BNMC Blog

Tip of the Week: Don’t Get Faced by FaceTime

Tip of the Week: Don’t Get Faced by FaceTime

Sometimes threats come from the most unlikely places. One such threat came in the form of Apple’s FaceTime app, which gives users the ability to spy on others without their consent through group FaceTime calls. Even though a patch has been issued that solves the problem, it’s still worth reflecting on.

The most dangerous part of the FaceTime group vulnerability is that it was accessible to any use who wanted to use it. It was so accessible that Apple had to go out of their way to disable the entire feature until the bug was resolved, keeping users from using a service for the sake of security.

Apple released an update to iOS 12.1.4, which turned the feature for group Facetime back on. Until the user applies the patch, they simply won’t be able to access this feature. Considering how dangerous this situation was, it makes sense that this is the way to handle such a bug. Instead of leaving the users’ security to themselves, thereby putting them at risk whether they know it or not, Apple is just shutting off the service until the user updates the device. In this way, Apple is leaving no room for error.

How to Upgrade Your Device
If you own an iOS device, run the update by following this path: Settings > General > Software Update. Be sure to keep in mind that the device needs to be charged, and you’ll also need a wireless connection. If you find that you’d rather have updates install themselves, you can also enable automatic updates on the same screen.

In the end, this just shows that you need to be security-minded. If you fail to do so, you could be putting your privacy at risk.

Installing updates is an important part of protecting your organization’s data, as well as your own personal information. To learn more about how you can make sure your business stays as secure as can be, reach out to us at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, March 23 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Email Cloud Privacy Business Computing Malware Hackers Network Security Google User Tips Productivity Software Business Tech Term Computer Microsoft Internet Communication IT Services Hosted Solutions Efficiency Mobile Devices Ransomware IT Support Small Business Data Smartphone Android Hardware Managed IT Services Innovation Backup Saving Money Cloud Computing Business Continuity Data Recovery Windows Browser Microsoft Office Internet of Things Managed IT Services Workplace Tips Data Management Data Backup Windows 10 Passwords Productivity Business Management Windows 10 Server Users Outsourced IT App Vulnerability Cybersecurity Chrome Facebook Phishing Upgrade Word communications Remote Monitoring Artificial Intelligence Gmail Disaster Recovery Mobile Device Encryption Office 365 VoIP Smartphones IT Support Money Infrastructure BYOD Managed Service Provider Tip of the week Analytics Managed Service Social Media Website Employer-Employee Relationship Information Applications Network Router Big Data Government Settings Company Culture Display Google Drive Content Filtering Maintenance Bandwidth YouTube Miscellaneous Save Money Robot Employee-Employer Relationship Antivirus Apple Risk Management Automation Office Tips Virtual Reality Access Control Hacker Data storage IT Management Paperless Office Business Technology SaaS Server Management Virtual Private Network Touchscreen Business Intelligence Downtime Holiday Outlook Quick Tips Computers Spam Computing Operating System Data loss WiFi Unified Threat Management Tablet Telephone Systems Gadgets Retail Alert LiFi Hosted Solution desktop Administration Mouse Firewall Two-factor Authentication Managing Stress Vendor Management Avoiding Downtime Monitors Development Document Management Scam Chromebook Education Wireless Storage Networking End of Support HIPAA Printing VPN Mobile Security Laptop Data Security The Internet of Things Voice over Internet Protocol Deep Learning WannaCry Print Toner Cooperation Service Level Agreement Mobile Device Management Cabling Slack Legislation Content Microsoft Excel Wi-Fi Hotspot Internet Exlporer Google Maps Messaging SharePoint Writing Compliance Managed IT Smart Technology Connectivity Alt Codes Entertainment Techology Cybercrime Virtualization IT Technicians Optimization Digital Signage Modem FinTech Bring Your Own Device Shortcuts How To Lenovo Dark Data Update Staff Leominster Monitoring Statistics Marketing Budget Streaming Mail Merge Blockchain Language Value Social Downloads Regulations Shortcut Distributed Denial of Service Politics IoT Typing Digital Payment Humor iOS VoIP Unified Threat Management Mirgation Recycling Information Technology Troubleshooting Cookies MSP Best Practice Digital Security Cameras Firefox Superfish Customer Service Augmented Reality K-12 Schools Current Events Disaster Spying Bluetooth Comparison Human Error Address Permissions Computing Infrastructure Professional Services Collaboration Analysis Office Halloween Samsung Social Networking Patch Management Managed IT Service Tech Support Star Wars Cryptocurrency Scalability User Error Chatbots eWaste Apps Nanotechnology Google Docs Spyware Managed Services Customer Relationship Management Wearable Technology Network upgrade IT solutions Going Green Uninterrupted Power Supply Specifications Motherboard Cables Computer Care IBM Device Alerts USB File Sharing Hacks Heating/Cooling Multi-Factor Security Social Engineering Scary Stories LED Break Fix Websites Fraud Cost Management Bitcoin Migration Time Management Printer Running Cable Identity Continuity Google Wallet Solid State Drive Buisness Screen Reader Charging Business Growth Identity Theft Laptops Smart Office PowerPoint Search Black Friday Wires Training Legal Corporate Profile Mobility Emergency Virtual Desktop Licensing Dongle Password Servers Google Calendar Safety Sports Co-Managed IT Dark Web Assessment Automobile Windows 8 Network Management Remote Computing Solar Unified Communications G Suite Drones Hard Disk Drive Cyber Monday Smart Tech Software as a Service Network Congestion Work Dell Onboarding Staffing Motion Sickness Machine Learning Administrator Processors Taxes Unsupported Software IT Budget Web Server what was your? GPS Mobile Computing IT Consultant Computer Repair Relocation Mobile Data Cameras Work/Life Balance Tracking Recovery Meetings How To Cleaning Health Private Cloud Printers Black Market CCTV Law Enforcement Webcam Electronic Medical Records Notifications Physical Security Error Twitter Upgrades Gadget Emoji Point of Sale Ben McDonald shares BDR Travel Crowdsourcing Personal Information Botnet Windows 7 3D Printing Regulation Supercomputer CrashOverride Cortana

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3