowing the innwitty with the numerical password – and the postponement of a few hours for actions such as the Apple account password.
Known places are defined by locations you always visit, and in them the additional safety steps are not requested before these actions are carried out.
To activate protection, you need to enable iPhone adjustments to authentication of two factors, set up a device code; a face id or touch id; and location services.
- Go to the Adjustment app and select “Face ID and Code”;
- Roll up to “stolen device protection”;
- Activate the tool and define security postponement.
Configure application time of application
To prevent the thief from being able to access their accounts for a long time, you can set a time limit for the app to be blocked.
- Go to adjustments and “use time”;
- Click on “App Limits” and tap “Add Limit”;
- Choose application categories or desired platforms;
- Set the allowed time and go to “Add”.
Enable the search iPhone
With the location tool, you can register your device on friends and family, allowing them to always know where your phone is.
As a result, in cases of theft, the iPhone can be found through linked contacts.
- Go to the Apply App;
- At the bottom right, click “I” and activate “Share Location”;
- In the lower bar, select “People” and click “Share Location”;
- Choose contacts that will receive your invitation and choose how long you want to make the connection.
Tranque and Oculte Apps
THE concealment From one app from preventing other people from seeing or opening it, blocking access to people who do not have the face ID, touch, or code owner code.
- Keep the app icon pressed;
- Click on “Require Face ID”;
- Select “hide and demand face id”;
- Make your authentication and go to “hide app”.
Still, it is possible block An application, requiring face id, touch ID or code to open the app.
- Keep the app icon pressed;
- Double -click “Require Face ID”.
Activate data deletion
This functionality, when activated, makes all iPhone information deleted from the device if there are 10 incorrect password attempts.
- Go to the adjustments application;
- Select “Face ID and Code”;
- Roll up to the last option;
- Activate “delete data” and click “Activate”.
Remember: First iPhone is auctioned for over R $ 900 thousand
Do you use VPN? See the risks of using the tool for your cybersecurity
This content was originally published in see five tips for increasing the safety of your iPhone on the CNN Brazil website.
Source: CNN Brasil

Charles Grill is a tech-savvy writer with over 3 years of experience in the field. He writes on a variety of technology-related topics and has a strong focus on the latest advancements in the industry. He is connected with several online news websites and is currently contributing to a technology-focused platform.