Tip of the Week: Don’t Get Faced by FaceTime

Tip of the Week: Don’t Get Faced by FaceTime

Sometimes threats come from the most unlikely places. One such threat came in the form of Apple’s FaceTime app, which gives users the ability to spy on others without their consent through group FaceTime calls. Even though a patch has been issued that solves the problem, it’s still worth reflecting on.

The most dangerous part of the FaceTime group vulnerability is that it was accessible to any use who wanted to use it. It was so accessible that Apple had to go out of their way to disable the entire feature until the bug was resolved, keeping users from using a service for the sake of security.

Apple released an update to iOS 12.1.4, which turned the feature for group Facetime back on. Until the user applies the patch, they simply won’t be able to access this feature. Considering how dangerous this situation was, it makes sense that this is the way to handle such a bug. Instead of leaving the users’ security to themselves, thereby putting them at risk whether they know it or not, Apple is just shutting off the service until the user updates the device. In this way, Apple is leaving no room for error.

How to Upgrade Your Device
If you own an iOS device, run the update by following this path: Settings > General > Software Update. Be sure to keep in mind that the device needs to be charged, and you’ll also need a wireless connection. If you find that you’d rather have updates install themselves, you can also enable automatic updates on the same screen.

In the end, this just shows that you need to be security-minded. If you fail to do so, you could be putting your privacy at risk.

Installing updates is an important part of protecting your organization’s data, as well as your own personal information. To learn more about how you can make sure your business stays as secure as can be, reach out to us at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, August 22 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Cloud Email Privacy Computer User Tips Microsoft Software Malware Network Security Productivity Google Hackers Business Hosted Solutions Communication Tech Term Hardware Internet Small Business Data Mobile Devices Ransomware IT Services Efficiency Smartphone IT Support Cloud Computing Data Recovery Workplace Tips Backup Android Innovation Saving Money Business Continuity Managed IT Services Upgrade Microsoft Office Windows Information Users Office 365 Data Management Mobile Device Miscellaneous Windows 10 Internet of Things Business Management Windows 10 Managed IT Services Browser Social Media Data Backup Vulnerability Cybersecurity Passwords Productivity communications Gmail Facebook Server Phishing Word Outsourced IT App Remote Monitoring Disaster Recovery Encryption Smartphones VoIP Chrome Artificial Intelligence Network Applications Website Employer-Employee Relationship BYOD Analytics Managed Service Infrastructure Managed Service Provider Save Money Gadgets IT Support Tip of the week Money Virtual Reality Government Office Tips Router Google Drive Bandwidth Content Filtering Access Control Apps VPN IT Management Paperless Office Company Culture Education Display Big Data Apple Storage Employee-Employer Relationship Quick Tips Settings Unified Threat Management Robot Development Hacker Data storage Automation Maintenance YouTube Antivirus Risk Management SaaS Solid State Drive Hosted Solution Wireless Networking Administration Business Intelligence Holiday Computers Virtualization Mouse Laptop Hard Disk Drive Data Security The Internet of Things Retail Alert Server Management Business Technology Touchscreen Virtual Private Network Printing Augmented Reality Downtime Vendor Management Managing Stress Tablet Monitors Data loss Telephone Systems Chromebook OneNote desktop Collaboration Firewall Two-factor Authentication End of Support Outlook Avoiding Downtime Spam Computing HIPAA Scam WiFi Document Management Bring Your Own Device Operating System Mobile Security LiFi Typing Humor Shortcuts Time Management Printer Running Cable Smart Tech Information Technology Monitoring Solid State Drives Break Fix Work Processor Wi-Fi Voice over Internet Protocol Current Events Employee-Employer Relationships Search Black Friday Cooperation Writing Buisness Service Level Agreement Identity Theft Best Practice Streaming Compliance Virtual Desktop iOS Servers Google Calendar Hotspot Sports Internet Exlporer Training Corporate Profile Troubleshooting Business Analysis Emergency Automobile Cryptocurrency Security Cameras Network Management Dark Data Connectivity Update G Suite Spying National Security Dark Web IT Technicians Optimization Human Error Memory Modem FinTech Dell IT solutions Going Green Analysis Students Cyber Monday Staff Leominster Google Docs Regulations Politics Cabling Hacks Scalability Legislation Language Value WannaCry Virus Recycling Google Maps Bitcoin Managed Services SharePoint Customer Service IoT Google Wallet Updates Microsoft Excel Mirgation Device Techology Cybercrime Cookies MSP Private Cloud Mixed Reality Managed IT Smart Technology Office K-12 Schools Samsung Business Growth Social Networking Tech Support Password Migration Statistics Marketing Computing Infrastructure Professional Services Legal LED Threats How To Lenovo Chatbots eWaste Windows 8 Laptops Downloads Star Wars Unified Communications Drones PowerPoint Mail Merge Blockchain Mobility VoIP Unified Threat Management Nanotechnology Data Breach Shortcut Distributed Denial of Service Wearable Technology Social Engineering Network upgrade Digital Payment Motherboard Cables Websites Disaster Mobile Device Management Windows 7 Bluetooth Comparison Alerts USB Digital Deep Learning Co-Managed IT Firefox Superfish Identity Continuity Software as a Service Fraud Halloween Cost Management Onboarding GDPR Address Permissions Print Toner User Error Screen Reader Charging Slack Hard Disk Drives Patch Management Managed IT Service Safety Smart Office Alt Codes Customer Relationship Management Wires Uninterrupted Power Supply Messaging Specifications Licensing Dongle Remote Computing Spyware Content Huawei Solar File Sharing Social Entertainment Heating/Cooling Multi-Factor Security Network Congestion Scary Stories Assessment Computer Care IBM Budget Digital Signage Data Warehouse Regulation Error Machine Learning Point of Sale Ben McDonald shares Processors Unsupported Software Travel Computer Repair Relocation Supercomputer CrashOverride Mobile Data Motion Sickness Staffing Printers Work/Life Balance Administrator Recovery Taxes How To Health Web Server what was your? IT Budget Black Market GPS Law Enforcement IT Consultant Electronic Medical Records Cameras Notifications Physical Security Meetings Twitter Tracking Financial Upgrades Gadget Emoji Cleaning CCTV Crowdsourcing BDR Personal Information Botnet Webcam Mobile Computing 3D Printing Cortana

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3