{"id":4296,"date":"2014-04-25T15:52:39","date_gmt":"2014-04-25T19:52:39","guid":{"rendered":"http:\/\/www.gazelle.com\/thehorn\/?p=4296"},"modified":"2014-04-25T15:52:39","modified_gmt":"2014-04-25T19:52:39","slug":"key-features-iphone-security","status":"publish","type":"post","link":"https:\/\/www.gazelle.com\/thehorn\/2014\/04\/25\/key-features-iphone-security\/","title":{"rendered":"What are key features of iPhone security?"},"content":{"rendered":"<p>How Secure is the iPhone and iOS?<\/p>\n<p>As mobile devices proliferate, it&#8217;s important to think about things like iPhone security. Increasingly, we&#8217;re storing more and more data on our smartphones and in the cloud and users should understand the security implications of doing so.<\/p>\n<p>The latest versions of iOS and the iPhone incorporate a number of security features to protect user&#8217;s information. From hardware encryption to touch ID, Apple has put thought into how to keep your data safe. Here&#8217;s a look at just a few of those features.<\/p>\n<p><span style=\"text-decoration: underline;\">Hardware Encryption<\/span><\/p>\n<p>Since the iPhone 3GS, all later iPhones and all versions of the iPad, have supported hardware encryption. This means that all of your data is encrypted on the device by a unique 256-bit crypto engine that&#8217;s built right in. If someone else gets access to the device, Apple has enabled remote wiping through Find My iPhone, which quickly removes the encryption key from your device. Without the encryption key, the data on the device is unreadable.<\/p>\n<p><span style=\"text-decoration: underline;\">App Data Protection<\/span><\/p>\n<p>To secure app data on your iPhone, Apple also implements Data protection, both for the core iOS apps, but also for all third-party apps that are installed. This feature is enabled automatically, so users don&#8217;t need to take any additional steps to protect their information. Information stored in apps is encrypted, protecting the data until the device is unlocked after a reboot.<\/p>\n<p><span style=\"text-decoration: underline;\">Touch ID<\/span><\/p>\n<p>Touch ID takes iPhone security features even further, by safely storing a user&#8217;s fingerprints to enable access to the device. By leveraging fingerprints, unique to each individual, Apple has made it easy for users to secure access to their device while make it very easy to unlock.<\/p>\n<p><span style=\"text-decoration: underline;\">Passcode<\/span><\/p>\n<p>Anyone using an iPhone without TouchID or any iPad, should enable a passcode on their device to secure their data. This step strengthens the encryption keys and makes it harder for a user to gain access to information on the device. Additionally, it&#8217;s possible to enable the device to be wiped after 10 failed passcode attempts, adding another layer of security should your iPhone fall into the wrong hands.<\/p>\n<p><span style=\"text-decoration: underline;\">Find My iPhone<\/span><\/p>\n<p>Find My iPhone is a great, final layer of security. Should your device be taken from you, with Find My iPhone, you can try to locate it or remotely wipe your data. For more details on setting up Find My iPhone, <a href=\"http:\/\/www.gazelle.com\/thehorn\/2014\/04\/09\/how-to-find-a-lost-iphone\/\">visit this article<\/a>.<\/p>\n<p>Image courtesy of Wikimedia Commons<\/p>\n<p>[cf]skyword_tracking_tag[\/cf]<\/p>\n","protected":false},"excerpt":{"rendered":"How Secure is the iPhone and iOS? As mobile devices proliferate, it&#8217;s important to think about how secure devices like iPhones and other smartphones&#8230;","protected":false},"author":7471,"featured_media":4295,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[3],"tags":[],"class_list":{"0":"post-4296","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apple","8":"cs-entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Secure is the iPhone and iOS?<\/title>\n<meta name=\"description\" content=\"How Secure is the iPhone and iOS? As mobile devices proliferate, it&#039;s important to think about how secure devices like iPhones and other smartphones...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gazelle.com\/thehorn\/2014\/04\/25\/key-features-iphone-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Secure is the iPhone and iOS?\" \/>\n<meta property=\"og:description\" content=\"How Secure is the iPhone and iOS? As mobile devices proliferate, it&#039;s important to think about how secure devices like iPhones and other smartphones...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gazelle.com\/thehorn\/2014\/04\/25\/key-features-iphone-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Gazelle The Horn\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-25T19:52:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.gazelle.com\/thehorn\/wp-content\/uploads\/2014\/04\/IPhone_5S_home_button-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"717\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Carmen Vetere\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@gazelle\" \/>\n<meta name=\"twitter:site\" content=\"@gazelle\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carmen Vetere\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/04\\\/25\\\/key-features-iphone-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/04\\\/25\\\/key-features-iphone-security\\\/\"},\"author\":{\"name\":\"Carmen Vetere\",\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/#\\\/schema\\\/person\\\/ca32723b65eb02d805cf86c332e0da6a\"},\"headline\":\"What are key features of iPhone security?\",\"datePublished\":\"2014-04-25T19:52:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/04\\\/25\\\/key-features-iphone-security\\\/\"},\"wordCount\":414,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/04\\\/25\\\/key-features-iphone-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/IPhone_5S_home_button-2.png\",\"articleSection\":[\"Apple\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/04\\\/25\\\/key-features-iphone-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/04\\\/25\\\/key-features-iphone-security\\\/\",\"url\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/04\\\/25\\\/key-features-iphone-security\\\/\",\"name\":\"How Secure is the iPhone and iOS?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/04\\\/25\\\/key-features-iphone-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/04\\\/25\\\/key-features-iphone-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/IPhone_5S_home_button-2.png\",\"datePublished\":\"2014-04-25T19:52:39+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/#\\\/schema\\\/person\\\/ca32723b65eb02d805cf86c332e0da6a\"},\"description\":\"How Secure is the iPhone and iOS? As mobile devices proliferate, it's important to think about how secure devices like iPhones and other smartphones...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/04\\\/25\\\/key-features-iphone-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/04\\\/25\\\/key-features-iphone-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/04\\\/25\\\/key-features-iphone-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/IPhone_5S_home_button-2.png\",\"contentUrl\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/IPhone_5S_home_button-2.png\",\"width\":1024,\"height\":717,\"caption\":\"iPhone and iOS Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/04\\\/25\\\/key-features-iphone-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are key features of iPhone security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/#website\",\"url\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/\",\"name\":\"Gazelle The Horn\",\"description\":\"Gazelle&#039;s Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/#\\\/schema\\\/person\\\/ca32723b65eb02d805cf86c332e0da6a\",\"name\":\"Carmen Vetere\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/af7df82a84006e733b851f3efe213edcdda093c3f80636b1d0c54a9870c8499b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/af7df82a84006e733b851f3efe213edcdda093c3f80636b1d0c54a9870c8499b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/af7df82a84006e733b851f3efe213edcdda093c3f80636b1d0c54a9870c8499b?s=96&d=mm&r=g\",\"caption\":\"Carmen Vetere\"},\"description\":\"None entered\",\"url\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/author\\\/sw-24266\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Secure is the iPhone and iOS?","description":"How Secure is the iPhone and iOS? As mobile devices proliferate, it's important to think about how secure devices like iPhones and other smartphones...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gazelle.com\/thehorn\/2014\/04\/25\/key-features-iphone-security\/","og_locale":"en_US","og_type":"article","og_title":"How Secure is the iPhone and iOS?","og_description":"How Secure is the iPhone and iOS? As mobile devices proliferate, it's important to think about how secure devices like iPhones and other smartphones...","og_url":"https:\/\/www.gazelle.com\/thehorn\/2014\/04\/25\/key-features-iphone-security\/","og_site_name":"Gazelle The Horn","article_published_time":"2014-04-25T19:52:39+00:00","og_image":[{"width":1024,"height":717,"url":"https:\/\/www.gazelle.com\/thehorn\/wp-content\/uploads\/2014\/04\/IPhone_5S_home_button-2.png","type":"image\/png"}],"author":"Carmen Vetere","twitter_card":"summary_large_image","twitter_creator":"@gazelle","twitter_site":"@gazelle","twitter_misc":{"Written by":"Carmen Vetere","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.gazelle.com\/thehorn\/2014\/04\/25\/key-features-iphone-security\/#article","isPartOf":{"@id":"https:\/\/www.gazelle.com\/thehorn\/2014\/04\/25\/key-features-iphone-security\/"},"author":{"name":"Carmen Vetere","@id":"https:\/\/www.gazelle.com\/thehorn\/#\/schema\/person\/ca32723b65eb02d805cf86c332e0da6a"},"headline":"What are key features of iPhone security?","datePublished":"2014-04-25T19:52:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.gazelle.com\/thehorn\/2014\/04\/25\/key-features-iphone-security\/"},"wordCount":414,"commentCount":0,"image":{"@id":"https:\/\/www.gazelle.com\/thehorn\/2014\/04\/25\/key-features-iphone-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.gazelle.com\/thehorn\/wp-content\/uploads\/2014\/04\/IPhone_5S_home_button-2.png","articleSection":["Apple"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.gazelle.com\/thehorn\/2014\/04\/25\/key-features-iphone-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.gazelle.com\/thehorn\/2014\/04\/25\/key-features-iphone-security\/","url":"https:\/\/www.gazelle.com\/thehorn\/2014\/04\/25\/key-features-iphone-security\/","name":"How Secure is the iPhone and iOS?","isPartOf":{"@id":"https:\/\/www.gazelle.com\/thehorn\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.gazelle.com\/thehorn\/2014\/04\/25\/key-features-iphone-security\/#primaryimage"},"image":{"@id":"https:\/\/www.gazelle.com\/thehorn\/2014\/04\/25\/key-features-iphone-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.gazelle.com\/thehorn\/wp-content\/uploads\/2014\/04\/IPhone_5S_home_button-2.png","datePublished":"2014-04-25T19:52:39+00:00","author":{"@id":"https:\/\/www.gazelle.com\/thehorn\/#\/schema\/person\/ca32723b65eb02d805cf86c332e0da6a"},"description":"How Secure is the iPhone and iOS? As mobile devices proliferate, it's important to think about how secure devices like iPhones and other smartphones...","breadcrumb":{"@id":"https:\/\/www.gazelle.com\/thehorn\/2014\/04\/25\/key-features-iphone-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gazelle.com\/thehorn\/2014\/04\/25\/key-features-iphone-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gazelle.com\/thehorn\/2014\/04\/25\/key-features-iphone-security\/#primaryimage","url":"https:\/\/www.gazelle.com\/thehorn\/wp-content\/uploads\/2014\/04\/IPhone_5S_home_button-2.png","contentUrl":"https:\/\/www.gazelle.com\/thehorn\/wp-content\/uploads\/2014\/04\/IPhone_5S_home_button-2.png","width":1024,"height":717,"caption":"iPhone and iOS Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.gazelle.com\/thehorn\/2014\/04\/25\/key-features-iphone-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gazelle.com\/thehorn\/"},{"@type":"ListItem","position":2,"name":"What are key features of iPhone security?"}]},{"@type":"WebSite","@id":"https:\/\/www.gazelle.com\/thehorn\/#website","url":"https:\/\/www.gazelle.com\/thehorn\/","name":"Gazelle The Horn","description":"Gazelle&#039;s Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gazelle.com\/thehorn\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.gazelle.com\/thehorn\/#\/schema\/person\/ca32723b65eb02d805cf86c332e0da6a","name":"Carmen Vetere","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/af7df82a84006e733b851f3efe213edcdda093c3f80636b1d0c54a9870c8499b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/af7df82a84006e733b851f3efe213edcdda093c3f80636b1d0c54a9870c8499b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/af7df82a84006e733b851f3efe213edcdda093c3f80636b1d0c54a9870c8499b?s=96&d=mm&r=g","caption":"Carmen Vetere"},"description":"None entered","url":"https:\/\/www.gazelle.com\/thehorn\/author\/sw-24266\/"}]}},"_links":{"self":[{"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/posts\/4296","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/users\/7471"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/comments?post=4296"}],"version-history":[{"count":2,"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/posts\/4296\/revisions"}],"predecessor-version":[{"id":4298,"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/posts\/4296\/revisions\/4298"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/media\/4295"}],"wp:attachment":[{"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/media?parent=4296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/categories?post=4296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/tags?post=4296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}