Our Blog: Stuff we think you should know

Tip of the Week: Don’t Get Faced by FaceTime

Tip of the Week: Don’t Get Faced by FaceTime

Sometimes threats come from the most unlikely places. One such threat came in the form of Apple’s FaceTime app, which gives users the ability to spy on others without their consent through group FaceTime calls. Even though a patch has been issued that solves the problem, it’s still worth reflecting on.

The most dangerous part of the FaceTime group vulnerability is that it was accessible to any use who wanted to use it. It was so accessible that Apple had to go out of their way to disable the entire feature until the bug was resolved, keeping users from using a service for the sake of security.

Apple released an update to iOS 12.1.4, which turned the feature for group Facetime back on. Until the user applies the patch, they simply won’t be able to access this feature. Considering how dangerous this situation was, it makes sense that this is the way to handle such a bug. Instead of leaving the users’ security to themselves, thereby putting them at risk whether they know it or not, Apple is just shutting off the service until the user updates the device. In this way, Apple is leaving no room for error.

How to Upgrade Your Device
If you own an iOS device, run the update by following this path: Settings > General > Software Update. Be sure to keep in mind that the device needs to be charged, and you’ll also need a wireless connection. If you find that you’d rather have updates install themselves, you can also enable automatic updates on the same screen.

In the end, this just shows that you need to be security-minded. If you fail to do so, you could be putting your privacy at risk.

Installing updates is an important part of protecting your organization’s data, as well as your own personal information. To learn more about how you can make sure your business stays as secure as can be, reach out to us at 866.625.3560.

Social Media Can Be a Great Business Tool, So Long...
Are You Backing Up All the Data You Need?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, March 25 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business Malware User Tips Computer Business Computing Internet Network Security Microsoft Google Productivity Tech Term Software Hosted Solutions Efficiency IT Services Communication Mobile Devices Small Business Hardware Smartphone Data Ransomware Backup Windows 10 Android IT Support Productivity Microsoft Office Saving Money Workplace Tips Managed IT Services Data Management Cloud Computing Browser Business Continuity Data Recovery Managed IT Services Windows Gmail Data Backup Innovation Facebook Server Upgrade Internet of Things Outsourced IT App Windows 10 Passwords Office 365 Users Smartphones Disaster Recovery Phishing Word Artificial Intelligence Business Management Employer-Employee Relationship Encryption Mobile Device Chrome Vulnerability Cybersecurity communications Social Media Remote Monitoring Managed Service Provider VoIP Government Money Applications Office Tips Network BYOD Managed Service Hacker Tip of the week Content Filtering Information Big Data Miscellaneous Spam Apple Website Analytics IT Support Infrastructure Access Control IT Management Router Firewall Customer Service Robot Printing Maintenance Automation Employee-Employer Relationship WiFi Settings Two-factor Authentication Tablet Avoiding Downtime The Internet of Things Bandwidth Antivirus YouTube Save Money Virtual Reality Risk Management Paperless Office Wireless Data storage Display Wi-Fi Unified Threat Management Touchscreen HIPAA Outlook Holiday Laptop Business Intelligence Monitors Hacking Augmented Reality Telephone Systems Chromebook Safety Company Culture Quick Tips Operating System End of Support Scam Mobile Security Presentation Downtime Computing Document Management Password Office Hosted Solution Google Drive Gadgets Networking Mouse Vendor Management Wireless Technology Development Virtualization Recovery LiFi VPN Computers Data Security Search Education Data loss Business Technology IBM Storage Retail SaaS Virtual Private Network Mobile Device Management Administration Apps Server Management Customer Relationship Management FCC Smart Tech Buisness Going Green Voice over Internet Protocol Social Engineering Entertainment Refrigeration Update Desktop User Mail Merge Lithium-ion battery Social Shortcuts Unified Threat Management Alerts Service Level Agreement IT solutions Spying Public Speaking Disaster Shortcut Distributed Denial of Service Digital Payment Spyware Superfish Fraud Internet Exlporer Analysis Competition Statistics Comparison Typing Optimization Streaming Title II Connectivity 5G FinTech iOS SharePoint Deep Learning Humor Troubleshooting Politics Address Halloween Hacks Security Cameras Collaboration User Error Licensing Cortana Uninterrupted Power Supply Patch Management Managed IT Service Modem Human Error Value Fun Budget Bluetooth Specifications Compliance Cryptocurrency Recycling Online IoT MSP How To Scalability Undo Downloads IT Technicians Bring Your Own Device sip Tech Support Corporate Profile Scary Stories Managing Stress Marketing Managed Services File Sharing VoIP Cooperation PowerPoint Computer Care Solid State Drive Break Fix Cookies Bitcoin eWaste Network Congestion Device Application How To Hotspot Professional Services Samsung Black Friday Regulations IP Address Cybercrime WannaCry Microsoft Excel Star Wars Information Technology Migration IT service Heating/Cooling Multi-Factor Security Mirgation Best Practice telephony LED Websites Identity Theft Nanotechnology Sports Cables Writing Laptops Time Management Staff Knowledge Google Docs Onboarding Training Hard Disk Drive Dark Web Windows 8 Continuity Mobility Automobile Firefox Language USB Slack G Suite Cabling Cyber Monday Social Networking Mobile Office Blockchain Cost Management Google Wallet Charging BDR Servers Google Calendar Chatbots Business Growth Smart Office Co-Managed IT Net Neutrality Screen Reader Current Events Wires Software as a Service Hard Drives Network Management Printer Wearable Technology Experience Unified Communications Digital Signage Running Cable Solar Print Toner Techology Computing Infrastructure Dongle Legal Monitoring Managed IT Smart Technology Motherboard Digital Lenovo Permissions Assessment Virtual Desktop Drones Messaging Remote Computing Google Maps Legislation Identity Alt Codes Work Dark Data Content GPS Computer Repair IT Consultant Relocation Unsupported Software Processors Cameras Meetings Tracking Health Cleaning Private Cloud CrashOverride Mobile Data Alert CCTV Emoji Webcam Printers Electronic Medical Records Work/Life Balance Error Emergency Black Market Point of Sale Mobile Computing Travel Law Enforcement Physical Security Notifications Upgrades Windows 7 Twitter Botnet Supercomputer Motion Sickness Gadget Staffing Personal Information Administrator Domains Crowdsourcing Taxes Machine Learning IT Budget Regulation 3D Printing Web Server