Digital Self Defense Guide: Cybersafety For Personal Safety (2024)

https://www.ceta.tech.cornell.edu/_files/ugd/9e6719_088a4195809c40a89aec05adcd095a75.pdf

Shared Phone Plans

Please note, if you share a phone plan with someone else, they will have access to information about what you are doing on your phone. It will be easier to access that information especially if they are the account holder. They can view information about call logs, phone numbers of people who call/text you, and other potential information. The increase security guide below will not prevent information that is being accessed through a shared plan.

iOS Safety Check Feature

Apple has developed a feature called, Safety Check, and is available to certain iPhones and iPads that has a step-by-step guide to secure your device. If you have a device that has iOS version 16 or later and has 2-Factor Authentication enabled, then the Safety Check option is available.

  1. Go to Settings
  2. Privacy and Security
  3. Safety Check

Be aware by using Safety Check, may alert an abuser that certain actions lock them out of your iCloud account or device. Examples could include:

  • Changing your Apple ID password.
  • Stopping location sharing from your device or apps.
  • Change which devices are connected to your iCloud account.
  • Changing your device password (someone having physical access to your phone).
Check iCloud Account Settings

Confirm the contact information on your account is yours. If it is not yours, it would allow your abuser to view information on your phone or gain access to the account, even after changing the password. This first step to securing your iCloud account.

  1. On the home screen, open the Settings.
  2. Check the top for the Apple ID and see if you recognize the name and image of the iCloud user.
  3. You can click on the Apple ID section to see further details.
Digital Self Defense Guide: Cybersafety For Personal Safety (1)

If you do not recognize the Apple ID, it means someone else is signed into your device from their iCloud account. Change the Apple ID email address, go to the web browser. https://support.apple.com/en-ca/HT202667

Editing Reachable Information
  1. From the Settings.
  2. Open the Apple ID Menu then tap on Name, Phone Numbers, and Email.

Check that the email and phone numbers in this section are yours. Apple can send account-related information to the email address attached. The email address that is listed as your Apple ID can be used to recover your account or password. It is recommended to check the security of your account and ensure there is a strong password associated with the account.

If there is an email address or phone number you do not recognize, change it or remove it from your account. Reminder, making any changes or removing the account can notify the user that they will be locked out.

  • To change an email address or phone number, click Edit which is to the right of Reachable At.
  • To remove an email address or phone number, select the “minus” icon next to the email or phone number you want to remove.

*Note you can not remove the email that is associated with your Apple ID*

To change the email that is associated with the Apple ID by going to the following website.

https://support.apple.com/en-us/HT202667

  1. Go to this website and log in https://appleid.apple.com/
  2. In the Sign-in and Security section on the left side, choose Apple ID.
  3. You can now enter the new email address that will be connected with your Apple ID.
  4. You can also update your password in the same section by clicking on Password.
Digital Self Defense Guide: Cybersafety For Personal Safety (2)

When removing a phone number, you may have to sign out of Messages and FaceTime. If this step is required, follow the steps below:

  1. Go to Settings, scroll to Messages, then select Send & Receive.
  2. You can click on your phone number, then tap Remove.
  3. Another way is to select your Apple ID at the bottom of the screen then select Sign Out.
  4. Go to Settings, scroll to FaceTime, then select your Apple ID and click Sign Out

If you want to remove a phone number that is on a phone that you can not access, you must change your Apple ID password to delete it. Changing your Apple ID password will remove all phone numbers from your devices and will be known to anyone who had previous access.

*When you remove a phone number from your iCloud account, information records (previous phone calls or messages) for the number that is removed will no longer appear on your devices. If you want to collect evidence, please keep this in mind*.

To add a new phone number or email address, select “Add Email or Phone Number”. You may need to have access to the phone number or email address for any verification codes.

Check which devices connected to iCloud.

Devices are smartphones, tablets, laptops, or other electronic devices that can connect to the internet. Devices that were previously used to log in to your iCloud account, then Apple-trusted devices could gain access to your iCloud account and manage it.

  1. Go to your Apple ID Menu by going to Settings then selecting on the Icon with your name and photo (at the top of Settings).
  2. Scroll down until you see the lists of trusted devices. These devices are where Apple ID is used to sign into iCloud.
  3. If you do not recognize the device, you can click on the specific device then click on “Remove from Account” to disconnecting it from the iCloud account. *Please note this may notify the abuser*
  4. Lastly, you can change your Apple ID password to keep someone else from logging into your account again.
Secure Access to your iCloud Account.

Changing your Apple ID password

  1. Go to Settings > Apple ID Menu > Password and Security > Change Password.
Digital Self Defense Guide: Cybersafety For Personal Safety (3)

Tips for creating a strong password.

  • At least 8-12 characters long.
  • Includes capital and lowercase letters.
  • Includes random numbers.
  • Includes some symbols such as,!, ?, @, and $
  • Do not use words or numbers that could be easy for someone to guess, such as a child’s name, pet’s name, or birthday.
Enabling Two-Factor Authentication (2FA)

2FA provides another secure layer of protection to your account. Signing into your account will require you to enter your password then a two-factor authentication code which Apple will send through your phone number or one of your trusted devices. *Turning on 2FA will be visible to people who have access to your devices*

As Apple highly requires 2FA, sometimes you may not be able to turn it off after it is on depending on the device. You can always change the phone number or devices which the 2FA is sent to.

To check your 2FA settings
  1. Go to Settings > Apple ID Menu > Password & Security
Digital Self Defense Guide: Cybersafety For Personal Safety (4)

You can view the 2FA section to see if it is on or not. If it is not on, then you will see an option to “Turn on Two-Factor Authentication”. Click to turn it on. Enter a phone number you want to receive verification codes when you sign in. You can either receive the code through a message or an automated phone call.

Checking if text messages are being forwarded.

If someone had physical access to your device, they could have set up text forwarding that will happen even after you have secured your Apple ID. This will affect SMS text messages (messages that show up in green unlike iMessage that show up in blue).

To check:

  1. Go to Settings > Messages.
  2. Go to Send & Receive then the devices under Text Message Forwarding.
Location Sharing Settings.
Digital Self Defense Guide: Cybersafety For Personal Safety (5)

Having Find My “on” is usually okay and sometimes is recommended to have on for your safety as long as your iCloud is secure. If you believe your iCloud is not secure, then this feature should be turned off. This feature allows you to track your own devices and allow others to track your location. To check:

  1. Go to Settings.
  2. Apple ID Menu (at the top of Settings)
  3. Find My
  4. In the Find My app, check the Share my Location. If it is ON then you are sharing your location with the people at the bottom of the screen. If it is OFF then your location will not be shared.
Digital Self Defense Guide: Cybersafety For Personal Safety (6)
Check Family Sharing Settings.

The Family Sharing settings allow you to share Apple purchases, photos, iCloud storage, and your location with up to 5 other people. To check if this feature is turned on, go to:

  1. Settings > Apple ID Menu > Family Sharing
Digital Self Defense Guide: Cybersafety For Personal Safety (7)

If the Family Sharing feature is turned off, then it will say Learn more. If it is turned on, click on it, then select Shared Features to check which information is being shared.

To remove yourself on your iPhone, iPad, or iPod Touch:

  1. Go to Settings,
  2. Tap Family, if you do not see Family then tap your name, then Family Sharing.
  3. Tap your name.
  4. Tap stop using Family Sharing.
Digital Self Defense Guide: Cybersafety For Personal Safety (8)

On your Mac device:

  1. Choose the Apple menu > System Settings.
  2. Click Family.
  3. Click your name.
  4. Click Stop Using Family Sharing.
Digital Self Defense Guide: Cybersafety For Personal Safety (9)
Remove someone else from your family group.

On your iPhone, iPad, or iPod touch:

  1. Go to Settings.
  2. Tap Family. If you don’t see the option for Family, then tap your name. After click on Family Sharing.
  3. Tap the name of the individual that you want to remove.
  4. Tap Remove [their name] from Family. Digital Self Defense Guide: Cybersafety For Personal Safety (10)

On your Mac device:

In macOS Ventura or later:

  1. Click on the Apple menu > System Settings, then click Family.
  2. Click the name of the individual that you want to remove.
  3. Click Remove [their name] from Family.
  4. Click Remove [your family member’s name] to confirm Digital Self Defense Guide: Cybersafety For Personal Safety (11)
Check for nearby AirTags.

iCloud can alert people of unwanted Apple AirTags that are moving with them. The AirTags are used to easily track things like your keys, wallet, backpack, etc. Individuals will use this device to abuse its powers and try to track people.

If an AirTag, Airpods, or any other Find My network accessories are separated from its owner are seen moving with you another time then you will be notified in one of two ways.

  1. If you have an iPhone, iPad, or iPod, etc. Find My can send notifications to your Apple device. This feature is available on iOS or iPadOS 14.5 or later. To receive the alerts, ensure that these settings are set up.
  • Click on Settings > Privacy > Location Services and turn Location Services on.
  • Click on Settings > Privacy > Location Services > System Services. Turn Find My iPhone on.
  • Click on Settings > Privacy > Location Services > System Services. Turn Significant Locations on to be notified when you arrive in specific locations including home.
  • Click on Settings > Bluetooth and turn Bluetooth on.
  • Using the Find My app, tap the Me tab, and turn Tracking Notifications on.
  • Turn off airplane mode. You won’t receive any notifications if your phone is on airplane mode.
  1. Products including AirTags, AirPods Pro (2nd generation) charging case, or Find My network accessory will make a sound if it is not with its owner for a long time.
If you see an Alert

The AirTag that is separated from its owner is seen moving with you over time and your iPhone is awake. The AirTag make a sound to indicate that it has moved, this alert will be shown.

Digital Self Defense Guide: Cybersafety For Personal Safety (12)

The Find My display will show where the AirTag has been observed with you. The red dots indicates where item was detected near your device. The dashed lines connecting the red dots indicates the connections where the device was near your device.

Digital Self Defense Guide: Cybersafety For Personal Safety (13)

If you do get an Alert, first check the Find My app if you’re able to play a sound on the unknown accessory.

  1. Tap the Alert.
  2. Click on Continue and then tap Play Sound.
  3. Listen for the sound. You can play it multiple times to find the item.

If the option to play a sound isn’t available, the item might not be with you anymore. If it was with you overnight, its abuser might have changed it. Find My uses the identifier to identify that it’s the same item moving with you. If the item is within range of the person who owns it then you also won’t be able to play a sound.

Using an iPhone model with Ultra Wideband, you can also tap Find Nearby to use Precision Finding to help you locate the unknown AirTag.

  1. Tap the alert.
  2. Click on Continue, then click on Find Nearby.
  3. Follow the instructions and move around until your iPhone connects to the unknown AirTag.
  4. Your iPhone will indicate the distance and direction to the unknown AirTag. Use the information provided to get closer to the unknown AirTag until you find it.
    1. When the AirTag is within Bluetooth range of your iPhone, you can play a sound on the AirTag by tapping the Play Sound button.
    2. If your iPhone says that more light is required, tap the Turn Flashlight On.
  5. When you’re finish, click on the Done button.
Get information about or disable an AirTag, Find My network accessory, or set of Airpods.
  1. If you find the AirTag, you can hold the top of your iPhone or another NFC-capable smartphone near the AirTag until you receive a notification.
  2. Tap the notification and it will open a website that provides more information about the AirTag. Take a screenshot of the information to keep as evidence.
  3. To disable the AirTag, AirPods, or Find My network accessory and stop it from sharing its location. First, click on Instructions to Disable it, and follow the instructions shown.
Digital Self Defense Guide: Cybersafety For Personal Safety (14)
Check the App Library for unrecognized apps.

Some apps might not be visible on the home screen of your device. This could have been done on purpose if someone had physical access to your device and they do not want you to see certain apps. To view all of your apps, depending on the version of your device, swipe all the way to the left while you are on your home screen. If that does not work then try swiping all the way to the right of your home screen.

Digital Self Defense Guide: Cybersafety For Personal Safety (15)

Any apps that you do not recognize or feel like you may be in danger. You can remove the app by tapping and holding on the icon. When the menu shows up, select Delete App.

Digital Self Defense Guide: Cybersafety For Personal Safety (16)

*Be Careful* Removing an app that an abuser installed may notify them.

Note, sometimes you can not delete Apple apps such as “Contacts”. It may remove it from your home screen, but it will still be available in the app library.

Manage iCloud Settings from a Browser.

Apple has a website that allows you to check various information with your Apple ID account through a web browser such as Google Chrome, Safari, Firefox, etc. These are the same settings as in the previous sections. This section is for those who:

  • Have an Apple laptop or Mac, but not an iPhone or iPad.
  • Are more comfortable navigating settings on a laptop or iMac rather than their iPhone.
  • Want to recover their iCloud account?
  • Want to change the email associated with their Apple ID?

The following steps in this section may send prompts to the devices that are connected to your iCloud account, as well as to your email address associated with your Apple ID. *The prompts will send to your devices, information about your location, such as a map of the city or the town from where you have logged in*.

  1. Go to https://www.icloud.com/
Digital Self Defense Guide: Cybersafety For Personal Safety (17)
  1. Enter your Apple ID (your iCloud address or the email associated with your Apple ID).
  2. Enter your password.
Digital Self Defense Guide: Cybersafety For Personal Safety (18)
  1. A prompt might be sent to your apple devices, check the prompt and follow the instructions.
Digital Self Defense Guide: Cybersafety For Personal Safety (19)
Digital Self Defense Guide: Cybersafety For Personal Safety (20)
  1. After the prompt you may see this.
Digital Self Defense Guide: Cybersafety For Personal Safety (21)

Choose the option that you think is best for you. Only select Trust if no one else has access to your device.

When you log in then you will see the following:

Digital Self Defense Guide: Cybersafety For Personal Safety (22)

Click on Account Settings, depending on the version. It might be in the middle like the photo above or you have to click on the top right Icon, then Account Settings.

On this page, you will find resources including the restoration of files, contacts, calendars, reminders, and bookmarks. Also, there is an option that would allow you to sign out of all browsers where your iCloud/Apple ID account is.

Digital Self Defense Guide: Cybersafety For Personal Safety (23)
Stalkerware

These applications can be installed on a phone with the purpose of secretly collecting information and sharing it without the knowledge or permission of the phone’s owner. It is difficult to for someone to install spyware on an updated Apple phone unless they had physical access to the device.

For iOS devices, stalkerware is usually downloaded directly from the app store and can be disguised as something innocent such as an unrecognized sports app or baby monitor. It is important to check for apps that you do not recognize.

It is extremely rare for spyware that is not in a form of an app. If you are concerned, apple has a feature called, “Lockdown Mode” for extreme cases. Enabling this feature will greatly limit the functionality of your device.

How Lockdown Mode protects your device

When the Lockdown Mode is turned on, some the features will function differently, including:

  • Messages – Most message attachment would be blocked, other than certain images, video, and audio. Some features including links and previews will be unavailable.
  • Web browsing – Certain web features would be blocked. This would cause some websites to load slowly or not operate correctly. In addition, web fonts might be shown properly, and images might be replaced with a “missing image” icon.
  • FaceTime – Incoming FaceTime calls would be blocked. If you had previously called that person or contact, then they would not be blocked.
  • Apple services – Invitations from Apple services including invitations to manage the home app are blocked.
  • Shared Albums – Shared albums will be removed from the Photos app, and any new Shared Album invitations are blocked. You can still look at the shared albums on other devices that don’t have Lockdown Mode enabled. When you turn off Lockdown Mode, you might need to turn Shared Albums on through your settings.
  • Device connections – Your device would need to be unlocked and given explicit approval to connect devices including iPhone/iPad/Mac laptop.
  • Configuration profiles – Under Lockdown Mode, you will not be able to configure any profiles and the device can’t be enrolled in Mobile Device Management.

Phone calls and plain text messages continue to work while Lockdown Mode is enabled. Emergency features including SOS emergency calls, are not affected.

How to enable Lockdown Mode on iPhone or iPad.

  1. Open the Settings app.
  2. Tap Privacy & Security.
  3. Under the Security setting, click on Lockdown Mode
  4. Click on Turn On Lockdown Mode.
  5. Tap on the Turn On & Restart, then enter your device password.

How to enable Lockdown Mode on Mac

  1. Go to the Apple menu.
  2. Click on System Settings.
  3. From the sidebar, click Privacy & Security.
  4. Scroll to find Lockdown Mode, then click Turn On.
  5. You might need to enter the user password.
  6. Click Turn On & Restart.
How to exclude apps or websites from Lockdown Mode

On iPhone or iPad

  1. Open the Settings app.
  2. Tap Privacy & Security.
  3. Under Security, tap Lockdown Mode.
  4. Tap Configure Web Browsing.
Digital Self Defense Guide: Cybersafety For Personal Safety (24)

To exclude an app, turn that app off in the menu. Only apps that you have opened since enabling Lockdown Mode and will have limited functions that are on this list.

To edit your excluded websites, tap Excluded Safari Websites, then Edit.

Digital Self Defense Guide: Cybersafety For Personal Safety (25)

On Mac

To edit your excluded websites:

  1. From the menu bar in Safari, choose the Safari menu > Settings.
  2. Click Websites.
  3. In the sidebar, scroll down and click Lockdown Mode.
  4. From the menu next to a configured website, turn Lockdown Mode on or off.

Jailbreak Some stalkerware apps require the iOS device to be “jailbroken” in order to be downloaded. Jailbreaking will need physical access to your device since it is changing your iOS operating system. If there are apps “Cydia” or “Sileo” is installed on your device that could be an indicator that it is jailbroken. Best defense against jailbreak option is to keep your device up-to-date. Internet/social media: When you are at home you can use “incognito” or “private” mode to do research. You could delete your history as well but sometimes you may forget. Going private mode will not save the history. * In Google, you can go to the top right, the three tops (more options) and click New Incognito Window. Another way is pressing Ctrl + Shift + n or on a Mac press ⌘ + Shift + n

  • For Apple users, In the Safari app, choose File then New Private Window.
  1. On an Apple phone, Open Safari on your iPhone.
  2. Tap the Tabs button
    Digital Self Defense Guide: Cybersafety For Personal Safety (26)
    .
  3. Tap [number] Tabs or Start Page
    Digital Self Defense Guide: Cybersafety For Personal Safety (27)
    to show the Tab Groups list.
  4. Tap Private
    Digital Self Defense Guide: Cybersafety For Personal Safety (28)
    , then tap Done
Digital Self Defense Guide: Cybersafety For Personal Safety (2024)

FAQs

What is digital security self protection? ›

Digital security refers to the protections and practices we employ to secure our data, devices and online presence from unauthorized access, theft or damage. This includes measures to guard against threats like hacking, identity theft, malware attacks, online scams and breaches of private information.

What is digital safety security? ›

What Is Digital Security? In a nutshell, digital security means protecting your computer, mobile devices, tablets, and any other Internet-connected devices from intruders, which could be in the form of hacking, phishing, and more.

What is cyber safety list some safety measure which you must take while online? ›

  • Get the latest anti-virus and firewall software. ...
  • Update your internet browser. ...
  • Create a strong and easy-to-remember password. ...
  • Use a different password to the one you use for other services. ...
  • Change your password on a regular basis. ...
  • Never share your password.

What is the disadvantage of digital security? ›

One of the main disadvantages of cyber security is the cost. Implementing robust cyber security measures can be expensive, especially for small businesses with limited resources. Costs can include the adoption of advanced hardware and software, employee training, and ongoing maintenance and upgrades.

How can you keep yourself digitally secure? ›

Here are a few tips to ensure your personal information doesn't end up in the wrong hands.
  1. Create strong passwords. ...
  2. Don't overshare on social media. ...
  3. Use free wi-fi with caution. ...
  4. Watch out for links and attachments. ...
  5. Check to see if the site is secure. ...
  6. Consider additional protection.

What are the 4 C's of digital safety? ›

KCSIE groups online safety risks into four areas: content, contact, conduct and commerce (sometimes referred to as contract). These are known as the 4 Cs of online safety.

What is the difference between digital security and cyber security? ›

Digital security involves protecting your online presence (data, identity, assets). At the same time, cyber security covers more ground, protecting entire networks, computer systems, and other digital components, and the data stored within from unauthorized access.

What is the risk of digital security? ›

Cybersecurity risk.

This refers to the potential for unauthorized access, disruption or malicious activities targeting digital assets, systems or networks. It emphasizes threats like malware, phishing and cyberattacks that can compromise data and infrastructure.

How to protect yourself online? ›

Top tips for staying secure online
  1. Top tips for staying secure online.
  2. Use a strong and separate password for your email.
  3. Install the latest software and app updates.
  4. Turn on 2-step verification (2SV)
  5. Password managers: using browsers and apps to safely store your passwords.
  6. Backing up your data.
  7. Three random words.

Do and don'ts of internet? ›

DONTs of Safe Online Behavior
  • 1: Don't share your personal information. ...
  • 2: Don't download from unknown sources. ...
  • 3: Don't open suspicious attachments. ...
  • 4: Don't use public Wi-Fi. ...
  • 5: Don't become a victim to phishing, smishing and hacking. ...
  • 1: Ensure you have a secure Internet connection. ...
  • Activate Your Firewall.

How to stay safe while browsing the internet? ›

Top 10 Internet Safety Rules & What Not to Do Online
  1. Keep Personal Information Professional and Limited. ...
  2. Keep Your Privacy Settings On. ...
  3. Practice Safe Browsing. ...
  4. Make Sure Your Internet Connection is Secure. ...
  5. Be Careful What You Download. ...
  6. Choose Strong Passwords. ...
  7. Make Online Purchases From Secure Sites. ...
  8. Be Careful What You Post.

Should I use Digital Secure on my phone? ›

Digital Secure scans your Android device and minimizes your risk of downloading malicious and infected apps. Digital Secure helps protect your device from: Viruses. Worms.

Can I disable Digital Secure on my phone? ›

Find Digital Secure and tap Manage. Tap Manage next to the line you want to change. Choose the Remove Digital Secure option, then tap Next. If you have multiple lines on your account with Digital Secure, you'll have the option to remove or keep Digital Secure from them.

What is Digital Secure protection? ›

Digital Secure is a security app for your mobile devices and computers to keep you protected at home or on-the-go. With free basic protection, you can sidestep risky sites and links when browsing and scan your device or network for a safer online connection.

What is meant by digital security? ›

Digital security, also referred to as cybersecurity, is a multidimensional discipline aimed at safeguarding digital assets, data, and systems from unauthorized access, attacks, disclosure, or destruction. It encompasses a broad spectrum of technical, procedural, and strategic measures.

Top Articles
Latest Posts
Article information

Author: Carlyn Walter

Last Updated:

Views: 5285

Rating: 5 / 5 (70 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Carlyn Walter

Birthday: 1996-01-03

Address: Suite 452 40815 Denyse Extensions, Sengermouth, OR 42374

Phone: +8501809515404

Job: Manufacturing Technician

Hobby: Table tennis, Archery, Vacation, Metal detecting, Yo-yoing, Crocheting, Creative writing

Introduction: My name is Carlyn Walter, I am a lively, glamorous, healthy, clean, powerful, calm, combative person who loves writing and wants to share my knowledge and understanding with you.