Apple Certifications

Is Your IT Team Certified?

Certifications are available for most Apple technologies and skill levels from business workers to IT professionals, developers, technology trainers, and system architects.

Performance Under Pressure

Is Your Jamf Pro Server Ready?

Has your Jamf Pro server gone though many different Jamf Pro Administrators? Do you have a complete understanding of exactly how your Jamf Pro sever is configured? Let HCS preform a health check on your Jamf Pro Server.

HCS Apps are compatible with Mac computers with Apple silicon

At WWDC 2020, Apple announced they will be using the ARM chips for future Macs. While testing the new chip and coming OS, HCS apps are compatible with Apple silicon.

Establish your first Mac deployment

HCS Technology Group will help you implement a proof of concept (POC) efficiently and aligned with best practices for easily deploying Mac in your organization.

This is troubling. Joanna Stern and Nicole Nguyen of the Wall Street Journal have published an article (paywalled) and accompanying video that describes attacks on hundreds of iPhone users in major cities throughout the United States. Some attacks involve drugging people in bars or even violence, but the most avoidable involve the thief or a confederate surreptitiously observing the iPhone user entering their passcode before snatching the iPhone and running.

However it happens, once the thief has a user’s iPhone and passcode, they change the user’s Apple ID password—which is shockingly easy for them to do. With the new password,  they disable Find My, making it impossible for the iPhone’s owner to erase it remotely. Then they use Apple Pay to buy things and access passwords stored in iCloud Keychain. They can even look in Photos for pictures of documents containing confidential information, such as credit cards and ID cards. After that, they may transfer money from bank accounts, apply for an Apple Card, and more, all while keeping the user locked out of their account. Of course, they’ll resell the iPhone too. (Apparently, Android users are susceptible to similar attacks, but Android phones have a lower resale value, so they aren’t being targeted as much.) Victims have reported thefts of tens of thousands of dollars, and many of them remain unable to access their Apple accounts.

We fervently hope Apple addresses this vulnerability in iOS 17, if not before. At a minimum, Apple should require users to enter their current Apple ID password before allowing it to be changed, much as the company requires at the Apple ID website. Plus, Apple would ideally do more to protect access to iCloud Keychain passwords from a passcode-wielding iPhone thief. (The closest we have now is a different Screen Time passcode, which can prevent account changes, but it blocks access to so many settings that most people will find it too annoying and turn it off.)

Although the chances of you falling prey to one of these attacks is vanishingly low, particularly if you don’t frequent urban bars or areas that suffer from snatch-and-run thefts, the consequences of a passcode theft are so severe that it’s worth taking steps to deter the malicious use of your passcode. With luck, you’re already doing many of these things, but if not, take some time to re-evaluate your broader security assumptions and behavior.

Pay More Attention to Your iPhone’s Physical Security While in Public

Most importantly, you don’t want to make it easy for a thief to grab your iPhone. Apart from a wrist strap, there’s no reliable way to prevent someone from snatching it from your hand. When you’re not actively using your iPhone, stash it in a secure pocket or purse instead of leaving it out on a bar or table. Many people are blasé about protecting their iPhones, so if you take more precautions, you’re less likely to have problems.

Always Use Face ID or Touch ID When Unlocking Your iPhone in Public

The easiest thing you can do to protect yourself from opportunistic attacks is to rely solely on Face ID or Touch ID when using your iPhone in public. If a thief sees you entering a passcode, you could become a target.

We know people who avoid Face ID or Touch ID based on some misguided belief that Apple controls their biometric information, but nothing could be further from the truth. Your fingerprint or facial information is stored solely on the device in the Secure Enclave, which is much more secure than passcode entry in nearly all circumstances.

We’ve also run across people for whom Face ID or Touch ID works poorly—if that’s you, conceal your passcode from anyone watching, just as you would when entering your PIN at an ATM.

Use a Strong Passcode

By default, iPhone passcodes are six digits. You can downgrade that security to four digits, but don’t—that’s asking for trouble. You can also upgrade the security to an alphanumeric passcode that can be as long as you like, but that’s overkill, in our opinion. Video would still capture you entering it, and if you’re focused on entering it accurately, you’re less likely to be aware of someone shoulder-surfing behind you.

That said, make sure your passcode isn’t trivially simple. Basic patterns like 333333 and 123456 are far more easily observed or even guessed. There’s no reason not to use a passcode that’s memorable but unguessable, such as your high school graduating class combined with your best friend’s birth month.

Don’t Share Your Passcode Beyond Trusted Family Members

Even those who don’t have motivated thieves targeting them need to be careful to protect their passcode. Our simple rule of thumb is that if you wouldn’t give someone complete access to your bank account, you shouldn’t give them your passcode. If extreme circumstances require you to trust a person outside that circle temporarily, reset the passcode to something they’ll remember—even 111111—and change it back as soon as they return your iPhone.

Switch from iCloud Keychain to a Third-Party Password Manager

Although Apple keeps improving iCloud Keychain’s interface and capabilities, having all your Internet passwords accessible to a thief who has your iPhone and passcode is unacceptable. Instead, we suggest you use a third-party password manager like 1Password or BitWarden (we no longer recommend LastPass). Even when a third-party password manager allows easier unlocking with Face ID or Touch ID (which both 1Password and BitWarden do), they fall back on their master password, not the device’s passcode. After you move your passwords from iCloud Keychain to another password manager, be sure to delete everything from iCloud Keychain.

Delete Photos Containing Identification Numbers

Many people take photos of their important documents as a backup in case the original is lost. That’s a good idea, but storing photos of your driver’s license, passport, Social Security card, credit cards, insurance card, and more in Photos leaves them vulnerable to a thief who has your iPhone and your passcode. With the information in those cards, the thief has a much better chance of impersonating you when opening credit cards, accessing financial accounts, and more. Instead, store those card photos—or at least the information on them—in your password manager.

A Security Wakeup Call

Again, although it’s very unlikely that you would fall prey to one of these attacks, we appreciated the encouragement to re-evaluate our security assumptions and behaviors, and we suggest you do the same.

(Featured image by iStock.com/AntonioGuillem)

Social Media: Prompted by a spate of attacks where an iPhone thief obtains the user’s passcode and uses it to lock the user out of their iCloud account, steal their money, and more, we suggest ways you can protect yourself.

Trusted by organizations worldwide
Apple Computer
Barnes & Noble
The American Red Cross
PepsiCo
Bose
Cigna
Morgan Stanley
Company

HCS Technology Group

Over 35 years of experience helping you achieve your service objectives with Apple devices and technology.

Innovative IT Solutions

Our capabilities and solutions include:

Strategy and Analytics
Technology Architecture
Engineering Services
Pre-emptive Maintenance
Break/Fix Support
Education
Large-Scale Deployments
Hosting
Managed Services

Leadership

Craig Cohen

President & CEO

Adam Karneboge

CTO & Senior Systems Engineer

Keith Mitnick

COO & Senior Systems Engineer

Samuel Valencia

Chief Strategy Officer

Sam Garcia

Senior Systems Engineer/ HCS of CT.

Partners

Mosyle

Mosyle

With Mosyle’s MSP program, HCS Tech Group offers MDM-related services to customers so HCS Tech Group can manage your endpoints and ensure your Apple devices are running smoothly. This will facilitate learning and how technology is used in your business, as well as lower your operational expenditure and time.

Jamf

Jamf

As a managed service provider, HCS Tech Group offers strategic value to a subset of the market by identifying, securing and managing your Jamf Pro needs. A partnership with Jamf means bridging the gap between us as a method to help even more organizations succeed with Apple.

Services

IT Solutions For All Your Needs

Handling every aspect of your computer network, from needs assessment and planning to installation, administration and training.

Business

Whether your business system consists of a single workstation or a comprehensive, high-speed, multi-station network with servers, HCS can help.

Learn More
Business

Education

HCS Technology Group provides Apple Professional Services for educational institution for K -12 As well as higher education.

Learn More
Education

Consumer

We can help you move forward in the home as new technology emerges and will benefit you by bringing you increased productivity, efficiency, creativity, and fun.

Learn More
Consumer

Mobility

If you are considering the deployment of a large number of iPad, iPhone and/or iPod Touch devices, you want to work with experienced Mobile Technical Coordinators like those found at HCS Technology Group.

Learn More
Mobility
Support

Latest Technical Articles

Whether you are experienced or new to the Mac, our technical articles offers insightful solutions for your needs.

Offboard a Mac Computer Using Jamf Pro and Apple Business Manager

This guide outlines the steps to properly offboard a Mac computer from Jamf Pro when an...

Read More

How to Configure Jamf Pro SMTP with Google Authentication

Configure Jamf Pro to use Google Authentication for SMTP enhances security, ensures compliance,...

Read More

How to Configure Jamf Pro SMTP to Use the Microsoft Graph API

Configuring Jamf Pro to use the Microsoft Graph API for SMTP enhances security, ensures...

Read More

Retrieve AppleCare Expiration for Mac Computers Using Jamf Pro

This guide provides a practical solution by demonstrating how to utilize Jamf Pro’s API roles,...

Read More

Speak with an Apple Certified expert today

We’d love to discuss your business challenges, even if you’re not sure what your next step is. No pitch, no strings attached.

Let's Talk