Protect your iOS device

Updated30 May 2024

Table of Contents

...Loading Table of Contents...

    If you use an iPhone or iPad, you may have heard the myth that they are more secure. This is not necessarily true. Security depends on a combination of how we use our devices and their own software, which can be found to have vulnerabilities at any time. Follow the steps in this guide to make your device more secure. Get in the habit of checking these settings from time to time, to make sure nothing has changed.

    Use the latest version of your device's operating system (OS)

    • When updating software, do it from a trusted location and internet connection, like your home or office, not at an internet cafe or coffee shop.
    • Updating to the latest version of your operating system may require you to download software and restart a number of times. You will want to set aside time for this where you do not need to do work on your device.
    • After updating, check again if there are any further updates available until you do not see any additional new updates.
    • If the iOS version that runs in your device is unmaintained, it is best to consider buying a new device.
    • To make sure an update is fully installed, always restart your device when prompted to do so after downloading the update.

    Notes

    • The iOS update guide recommends backing up your device through several methods, including iCloud (which means Apple's own servers), before you update your operating system. Consider which is the safest method for you, given the threats you face. In general, we recommend backing up your phone or tablet to your own computer.
    Learn why we recommend this

    New vulnerabilities in the code that runs in your devices and apps are found every day. The developers who write that code cannot predict where they will be found, because the code is so complex. Malicious attackers may exploit these vulnerabilities to get into your devices. But software developers do regularly release code that fixes those vulnerabilities. That is why it is very important to install updates and use the latest version of the operating system for each device you use. We recommend setting your device to automatically update so you have one less task to remember to do.

    Turn Lockdown Mode on

    If you use iPhone, iPad or another iOS device, we strongly suggest to turn Lockdown Mode on. Most likely you will not see any or much difference in the way your device works, but you will be much better protected.

    Learn why we recommend this

    Lockdown Mode reduces the attack surface for sophisticated spyware like Pegasus. Features of the Lockdown Mode should be used by everyone and should really be part of a standard operating system.

    Use apps from trusted sources

    Learn why we recommend this

    Apple's App Store is the official app store for iOS devices. Having apps in one place makes it easy for you to find and install the ones you want, and it also makes it easier for Apple to monitor apps for major security violations. Only install apps from the App Store.

    Some governments have demanded tech companies ban certain apps in their countries. When that happens, your contacts may encourage you to "jailbreak" your device in order to install banned apps. In fact, "jailbreaking" your device is not necessary if you use techniques to circumvent your country's censorship when setting up your phone.

    Remove apps that you do not need and do not use

    Learn why we recommend this

    New vulnerabilities in the code that runs in your devices and apps are found every day. The developers who write that code cannot predict where they will be found, because the code is so complex. Malicious attackers may exploit these vulnerabilities to get into your devices. Removing apps you do not use helps limit the number of apps that might be vulnerable. Apps you do not use may also transmit information about you that you may not want to share with others, like your location.

    Use privacy-friendly apps

    Learn why we recommend this

    iPhones and iPads come with built-in software, like Safari or Mail, that have a history of privacy and security issues. Instead, you can use more privacy-friendly apps to browse the web, read your email and much more.

    If possible, avoid using social media apps

    • Access social media and other sites by logging in through your browser instead.
    Learn why we recommend this

    Apps may share a lot of your data, like the ID of your phone, your phone number and which wifi you connect to. Some social media apps collect more information than they should. This includes apps like Facebook or Instagram. Use those services through the secure browser on your device (like Firefox) to protect your privacy a bit more.

    Check your app permissions

    Review all permissions one by one to make sure they are enabled only for apps you use. The following permissions should be turned off in apps you do not use, and considered suspicious when used by apps you do not recognize:

    Learn why we recommend this

    Apps that access sensitive digital details or services — like your location, microphone, camera or device settings — can also leak that information or be exploited by attackers. So if you do not need an app to use a particular service, turn that permission off.

    Turn off location and wipe history

    Learn why we recommend this

    Many of our devices keep track of where we are using GPS, cell phone towers and the wifi networks we connect to. If your device is keeping a record of your physical location, it makes it possible for someone to find you or use that record to prove that you have been in certain places or associated with specific people who were somewhere at the same time as you.

    Secure the accounts connected with your device

    Learn why we recommend this

    Most devices have accounts associated with them, like Apple ID accounts for your iPad, Apple Watch, macOS laptop and Apple TV. More than one device may be logged in at a time (like your phone, laptop and maybe your TV). If someone else has access to your accounts without your authorization, the steps included in this section will help you see and stop this.

    Remove permissions to access your device, accounts or information

    Learn why we recommend this

    If you don't intend for someone else to access your device, accounts or information, it is better to not leave any additional "door" open (this is called "reducing your attack surface"). Additionally,the checks suggested in this section could reveal that someone is accessing your device, account or data without your permission.

    Set your screen to sleep and lock

    • Set your screen to lock a short time after you stop using it (5 minutes is good).
    • Use a longer passphrase (minimum 10 characters), not a short password or PIN.
    • Making it possible to use your fingerprint, face, eyes or voice to unlock your device can be used against you by force; do not use these options unless you have a disability which makes typing impossible.
    • Simple "swipe to unlock" options are not secure locks; do not use this option.
    • Learn how to set a "passcode" in Apple's guide on setting passcodes on iPhone, iPad or iPod touch.
    Learn why we recommend this

    While technical attacks can be particularly worrying, your device may as well be confiscated or stolen, which may allow someone to break into it. For this reason, it is smart to set a passphrase screen lock, so that nobody can access your device just by turning it on and guessing a short PIN or password.

    We do not recommend screen lock options other than passphrases. If you are arrested, detained or searched, you might easily be forced to unlock your device with your face, voice, eyes or fingerprint. Someone who has your device in their possession may use software to guess short passwords or PINs. And if you set a fingerprint lock, someone who has dusted for your fingerprints can make a fake version of your finger to unlock your device; similar hacks have been demonstrated for face unlock.

    For these reasons, the safest lock you can set is a longer passphrase.

    Control what can be seen when your device is locked

    Learn why we recommend this

    A strong screen lock will give you some protection if your device is stolen or seized — but if you don't turn off notifications that show up on your lock screen, whoever has your device can see information that might leak when your contacts send you messages or you get new email.

    Disable voice controls

    Learn why we recommend this

    If you set up a device so you can speak to it to control it, it becomes possible for someone else to install code on your device that could capture what your device is listening to.

    It is also important to consider the risk of voice impersonation: someone could record your voice and use it to control your phone without your permission.

    If you have a disability that makes it difficult for you to type or use other manual controls, you may find voice control necessary. This section provides instructions on how to set them up more safely. However, if you do not use voice controls for this reason, it is much safer to turn them off.

    Use a physical privacy filter that prevents others from seeing your screen

    Learn why we recommend this

    While we often think of attacks on our digital security as highly technical, you might be surprised to learn that some human rights defenders have had their information stolen or their accounts compromised when someone looked over their shoulder at their screen or used a security camera to do so. A privacy filter makes this kind of attack, often called shoulder surfing, less likely to succeed. You should be able to find privacy filters in the same shops where you find other accessories for your devices.

    Use a camera cover

    • First of all, figure out whether and where your device has cameras. Your smartphone might have more than one.
    • You can create a low-tech camera cover: apply a small adhesive bandage on your camera and peel it off when you need to use the camera. A bandage works better than a sticker because the middle part has no adhesive, so your lens won't get sticky.
    • Alternatively, search your preferred store for the model of your device and "webcam privacy cover thin slide" to find the most suitable sliding cover for your phone or tablet.
    Learn why we recommend this

    Malicious software may turn on the camera on your device in order to spy on you and the people around you, or to find out where you are, without you knowing it.

    Turn off connectivity you're not using

    • Completely power off your devices at night.
    • Get into the habit of keeping wifi, Bluetooth and/or network sharing off and only enable them when you need to use them.
    • Airplane mode can be a quick way to turn off connectivity on your mobile. Learn how to selectively turn on wifi and Bluetooth once your device is in Airplane mode, to use only the services you want.
      • Turn Airplane mode on and make sure wifi and Bluetooth are off.
      • To learn how to selectively turn on wifi and Bluetooth while your device is in Airplane mode, see Apple's guide on how to use Airplane mode.
    • Disable Bluetooth and wifi whenever you aren't using them. To do this, go to Settings and DO NOT use the Control Center (the swipe up from the bottom of the screen). The Control Center only lets you disconnect from the currently connected Bluetooth devices or wifi networks and does not include the option to disable Bluetooth or wifi altogether.
    • Turn off Personal Hotspot when you are not using it.
      • Make sure your device is not providing an internet connection to someone else using Personal Hotspot. Go to Settings > Cellular > Personal Hotspot or Settings > Personal Hotspot and make sure that the "Allow Others to Join" option is disabled.
      • Learn how to disconnect devices in the official guide on how to set up a Personal Hotspot on iOS devices.
    Learn why we recommend this

    All wireless communication channels (like wifi, NFC or Bluetooth) could be abused by attackers around us who may try to get to our devices and sensitive information by exploiting weak spots in these networks.

    When you turn Bluetooth or wifi connectivity on, your device tries to look for any Bluetooth device or wifi network it remembers you have connected to before. Essentially, it "shouts" the names of every device or network on its list to see if they are available to connect to. Someone snooping nearby can use this "shout" to identify your device, because your list of devices or networks is usually unique. This fingerprint-like identification makes it easy for someone snooping close to you to target your device.

    For these reasons, it is a good idea to turn off these connections when you are not using them, particularly wifi and Bluetooth. This limits the time an attacker might have to access your valuables without you noticing that something strange is happening on your device.

    Clear your saved wifi networks

    • Save network names and passwords in your password manager instead of your device's list of networks.
    • If you do save network names and passwords in your list of saved wifi networks, get in the habit of regularly erasing them when you aren't using them anymore and turn off "Auto-Join". To learn how to do this, see Apple's guide on how to forget wifi networks on iOS devices.
    • You can also reset your phone's network settings altogether to remove all saved wifi networks and bluetooth devices. To learn how to reset your network settings, see Reset iPhone settings to their defaults.
    Learn why we recommend this

    When you turn wifi connectivity on, your device tries to look for any wifi network it remembers you have connected to before. Essentially, it "shouts" the names of every network on its list to see if they are available to connect to. Someone snooping nearby can use this "shout" to identify your device, because your list is usually unique: you have probably at least connected to your home network and your office network, not to mention networks at friends' houses, favorite cafes, etc. This fingerprint-like identification makes it easy for someone snooping in your area to target your device or identify where you have been.

    To protect yourself from this identification, erase wifi networks your device has saved and tell your device not to remember networks. This will make it harder to connect quickly, but saving that information in your password manager instead will keep it available to you when you need it.

    Turn off sharing you're not using

    Learn why we recommend this

    Many devices give us the option to easily share files or services with others around us — a useful feature. However, if you leave this feature on when you are not using it, malicious people may exploit it to get at files on your device.

    Advanced: figure out whether someone has accessed your device without your permission (basic forensics)

    Follow the steps on the following checklists:

    Learn why we recommend this

    It may not always be obvious when someone has accessed your devices, files or communications. These additional checklists may give you more insight into whether your devices have been tampered with.

    More resources