In this article:
In this article:
Your iPhone’s default privacy settings are relatively strong, but they can leave you vulnerable to data losses and hacking — unless you make these changes.
Your iPhone’s default privacy settings are relatively strong, but they can leave you vulnerable to data losses and hacking — unless you make these changes.
In this article:
In this article:
Using an iPhone can be a nightmare from a security and privacy standpoint. Threats range from excessive data collected by app developers to hacking and exploitation of your sensitive photos and videos. It is therefore essential that you make your iPhone as secure as possible.
While Apple has a good history of privacy-focused updates, there are some essential settings you need to change in order to protect your privacy, identity, and data.
In this guide, we’ll explain what privacy features are available on your iPhone and how you can update your device’s settings to make it as secure as possible.
{{show-toc}}
Privacy settings safeguard the personal data collected and stored on Apple smartphones, iPads, and Apple Watches. On your iPhone, these settings provide granular control over how Apple and other apps access and use your information.
For example, you might share your location with ride-share apps like Uber and Lyft. Or, you may share your contacts with alternate messaging apps such as Telegram or Discord.
While sharing some personal information may be safe, sharing too much can put your data and online identity at risk.
Here are just a few of the benefits you can get from updating your iPhone’s default Privacy & Security settings:
The bottom line: By default, your iPhone skews towards functionality over privacy — this means that you may be sharing more data than you realize. By changing a few simple settings, you can make your device more secure and private.
Updating your iPhone’s Settings app does more than protect your privacy — it can be essential if your iPhone gets hacked or someone steals it and tries to access your accounts and personal information.
Here are 14 privacy settings you should update today:
Creating a strong passcode is one of the best ways to secure your phone — whether it gets stolen, lost, or if you don’t want strangers (or people you know) accessing it without your permission.
How to set up a strong passcode on an iPhone:
Fingerprint and Face ID may seem like more secure options for locking your iPhone — but they can actually make you more vulnerable in some cases.
U.S. state courts are torn on whether unlocking fingerprint and Face ID violates the Fifth Amendment. In some states, like Illinois, law enforcement can force you to unlock your phone [*]. Until there’s a federal decision, you might be better off with only a passcode.
How to turn off Touch ID:
How to turn off Face ID:
Your Apple ID is one of your most sensitive accounts, as it contains critical personal and financial information. To prevent hackers from accessing your Apple ID, make sure you have two-factor authentication (2FA) enabled. This is an additional security measure that requires you to enter a secondary code sent to another device (along with your password) when you try to log in.
How to turn on two-factor authentication on your Apple ID:
Note: Once you enable 2FA on your account, you can only turn it off within two weeks of enrolling. After that, it will stay enabled on your account indefinitely.
When creating new accounts, you can choose to use your existing social media or email credentials instead of creating brand new ones. “Sign in with Apple” provides the same easy login process — but with the added benefits of Apple security, including:
To use “Sign in with Apple”:
Beware that some third-party apps and websites may require you to upgrade your account before you can use Sign in with Apple. On iOS and iPadOS 14 or later, you may be prompted to upgrade if the system detects you have a compromised password or reused password. In that case:
By default, your lock screen displays app notifications and incoming text messages, and allows you to access other widgets. While convenient, these settings can allow people to “spy” on your phone or allow phone thieves to access your controls and notifications.
You can restrict lock screen actions and visibility by:
In addition to adjusting lock screen settings, consider removing any family or other sensitive photos from your lock screen. Scammers who’ve stolen your phone can use your photos to create fake social media profiles and harass your friends and family.
Depending on the permissions you’ve granted, apps may be able to access your Calendar, Photos, Contacts, and Fitness data.
While app permissions are often meant to help developers enhance their understanding of your preferences and behavior patterns, if those companies suffer a cyberattack, your personal information could be exposed or leaked on the Dark Web.
How to see what permissions your apps currently have:
To get a more comprehensive view of app permissions, run an App Privacy Report:
It’s tempting to turn off software and app updates. But these updates patch critical vulnerabilities in specific apps along with your device’s overall operating system. The longer you ignore these notifications, the higher your chances are of being hacked.
How to get the latest software updates right away:
How to turn on automatic app updates:
Pro tip: Consider enabling automatic updates on your Mac computer, as well. If viruses and malware end up on your laptop, they could easily transfer to your phone when you plug it in to charge or sync.
💡 Related: Can Macs Get Viruses? How To Remove Malware From Macs →
Most websites have embedded trackers collecting your data. Companies use that data to design tailored ads or sell it to marketers, advertisers, and scammers.
Even Apple can use your phone activity to display personalized ads. It’s tough to block ad tracking completely without using anti-tracking software, but there are ways to limit it within your iPhone settings.
First, double-check that ad tracking is turned off:
Then, turn off Apple’s personalized ads:
Next, prevent cross-site tracking on Safari:
This setting prevents content providers from tracking your visits from one site to another.
Finally, stop sharing iPhone analytics with Apple:
This prevents your iPhone from sending crash reports back to Apple, which can include more data than you may want to share with the company — even anonymously.
💡 Related: Is Norton Privacy Monitor Assistant Worth It? →
While iPhones come with native malware protection, you’re still vulnerable to cyberattacks on unsecured networks. On iPhones, virtual private networks, or VPNs, use encryption to conceal your browsing history, location, IP address, and other identifiers. This prevents hackers from spying on your shopping or banking activity or intercepting texts and emails over public Wi-Fi.
iCloud+ users benefit from “Private Relay,” a feature that protects browser traffic and stops network providers from developing a robust user profile. But “Private Relay” is limited to Safari and doesn’t come with other features included with top-rated VPNs — like multi-browser protection, high-speed streaming, and more precise geolocation.
“Find My” is Apple’s built-in feature to help users find lost iPhones. But if it’s not configured correctly or turned off, you’re out of luck.
For peace of mind, make sure “Find My” is on:
You may also want to toggle on Find My Network and Send Last Location. These settings allow you to locate your phone even if it's been powered off or is offline. You can also turn on Location Services to see your lost iPhone on a more precise map.
If you use the Mail app, you’ll want to turn on Mail Privacy Protection. This setting hides your IP address so that advertisers and phishers can’t connect it to your browsing activity or identify your exact location. With Mail Privacy Protection enabled, senders also can’t see whether or not you’ve opened their emails.
How to turn on Mail Privacy Protection:
If you’re an iCloud+ user, take advantage of Apple’s “Hide My Email” feature. Instead of giving away your primary email address when subscribing to newsletters or other promotions, you can generate “throwaway” email addresses that forward these emails to your real account.
“Safety Check” provides a fast way to stop sharing your information or change the audience with whom you’re sharing it — crucial steps to take if your phone is lost or stolen.
Here are just some examples of what you can adjust through “Safety Check”:
Unfortunately, “Safety Check” is only available for iPhones on iOS 16 or later, and you must have two-factor authentication set up for your Apple ID.
How to use “Safety Check”:
Siri isn’t just Apple’s voice assistant — it also tracks how you use your iPhone to make suggestions based on what it knows about you.
One of the bigger issues with Siri is that its default settings allow Siri to access content from all of your apps. This could mean that it pulls sensitive information from your Notes or other apps, which you might want to remain private.
How to block Siri from accessing certain apps:
If you don’t want to use Siri at all: Toggle off the Press Side Button for Siri and listen for “Siri” or “Hey Siri.”
“Airdrop” is useful for quickly sharing files across devices — but it can also be used by malicious actors to send you files that you don’t want. It’s best to keep “Airdrop” disabled until you need to use it.
How to disable “Airdrop”:
Your phone holds sensitive information and must be properly secured. iPhone privacy settings offer a good starting point. But they can’t protect you from the harmful effects of phishing scams or data breaches, and they can’t stop your phone from being stolen or hacked.
For all-encompassing protection, you need a third-party app like Aura. With Aura, you get advanced digital security and privacy tools to keep you safe online. Plus, identity and credit monitoring, a secure password manager, up to $1 million in identity theft insurance, and 24/7 support.
Editorial note: Our articles provide educational information for you to increase awareness about digital safety. Aura’s services may not provide the exact features we write about, nor may cover or protect against every type of crime, fraud, or threat discussed in our articles. Please review our Terms during enrollment or setup for more information. Remember that no one can prevent all identity theft or cybercrime.