A friend recently expressed astonishment when she saw us using trackpad mode while editing text on an iPhone. (It works on the iPad, too!) So, even if you already know these tips, do your friends a favor and show them:
Tap once to position the insertion point at the start or end of a word.
Touch and hold to reveal the magnifier and move the insertion point within words ➊.
Touch and hold the Space bar to turn the entire keyboard into a virtual trackpad that lets you move the insertion point above ➋. On the iPad, you can also touch and hold with two fingers anywhere on the keyboard.
Double-tap to select a word; keep dragging to select more text, one word at a time ➌.
Triple-tap to select an entire paragraph.
(Featured image by Adam Engst with keys from MXW Photo)
Social Media: Editing text on an iPhone or iPad will never be as easy as on a Mac, but with these tips, you can quickly position the insertion point and select words and paragraphs using your finger.
https://f11photo.com/wp-content/uploads/sites/13/2023/06/PR-F11Photo-logo.jpg00F-11 Photohttps://f11photo.com/wp-content/uploads/sites/13/2023/06/PR-F11Photo-logo.jpgF-11 Photo2024-09-03 14:07:002024-10-01 07:19:19Five Quick Tips to Ease iPhone and iPad Text Editing and Amaze Your Friends
Although paying attention to online security is of primary importance, don’t forget local security. You don’t want to go out for lunch and let someone wandering by your office poke through your email, messages, photos, and private files. To ensure this doesn’t happen, set your Mac to start the screen saver or sleep the display after a few minutes (on a laptop, just close the lid), and then set “Require password after screen saver begins or display is turned off” to a short duration. We recommend 1 or 5 minutes, though you can adjust to balance inconvenience against security. To eliminate the fuss almost entirely, use Touch ID or an Apple Watch to unlock your Mac without having to type your password.
(Featured image based on an original by iStock.com/Armastas)
Social Media: Don’t forget about local security on your Mac. Make sure to require a password shortly after the screen saver starts or the display sleeps to prevent people from riffling through your email, photos, messages, and more.
https://f11photo.com/wp-content/uploads/sites/13/2023/06/PR-F11Photo-logo.jpg00F-11 Photohttps://f11photo.com/wp-content/uploads/sites/13/2023/06/PR-F11Photo-logo.jpgF-11 Photo2024-09-03 14:06:002024-10-01 07:19:19Set macOS to Require a Password after Screen Saver Start or Display Sleep
We’ve written in the past about how Apple-only companies can protect themselves from ransomware (strong security, isolated backups, monitoring software), but realistically, it’s primarily a threat to computers running Windows and Linux. If you, or anyone you know, is targeted by ransomware, look to the No More Ransom website, developed by Europol’s European Cybercrime Centre and the Dutch police, for advice and tools. The advice boils down to: “Don’t pay the ransom because it proves to the criminals that ransomware works, and there’s no guarantee it will solve your problem.” On the tools side, the Crypto Sheriff helps identify the type of ransomware in play, and No More Ransom provides decryption tools for 180 different forms and variants of ransomware. There are no guarantees, but anyone who has fallen prey to ransomware should start with No More Ransom.
(Featured image based on original by iStock.com/Suebsiri)
Social Media: Ransomware primarily affects Windows and Linux computers, but if you, or anyone you know, falls prey to it, visit the No More Ransom website for advice and decryption tools.
Are you planning to upgrade to a new iPhone 16? It’s exciting, we know, but it’s best to proceed deliberately when setting up your new iPhone to avoid causing yourself headaches. Follow these instructions when you’re ready to transfer your data—and, for many people, much of your digital life—to the new iPhone. Apple also has a series of videos you can watch.
Update your old iPhone to the latest version of iOS. If you have an Apple Watch, update it to the latest version of watchOS. This process can take some time, so it may be best done overnight before you move data to your new iPhone.
Make sure you know your Apple ID and password, and if you have an Apple Watch, its passcode. You will likely have to enter them at least once during this process.
Back up your old iPhone to iCloud or your Mac. (If you back up to a Mac, be sure to encrypt the backup, or else it won’t include saved passwords, Wi-Fi settings, browsing history, Health data, and call history.) Or back up to both, for safety’s sake. We prefer iCloud backups because they’re easier and don’t introduce additional variables, like flaky USB cables. If you don’t usually back up to iCloud, Apple will give you temporary iCloud storage to make a backup when moving to a new iPhone. To initiate an iCloud backup, go to Settings > Your Name > iCloud > iCloud Backup and tap Back Up Now.
If you have an Apple Watch, you don’t need to unpair it from your old iPhone at this point in the process. (Later, if the automatic transfer has not worked, you can unpair it manually and pair it again later. If you end up taking the manual route and have a cellular Apple Watch, you’ll be asked if you want to keep or remove your plan. If you’re keeping your Apple Watch to re-pair with your new iPhone, keep the plan.)
You shouldn’t need to worry about transferring a SIM card. If you ordered your new iPhone through Apple and connected to your cellular carrier account during purchase, activating the new iPhone should cause it to take over your phone number. The same should be true if you’ve purchased directly through your carrier. Besides, it’s likely that iPhone 16 models sold in the US will rely on eSIM and lack SIM trays like the iPhone 15, so only non-US users might need to transfer the SIM card from the old iPhone to the new one. Even then, it’s better to contact your carrier and get them to activate the new SIM in the new iPhone because old SIMs don’t always support all current cellular features, such as full 5G support.
Transfer your data, settings, apps, and purchased content in one of these three ways. None of them will be quick, despite the first one’s name, so initiate the transfer only when you have plenty of time:
Quick Start: With the Quick Start feature, content from your old iPhone copies directly from your old iPhone to your new one. We recommend this technique because it’s more likely to preserve app logins, something that’s less true when restoring from an iCloud backup. Put your iPhones next to each other (plugged into power), use the old iPhone to scan the animation on the new one, and then follow the rest of the steps.
iCloud: With this technique, the new iPhone will download your content from your old iPhone’s iCloud backup. Once you’ve joined a Wi-Fi network on the new iPhone and tapped the Restore from iCloud Backup button, you’ll have to select the correct backup—likely the most recent one you just made. Keep your new iPhone plugged into power the entire time to ensure that all your content syncs during this step.
Finder or iTunes: With this approach, you’ll restore your old iPhone’s content from a backup made to your Mac. Connect your new iPhone to your Mac using an appropriate cable, open a Finder window (or iTunes on an old Mac), select your device in the left-hand sidebar, click Restore Backup, and choose the appropriate backup—likely the most recent one.
Perform post-transfer tasks. Ensure that you can make and receive a phone call. If necessary, pair your Apple Watch with the new iPhone. You’ll also need to pair your Bluetooth accessories—including AirPods—with your new iPhone. Plus, some app data needs to sync to your new iPhone, so open the Mail, Contacts, and Calendar apps and check if they have your data. It could take a few minutes for them to fill up. Apps may request notification permissions again, and you may need to download content and in-app purchases.
If you use two-factor authentication with an app like 1Password, Authy, or Google Authenticator, ensure you can get your 2FA codes using your new iPhone. 1Password and Authy are good about providing access to 2FA codes from multiple devices—just log in to your account from each device—but Google Authenticator may require some additional setup since it didn’t initially offer any way to transfer codes to a new phone.
Finally, if necessary, set up single sign-on for work or school. If your workplace or school uses a security system like Duo, you’ll likely want to activate your new iPhone and deactivate the old one. Using any device, navigate to a standard single sign-in login screen from your organization, look for a link for managing your logins, click that link, and follow the prompts.
Although Apple works hard to make the process of transferring from an old iPhone to a new one as painless as possible, some things may fail to transfer seamlessly. For that reason, we strongly recommend holding onto your old iPhone for a week or so to ensure the new one can do everything the old one could. During that time, put the new iPhone through its paces with an eye toward checking every app you need.
(Featured image by iStock.com/valiantsin suprunovich)
Social Media: It’s exciting to get a new iPhone, but take a few minutes to read our advice on what you need to do before—and after—transferring your data from your old iPhone.
https://f11photo.com/wp-content/uploads/sites/13/2023/06/PR-F11Photo-logo.jpg00F-11 Photohttps://f11photo.com/wp-content/uploads/sites/13/2023/06/PR-F11Photo-logo.jpgF-11 Photo2024-09-03 14:04:002024-09-10 03:14:56What You Need to Know Before Switching to a New iPhone
QR codes, those square, blocky codes you scan with your iPhone’s camera to load a Web page, have become ubiquitous. So much so that we seldom pause before scanning any QR code we see. But if you think about it, that’s the same as clicking random links in emails or texts, which is a terrible idea from a security perspective. “Quishing” (QR code phishing) isn’t commonplace yet, but some sources say there are thousands of cases per month. To avoid falling victim to a quishing scam, only scan QR codes from trusted sources, try to verify what a code will do once scanned, and evaluate the yellow URL preview Safari provides (when using other browsers, all you see is Open in Browser Name). Finally, always install iOS security updates promptly because they often address vulnerabilities that could be exploited with malicious data.
(Featured image based on an original by iStock.com/B4LLS)
Social Media: QR codes—those blocky squares you scan with your iPhone camera—are an easy way to open a Web page. Unfortunately, scammers also use them to trick people into visiting malicious websites, so read our tip about scanning these codes safely.
https://f11photo.com/wp-content/uploads/sites/13/2023/06/PR-F11Photo-logo.jpg00F-11 Photohttps://f11photo.com/wp-content/uploads/sites/13/2023/06/PR-F11Photo-logo.jpgF-11 Photo2024-08-01 13:08:002024-09-03 01:52:33Be Careful When Scanning Unknown QR Codes
iOS, iPadOS, and macOS all let you specify whether any given app should show no notifications, temporary banners, or persistent alerts: look in Settings > Notifications and System Settings > Notifications. Temporary banners appear briefly and then automatically disappear, which is appropriate for notifications requiring no acknowledgment. But what if you see a temporary banner only as it’s disappearing and can’t read it in time? You can find a historical list of notifications in Notification Center. To open it from the Lock Screen on an iPhone or iPad, swipe up from the middle of the screen. From any other screen, swipe down from the center of the top of the screen. On the Mac, click the date and time in the upper right corner. If your Mac has a trackpad, you can also swipe with two fingers from the right edge.
(Featured image based on an original by iStock.com/Shutthiphong Chandaeng)
Social Media: If a temporary banner disappears from your iPhone, iPad, or Mac before you have a chance to read it, you can find it in Notification Center.
https://f11photo.com/wp-content/uploads/sites/13/2023/06/PR-F11Photo-logo.jpg00F-11 Photohttps://f11photo.com/wp-content/uploads/sites/13/2023/06/PR-F11Photo-logo.jpgF-11 Photo2024-08-01 13:07:002024-09-03 01:52:36Missed an Alert? Check Notification Center
We recently wrote an article for those who manage their own Internet domain names about using SPF, DKIM, and DMARC to prevent your domains from being used in phishing attacks and enhance the deliverability of legitimate email. But what about other domains you own but don’t use for email? To make phishing attacks more believable, spammers sometimes forge email so it appears to come from parked domains that aren’t protected. You can use SPF, DKIM, and DMARC to ensure that forged email that seems to come from your unused domains isn’t accepted. The details are too specific to go into here, but Cloudflare has an excellent article outlining what you need to do.
(Featured image based on an original by iStock.com/Igor Kutyaev)
Social Media: If you have parked domains that never send email, it’s important to set up SPF, DKIM, and DMARC so scammers can’t forge legitimate-looking email from those domains.
https://f11photo.com/wp-content/uploads/sites/13/2023/06/PR-F11Photo-logo.jpg00F-11 Photohttps://f11photo.com/wp-content/uploads/sites/13/2023/06/PR-F11Photo-logo.jpgF-11 Photo2024-08-01 13:06:002024-09-13 09:40:46Protect Domains That Don’t Send Email from Email Spoofing
When you connect to a public Wi-Fi network at an airport, hotel, coffee shop, or school, you may need to interact with a captive portal login page to be granted access to the network. It might require you to enter login credentials, ask for your name, or make you agree to terms of service. But what if that login page doesn’t appear, or something kicks you off the network and you can’t reconnect? In Safari, navigate to captive.apple.com, which should force the captive portal to display its login page again. If that doesn’t work, remove any custom DNS servers and restart. On the Mac, find custom DNS servers in System Settings > Network > Wi-Fi > Details > DNS. On an iPhone or iPad, go to Settings > Wi-Fi > Network Name > Configure DNS and choose Automatic.
(Featured image based on an original by iStock.com/CreativaImages)
Social Media: When you connect to a public Wi-Fi network, you often must authenticate or agree to terms on a captive portal login page. Here’s the solution if that page doesn’t appear.
https://f11photo.com/wp-content/uploads/sites/13/2023/06/PR-F11Photo-logo.jpg00F-11 Photohttps://f11photo.com/wp-content/uploads/sites/13/2023/06/PR-F11Photo-logo.jpgF-11 Photo2024-08-01 13:05:002024-09-03 01:52:42Having Trouble with a Public Wi-Fi Network’s Captive Portal Login Page?
In the Apple world, the account that controls access to all your Apple-related online services is the Apple ID. Buying apps from the App Store, putting photos in iCloud Photos, and sharing data between iCloud-enabled apps—all these actions rely on your Apple ID. If you’re a regular Apple user, you have an Apple ID associated with your email address.
Most Apple users set up an Apple ID when they configure their first Apple device, and if you don’t have an email address that you want to use, you can create a free @icloud.com address during the process. (If you need to create a new Apple ID, you can do that at appleid.apple.com.)
There are actually two types of Apple IDs: personal Apple IDs used by individual users and managed Apple IDs given to employees by businesses and other organizations. Managed Apple IDs are popular with companies that give devices to staff members and need to ensure compliance with various usage and security policies. Let’s look at how they differ:
Creation, ownership, and control: Individuals set up personal Apple IDs on their own and maintain full ownership over the account and control over the device. Managed Apple IDs are set up by the organization, typically through Apple Business Manager, and the organization retains ownership and control for centralized management. That control is essential when an employee leaves. Otherwise, a company may be unable to reset a returned device and give it to another employee.
Access to Apple services: Personal Apple IDs have full access to all Apple services and features. Managed Apple IDs have much more limited access to protect the organization from unauthorized purchases and insecure behavior. Users with managed Apple IDs can’t purchase anything from the App Store, iTunes Store, or Apple Books. Nor can they access Apple Arcade, Apple Fitness+, Apple Music, Apple Music radio, Apple News+, or Apple TV+. The Find My, Health, Home, Journal, and Wallet apps aren’t available or fully functional. Plus, Apple Pay, iCloud Family Sharing, iCloud Mail, and iCloud+ services like Private Relay, Hide My Email, and custom email domains are unavailable.
Security and management: When a device relies on a personal Apple ID, that user is responsible for maintaining security and managing apps (which will belong to the user). That’s appropriate for individuals, but for companies that need to protect corporate information, managed Apple IDs allow the IT department to enhance security by requiring passcodes, enforcing password policies, setting role-based permissions, and separating work and personal data. On the management side, managed Apple IDs make it easier to reset devices, revoke access, comply with legal and privacy regulations, integrate with corporate identity systems, and centralize app licensing.
Though some organizations may prevent it, it is technically possible to use both types of Apple IDs on the same device. For instance, you could use a managed Apple ID on an employer-provided device along with a personal ID to access the App Store, Apple Music, Apple News+, and other Apple services. To do that on an iPhone, you’d go to Settings > Your Name > Media & Purchases and either sign in with your personal Apple ID or, if necessary, tap Sign Out and sign back in.
What’s the takeaway? There are three possibilities, depending on who owns the device and the employer’s security and management policies:
Personal device not used for work: If you’re a regular user who has purchased your own device and you either don’t use it for work or your employer doesn’t care what you do, all you need is a single personal Apple ID. Although it’s possible to create multiple Apple IDs and use them for different purposes, it’s a recipe for confusion down the road.
Personal device used for work: If your employer has a BYOD (Bring Your Own Device) program that lets you use your own device with corporate resources, they will likely ask to use Apple’s User Enrollment to create a profile on the device that separates personal and work data and allows the use of both personal and managed Apple IDs. Although the IT department cannot access your personal data (emails, messages, photos, location, etc.), it can enforce security policies, install and configure work-related apps, and control corporate data on the device. Some people find the privacy implications of this approach troubling and opt for separate work and personal devices.
Employer-provided device: If your employer provides a device for your use, they will likely require you to use a managed Apple ID on it. That prevents you from having to worry about security or management, but comes with some restrictions on what you can do. Talk to your IT department if you also want to use your personal Apple ID on the device.
Hopefully, we’ve clarified the situation surrounding personal and managed Apple IDs. Which makes the most sense in any given situation depends on a wide range of variables, so contact us if you need to talk through the possibilities as either an employee or employer.
(Featured image based on an original by iStock.com/dolgachov)
Social Media: There are actually two types of Apple IDs: personal and managed. Regular users have personal Apple IDs; those who use employer-provided devices are often required to use managed Apple IDs. Learn more about both.
https://f11photo.com/wp-content/uploads/sites/13/2023/06/PR-F11Photo-logo.jpg00F-11 Photohttps://f11photo.com/wp-content/uploads/sites/13/2023/06/PR-F11Photo-logo.jpgF-11 Photo2024-08-01 13:04:002024-09-13 09:40:07Understanding the Key Differences Between Personal and Managed Apple IDs
We Apple users tend to believe that our devices usually last longer—both physically and functionally—than Windows PCs and Android smartphones. For instance, Apple’s current operating systems work on nearly all Macs, iPhones, and iPads introduced in 2018 and later, albeit with some feature loss on the oldest devices. In a white paper entitled “Longevity, by Design,” Apple has now outlined how it works to increase product longevity through design and manufacturing, ongoing software support, and access to repair services. The white paper may be partially aimed at dissuading elected officials from passing Right to Repair legislation that could force unwanted design changes, but it still offers an illuminating look at how the company balances environmental impact, protecting customer privacy and safety, and enabling repair transparency. It’s worth a read if you’re interested in why Apple makes the design decisions it does.
(Featured image based on an original by Apple)
Social Media: Apple has published a white paper that offers an illuminating look at how the company works to increase device longevity while balancing environmental impact, protecting customer privacy and safety, and enabling transparency in repair.
https://f11photo.com/wp-content/uploads/sites/13/2023/06/PR-F11Photo-logo.jpg00F-11 Photohttps://f11photo.com/wp-content/uploads/sites/13/2023/06/PR-F11Photo-logo.jpgF-11 Photo2024-07-01 11:08:002024-07-31 19:10:38Apple Explains Its Approach to Device Longevity