|Added security to protect FaceTime and iMessage|
Whatever services and systems we use to share, store or transfer personal and business information online, we want the reassurance that our data is safe and that everything possible is done to prevent it from falling into the wrong hands. But we also know that security breaches happen, as they did with the large-scale celebrity photo leaks in 2014. Since then, Apple platforms in particular have been prevalent in discussions about the security of such platforms – but Apple is now seeking to bolster its security defenses with the launch of a two-step authentication feature for the FaceTime and iMessage
After the fall-out from the celebrity photo leaks, Apple extended the two-step authentication process (also known as two-step verification) to iCloud, the online storage platform at the center of the scandal. The feature was initially introduced only to the user IDs for access to Apple accounts; the motivation for the launch of that extra security measure was the hacking of a journalist’s data back in 2013. But what is two-step authentication and how does it work to protect your data?
The premise behind two-step authentication, which experts recommend all businesses implement as part of their security strategy, is actually pretty simple. Usernames and passwords are all too easily stolen by malicious parties, whether by phishing emails or a more sophisticated hacking attack. So, rather than typing just your username and password to access your account, the password is teamed up with a four-digit verification code which is newly and uniquely generated each time you attempt to access your account.
The verification code is delivered by text message (meaning that to use the two-step verification feature, you’ll need to have a cellphone to receive the SMS on). As a result, even if a hacker manages to get hold of your password, unless they also have your phone by their side then they won’t be getting into your account. This authentication method is already used by organizations around the world including banks, mobile service providers and other companies who recognize the added layer of security that it brings. And now you can give yourself the same level of protection to ensure that only you can FaceTime your family and send iMessages to your friends.
Fear not, there’s a backup plan to ensure that you can still access your accounts if you happen to forget your password or if something happens to your phone so you can longer receive authentication codes. Apple also provides you with a 14-character recovery key that will get you back in if all else fails. To enable two-step authentication for your FaceTime and iMessage applications, login to your Apple ID account, select Password and Security and then click Get Started under Two-Step Verification.
To find out more about using two-step verification and other security measures to protect your business, contact us today.
|Tablet tips for greater productivity|
Think your tablet is only useful for your favorite Youtube videos, social media updates, or handheld gaming? Think again. Since their introduction, tablets have been synonymous with entertainment but, when properly incorporated into your business, they can boost productivity and help your business thrive. For SMBs, adapting tablets into your work environment can even open up new business opportunities.
|How to stay profitable during an IT disaster|
Are you prepared for when the unexpected strikes? According to the Institute for Business and Home Safety, approximately 25 percent of businesses don’t reopen following a major disaster. The truth is that disasters happen every day, regardless of location or business size – simply switch on the news for proof. So obviously, it’s wise to think ahead and plan for the worst. Here are some ideas to get you ready for a disaster before it hits.
|4 useful mobile marketing tips|
In this era of ever-present technology, mobile phones are among one of the most frequently used devices for Internet access. They’ve changed the way most people live; gone are hardcover books, in are eBooks, no more paper money, it’s PayPal all the way. So what does this mean for businesses? It means you can no longer ignore the power of mobile! It’s convenient, popular, and here to stay. Check out some of these mobile marketing tips to make sure you’re on top of things and can deliver what customers expect from your business.
|The social media app using cats for privacy|
Long gone are the days when the only photos you would see on your Facebook page were snaps of weddings, holidays and the like. Now, alongside countless selfies in unremarkable situations and obligatory dish-pics of restaurant foods, we are blessed with the meme. Among the most popular memes are photos of cats in odd positions with humorous captions – well, one new entrant to the social media marketplace wants to take that a bit further. It could be about to flood Facebook with lots more cat photos in a bid to protect your online privacy.