	{"id":570,"date":"2008-12-09T13:56:19","date_gmt":"2008-12-09T12:56:19","guid":{"rendered":"http:\/\/blog.intego.com\/?p=570"},"modified":"2012-12-12T13:49:05","modified_gmt":"2012-12-12T21:49:05","slug":"eight-iphone-security-tips","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/","title":{"rendered":"Eight iPhone Security Tips"},"content":{"rendered":"<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\"><\/p>\n<p>Macworld&#8217;s iPhone Central <a href=\"http:\/\/www.macworld.com\/article\/137379\/2008\/12\/iphonesecurity.html\">has published an article about securing your iPhone<\/a>. With eight tips, the article gives some basic ideas on the way your iPhone &#8211; or its data &#8211; can be at risk, and how to protect against these threats. Some of the tips are simple: &#8220;never, ever leave your iPhone unlocked&#8221; and &#8220;Keep up with Apple firmware updates&#8221;, but others go much further, such as a tip about protecting your iPhone&#8217;s backup in iTunes. Some tips require much more work, such as using FileVault on your Mac (the only reason to do this is to prevent hackers who might be able to access your Mac against &#8220;insertion of doctored firmware or simple copying of data&#8221;. And the eighth tip is to use Exchange Server, which is fine if your company uses it. If not, you might be able to set up an account with a service provider.<\/p>\n<p>In any case, these tips are just a few ideas about protecting your iPhone from hackers and data loss. I&#8217;d like to remind you that <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-virusbarrier-x5-is-the-first-antivirus-to-scan-the-iphone-and-ipod-touch\/\">VirusBarrier X5 can scan the iPhone and iPod touch<\/a>, ensuring that you are safe from malware and exploits. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Macworld&#8217;s iPhone Central has published an article about securing your iPhone. With eight tips, the article gives some basic ideas on the way your iPhone &#8211; or its data &#8211; can be at risk, and how to protect against these threats. Some of the tips are simple: &#8220;never, ever leave your iPhone unlocked&#8221; and &#8220;Keep [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Macworld&#039;s iPhone Central has published an article about securing your iPhone. With eight tips, the article gives some basic ideas on the way your iPhone\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Eight iPhone Security Tips - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Macworld&#039;s iPhone Central has published an article about securing your iPhone. With eight tips, the article gives some basic ideas on the way your iPhone\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2008-12-09T12:56:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-12-12T21:49:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/\",\"name\":\"Eight iPhone Security Tips - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/#primaryimage\"},\"datePublished\":\"2008-12-09T12:56:19+00:00\",\"dateModified\":\"2012-12-12T21:49:05+00:00\",\"description\":\"Macworld's iPhone Central has published an article about securing your iPhone. With eight tips, the article gives some basic ideas on the way your iPhone\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Eight iPhone Security Tips\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Eight iPhone Security Tips\",\"datePublished\":\"2008-12-09T12:56:19+00:00\",\"dateModified\":\"2012-12-12T21:49:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/#webpage\"},\"wordCount\":196,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\",\"articleSection\":[\"Apple\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Macworld's iPhone Central has published an article about securing your iPhone. With eight tips, the article gives some basic ideas on the way your iPhone","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/","og_locale":"en_US","og_type":"article","og_title":"Eight iPhone Security Tips - The Mac Security Blog","og_description":"Macworld's iPhone Central has published an article about securing your iPhone. With eight tips, the article gives some basic ideas on the way your iPhone","og_url":"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/","og_site_name":"The Mac Security Blog","article_published_time":"2008-12-09T12:56:19+00:00","article_modified_time":"2012-12-12T21:49:05+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/","name":"Eight iPhone Security Tips - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/#primaryimage"},"datePublished":"2008-12-09T12:56:19+00:00","dateModified":"2012-12-12T21:49:05+00:00","description":"Macworld's iPhone Central has published an article about securing your iPhone. With eight tips, the article gives some basic ideas on the way your iPhone","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Eight iPhone Security Tips"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Eight iPhone Security Tips","datePublished":"2008-12-09T12:56:19+00:00","dateModified":"2012-12-12T21:49:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/#webpage"},"wordCount":196,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/eight-iphone-security-tips\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg","articleSection":["Apple","Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-9c","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/570"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=570"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/570\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}