How to view and manage our trusted devices and keep our Apple ID secure

,
Cómo ver y gestionar nuestros dispositivos de confianza y mantener la seguridad de nuestro Apple ID

In today's digital environment, security and privacy are paramount. As Apple users, one of our main concerns is ensuring that only we have access to our Apple ID. This account is the core of all our Apple devices; through it, we access highly valuable personal information such as our contacts, calendars, and photos. When it comes to keeping our Apple ID secure, it is essential to know how to manage these trusted devices to ensure our digital security.

What Is a Trusted Device

A trusted device is one that we have linked to our Apple ID and is therefore authorized to receive verification codes as part of the two-factor authentication process. This additional level of security is crucial, as it ensures that only we can access our account and make changes to it.

It's important to regularly review which devices are connected to our Apple ID. If an old device that we have sold or given away remains linked to our account, it could pose a risk to our security. Therefore, keeping the list of trusted devices up to date is an essential security practice (just as important as these 8 tips to improve our security and privacy online).

How to Manage Trusted Devices

Managing the trusted devices for our Apple ID is really easy. The steps for this are as follows:

  1. We enter appleid.apple.com in our browser.
  2. We enter the email and password for our Apple ID.
  3. If requested, we enter the code for two-factor authentication.
  4. In the sidebar, we select Devices.

Here we see the list of all the devices linked to our account. By selecting a specific device, we can view details such as the model and serial number. We can also verify if the device is trusted and, therefore, if it can receive verification codes from our Apple ID.

If we decide that a device should no longer be trusted, from here we can remove it from our account. Doing so ensures that it cannot receive verification codes in the future and that access to services like iCloud is blocked until we log in again with two-factor authentication on that device.

Maintaining active management of the devices linked to our Apple ID is, in addition to a security measure, an essential privacy practice. By regularly reviewing and updating the list of trusted devices, we ensure that only current and secure devices have access to our personal information and accounts.

On Hanaringo | New to Apple? How to create a new Apple ID from any device