Skip to content

Tip of the Week: Don’t Get Faced by FaceTime

Sometimes threats come from the most unlikely places. One such threat came in the form of Apple’s FaceTime app. It gives users the ability to spy on others without their consent through group FaceTime calls. Even though a patch has been issued that solves the problem, it’s still worth reflecting on.

The most dangerous part of the FaceTime group vulnerability is that it was accessible to any user who wanted to use it. It was so accessible that Apple had to go out of its way to disable the entire feature until the bug was resolved. Thus, keeping users from using a service for the sake of security.

Apple released an update to iOS 12.1.4, which turned the feature for group Facetime back on. Until the user applies the patch, they simply won’t be able to access this feature. Considering how dangerous this situation was, it makes sense that this is the way to handle such a bug. Instead of leaving the users’ security to themselves, thereby putting them at risk whether they know it or not, Apple is just shutting off the service until the user updates the device. In this way, Apple is leaving no room for error.

How to Upgrade Your FaceTime Device

If you own an iOS device, run the update by following this path: Settings > General > Software Update. Be sure to keep in mind that the device needs to be charged, and you’ll also need a wireless connection. If you find that you’d rather have updates installed themselves, you can also enable automatic updates on the same screen.

In the end, this just shows that you need to be security-minded. If you fail to do so, you could be putting your privacy at risk.

Installing updates is an important part of protecting your organization’s data, as well as your own personal information. To learn more about how you can make sure your business stays as secure as can be, reach out to us at (877) 771-2384.

a person using a laptop computer on a wooden table

Cybersecurity in the Age of Remote Work

https://youtu.be/KV9kgmFj_sM Facing the challenges of remote work requires a proactive approach to cybersecurity measures to ensure the protection of sensitive

Phishing Attack

What to Do After a Phishing Attack

https://www.youtube.com/watch?v=wP42Et2mOGI If you’ve ever wondered what steps to take after falling victim to a phishing attack, rest assured that there

Let's Start a Conversation

Watch the video below and find out why you should fill out this form and start a conversation today.

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.