CCN-CERT publishes a safety manual on Apple

CCN-CERT APPLE

The National Cryptological Center (CCN-CERT) has published a fairly detailed study about security on Apple computers. It is a compendium of good practices in the use of technologies and especially when it comes to devices from the American company. They talk from what the Apple ID is and how to reinforce it, to the use of Siri on the devices.

The CCN-CERT is quite meticulous in this security report on Apple

It seems very long and tedious the report that the CCN-CERT Spanish has done around security in different Apple devices. However, reading is easy and you can get good ideas to start if you want to have a device, not only good and beautiful, but also for sure.

Security these days is very important and is closely linked to Privacy of our communications but also of our habits and movements that we carry out on a daily basis (well, we have hardly made any movements for a month, but hey, let's ignore the virus).

In the document who we can have open access It explains to us, for example, what the Apple ID consists of and how we can strengthen its security. It also talks about the Apple assistant, Siri and how we can improve its security when it helps us.

It consists of just over 100 pages, so it is quite comprehensive. It is very worth reading, because surely there are features in which a little more light will be shed on them, because a priori they can seem quite tedious. The iCloud family service, and others is a clear example of this.

Very detailed Chapter 6 dedicated to remote device search from iPhone or Mac.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.