Tip of the Week: Don’t Get Faced by FaceTime

Tip of the Week: Don’t Get Faced by FaceTime

Sometimes threats come from the most unlikely places. One such threat came in the form of Apple’s FaceTime app, which gives users the ability to spy on others without their consent through group FaceTime calls. Even though a patch has been issued that solves the problem, it’s still worth reflecting on.

The most dangerous part of the FaceTime group vulnerability is that it was accessible to any use who wanted to use it. It was so accessible that Apple had to go out of their way to disable the entire feature until the bug was resolved, keeping users from using a service for the sake of security.

Apple released an update to iOS 12.1.4, which turned the feature for group Facetime back on. Until the user applies the patch, they simply won’t be able to access this feature. Considering how dangerous this situation was, it makes sense that this is the way to handle such a bug. Instead of leaving the users’ security to themselves, thereby putting them at risk whether they know it or not, Apple is just shutting off the service until the user updates the device. In this way, Apple is leaving no room for error.

How to Upgrade Your Device
If you own an iOS device, run the update by following this path: Settings > General > Software Update. Be sure to keep in mind that the device needs to be charged, and you’ll also need a wireless connection. If you find that you’d rather have updates install themselves, you can also enable automatic updates on the same screen.

In the end, this just shows that you need to be security-minded. If you fail to do so, you could be putting your privacy at risk.

Installing updates is an important part of protecting your organization’s data, as well as your own personal information. To learn more about how you can make sure your business stays as secure as can be, reach out to us at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, May 21 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Computing User Tips Network Security Malware Hackers Business Google Productivity Software Computer Microsoft Tech Term Hosted Solutions Internet Communication Mobile Devices IT Services Efficiency Data Small Business Ransomware IT Support Hardware Smartphone Innovation Android Workplace Tips Backup Managed IT Services Cloud Computing Data Recovery Saving Money Business Continuity Windows Browser Internet of Things Microsoft Office Data Backup Mobile Device Users Data Management Managed IT Services Social Media Windows 10 Passwords Productivity Cybersecurity Server Facebook Vulnerability Phishing Business Management App Word Outsourced IT Windows 10 Office 365 Network Smartphones Information Chrome Remote Monitoring Upgrade communications Gmail Disaster Recovery Artificial Intelligence Encryption Managed Service VoIP Tip of the week IT Support Employer-Employee Relationship Money BYOD Gadgets Managed Service Provider Applications Miscellaneous Save Money Infrastructure Website Analytics Virtual Reality Hacker Data storage Big Data Government Antivirus Settings Paperless Office Display Router Google Drive Bandwidth YouTube Content Filtering Access Control Robot IT Management Company Culture Risk Management Automation Education Apple Office Tips Maintenance Employee-Employer Relationship SaaS Two-factor Authentication Solid State Drive Wireless HIPAA Computers Virtualization Downtime Holiday Avoiding Downtime Outlook Spam Computing Scam Operating System Hard Disk Drive Retail Alert WiFi Mobile Security LiFi Hosted Solution Networking Business Intelligence Administration Monitors VPN Vendor Management Mouse Chromebook Data loss Apps Data Security Unified Threat Management Server Management Business Technology Telephone Systems desktop Virtual Private Network Touchscreen Augmented Reality End of Support Storage Quick Tips Tablet Managing Stress Printing Firewall Laptop The Internet of Things Document Management Development Bluetooth Comparison Mixed Reality Computer Care Motherboard IBM Cables Firefox Superfish Device File Sharing Alerts USB Migration Identity Continuity Writing Mobile Device Management Address Permissions LED Fraud Cost Management Wi-Fi Deep Learning Smart Office Cybercrime Patch Management Managed IT Service PowerPoint Identity Theft Screen Reader Charging User Error Laptops Dark Data Update Alt Codes Specifications Data Breach Training Corporate Profile Marketing Wires Customer Relationship Management Mobility Licensing Dongle Heating/Cooling Multi-Factor Security G Suite Solar Co-Managed IT Automobile Assessment Bring Your Own Device Dell Work Social Break Fix Onboarding Smart Tech Politics Budget Time Management Printer Software as a Service Customer Service Typing Humor Search Black Friday Slack Hard Disk Drives WannaCry Voice over Internet Protocol Information Technology Print Toner Cooperation Cabling Service Level Agreement Best Practice Servers Google Calendar Messaging Compliance Halloween Office Samsung Current Events Emergency Content Hotspot Google Maps Internet Exlporer IT Technicians Optimization Dark Web Digital Signage Connectivity Tech Support Network Management Entertainment Leominster Cryptocurrency Cyber Monday Monitoring Solid State Drives Modem FinTech Shortcuts Staff Google Docs Legislation Employee-Employer Relationships Regulations Scary Stories Social Engineering IT solutions Going Green Streaming Language Value iOS Mirgation Recycling Running Cable Hacks Microsoft Excel Troubleshooting Digital Payment IoT Websites SharePoint Disaster K-12 Schools Bitcoin Managed IT Smart Technology Spying Cookies Digital MSP Buisness Google Wallet Techology Security Cameras Business Growth Statistics Analysis Students Social Networking Sports Safety How To Lenovo Human Error Collaboration Computing Infrastructure Professional Services Virtual Desktop Scalability Chatbots eWaste Remote Computing Password Mail Merge Blockchain Star Wars Legal Downloads Wearable Technology Uninterrupted Power Supply Network upgrade Network Congestion Windows 8 Shortcut Distributed Denial of Service Nanotechnology Spyware Unified Communications Drones VoIP Unified Threat Management Managed Services Processors Error Machine Learning Point of Sale Ben McDonald shares Unsupported Software BDR Travel Windows 7 Mobile Computing Computer Repair Relocation Supercomputer CrashOverride Regulation Mobile Data Recovery Staffing How To Work/Life Balance Motion Sickness Taxes Administrator Health Private Cloud Web Server what was your? Black Market IT Budget GPS Law Enforcement IT Consultant Notifications Electronic Medical Records Cameras Twitter Physical Security Emoji Tracking Upgrades Gadget Meetings Cleaning Crowdsourcing CCTV Printers Personal Information Botnet Webcam Cortana 3D Printing

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3