In the following section, you will find some basic tips for safe use of the iPhone , iPad using the operating system iOS. The guidelines do not apply to devices that operate in a corporate environment, but only to devices that are controlled by the user. Information on corporate connectivity and on issues such as VPN you can search on the page of Apple: https://www.apple.com/support/iphone/enterprise

2. Safety of the device

We must constantly protect our mobile electronic device from any fraudsters who would want to add suspicious software or simply read our personal information. There are several ways in which someone can bypass a device's security mechanisms and gain access to it. The best way to take precautions is to ensure that our devices with operating iOS will never fall into the hands of people who want to harm us. If we consider the particularly high risk of leakage of our sensitive personal data stored on our device, we can understand how important the protection of our device is. The data stored can be anything from passwords to the social media, up to and including credit card codes. If your mobile phone gets into the wrong hands, think of how much information someone could access.

3. Software Upgrade-Update

Whenever your mobile phone is upgraded, it should be upgraded with the latest software. iOS. These upgrades should be done via an internet-connected personal computer on which we have installed the program iTunes. Both the update of the software of the mobile device and the installation of the iTunes are the sole responsibility of the user. It is recommended that the software be updated from a computer with which we are familiar.

4. Do not use techniques "Jailbreak”

The term "Jailbreak” refers to the process of changing the operating system of the device iOS, in violation of the end user's license. By the procedure of "Jailbreak” the ability of the device to withstand attacks is significantly reduced, because the application of code signatures, which are an important security feature, is suspended. With the process of "Jailbreak” it is much easier to have access to a iPhone or iPad. Most; public attacks targeting devices iOS απαιτούν να έχει γίνει πρώτα “Jailbreak. Μια ακόμα παρεμφερής ανησυχία που εκφράζεται, αφορά την ποιότητα των εργαλείων και των εφαρμογών που προσφέρεται η κοινότητα του “Jailbreak”. Αυτές οι δωρεάν εφαρμογές κατασκευάζονται με ελάχιστη επίβλεψη και περιορισμένες δοκιμές. Ενδέχεται να περιλαμβάνουν ιούς ή άλλο κακόβουλο λογισμικό και μπορεί να προκαλέσουν σοβαρές, ανεπανόρθωτες βλάβες στη συσκευή σας. Καταστρέφοντας τα δεδομένα σας.

5. Activation of Automatic Lock and Password Lock

Activating Auto Lock automatically locks the mobile screen after a predefined period of inactivity of the mobile phone. We need to make sure that Auto Lock is enabled. The recommended lock time for the phone is approximately 3 minutes.

- We go to the Settings→General→Auto Lock

-We set the lock time to 3 minutes.

For Automatic Lock to be effective, it must be combined with Password Lock. By using the Automatic Lock and Password Lock we can get better protection. The password should have 4 digits, and should be given every time the screen is locked. To do this, the following settings need to be made:

- We go to the Settings → General →Passcode Lock.

- We put in operation (ON) το Passcode Lock.

- We define the "Require Passcode” at Immediately.

Note: On the same screen, you should disable the Simple Passcode, so that passwords combining letters and numbers can be defined.

For added security, enable Automatic Data Erasure to delete all user-created data after ten failed password attempts to access the device.

- We go to the Settings → General Passcode Lock.

- We put in operation (ON) το Erase “Data”.

6. Don't connect wirelessly to networks you don't trust

As far as possible, avoid or limit the use of wireless networks. When not in use, you should turn off the device to avoid exposure.

- We go to the Settings → Wi-Fi.

- We disable (OFF) Wi-Fi.

Resist the temptation to use free internet access points. Most of these offer no protection for data transmitted wirelessly, which can mean that anything nearby can be intercepted. If, nevertheless, you absolutely must use a wireless network, pick one that you know about and make sure the data you exchange with everyone is encrypted. In the list of available networks, those that are protected are accompanied by a lock icon next to their name.

To enable automatic connection to wireless networks, do the following:

- We go to the Settings → Wi-Fi.

- We set the command "Ask to join Networks” , OFF.

Important note: Even if automatic connection to a wireless network is disabled, the device will automatically connect to networks that it has previously visited and that are still in its memory.

Another protection measure we can take is to select the command "Forget this Network” after each automatic connection. This will reduce the chances of our device connecting to an operating system iOS with another wireless network that has the same name. It is important to choose this version before going out of range of that network. Otherwise, the network will not appear in the list of available networks and it will not be possible to remove it.

- We go to the Settings→Wi-Fi.

- Select a network from the list.

- Select the command "Forget this Network”.

7. Turn off the Bluetooth, unless you need it

The Bluetooth should only be turned on when absolutely necessary. When we are not using it, we should keep it off, so that other devices cannot detect it. iOS our device and trying to connect to it.

- We go to the Settings → General→ Bluetooth.

- We set the Bluetooth ,OFF”.

8. Turn off tracking services unless you need them.

Tracking Services may be used by applications on your device to find out where you are. Location Services should only be enabled if there is an emergency and Apps should know where you are. Otherwise, turn them off or limit their use. To disable Tracking Services, do the following:

- We go to the Settings (Settings→ General για iPad).

- We set the "Autofill” , OFF.

Applications using the service "Location Services” will ask to use it the first time you put it into operation. Consider these requests carefully and only allow Tracking Services to operate when absolutely necessary.

9. Safe operation of the Safari

The possibility of "Autofill” should be disabled in the Safari. In this way the Safari will not be able to save useful information on your device, such as username & password.

In addition, the technology Javascript can be disabled in order to prevent any malware from damaging your device. However, this deactivation may render some pages unusable, so it is necessary to continue the Javascript is in operation. If we want to turn it off:

- We go to the Settings → Safari.

- We set the Javascript , OFF.

In addition, the "cookies” Furthermore, the " To prevent this, we turn them off when possible, or adjust the iOS our device to accept "cookies” only from the pages we've visited.

10. Safe use e-mail

Make sure that all connections e-mail The ones you use are encrypted. A prerequisite for this is that the server you're using, to move encrypted data: this is done in most cases. If they are not encrypted, your messages will be freely transmitted and it will be possible for someone to intercept and read them.

- We go to the settings → Mail, Contacts, Calendars.

- We go to SMTP and select the name of a server.

- We set the command "Use SSL” , ON for every account in the list.

- We go to Advanced.

- We set the command "Use SSL” to ON for each account in the list.

When we open the e-mail μέσω του Safari, we need to be sure that the certification page (login page) is encrypted before we provide our information. If it is encrypted, the website address starts with "https” instead of “http” and the icon of a lock appears to the left of the url.

In addition, the "Remote Image Loading” should be disabled from the e-mail. In this way, we can protect our system from spoofed malicious images. Also, it will not allow those who want to harm our system to connect our network address to the account e-mail που έχουμε.

- We go to the settings→ Mail, Contacts, Calendars.

We adjust the "Load Remote Image” at OFF.

11. Setting of the iPhone Configuration Utility

With the adoption of the iOS 4, some security settings, which could only be activated through the iPhone Configuration Utility, now exist in the Settings → General → Restrictions. These settings include turning off the camera and built-in iOS applications, such as Safari and Youtube.