Need to Clear Space on an iPhone or iPad? Here’s How to Do It in iOS 12

Little is more frustrating than running out of space your iPhone or iPad. You can’t take new photos, you can’t download new apps, some things may not work at all, and iOS will nag you repeatedly about how you can “manage” your storage in Settings. Luckily, over the past few versions of iOS, Apple has significantly improved the options for clearing unnecessary data from your device.

Clear-space-warning-dialog

Storage Graph

To get started clearing space, go to Settings > iPhone/iPad Storage. At the top of the screen, a graph reveals where your space is going, such as Apps, Photos, Media, Messages, Mail, Books, iCloud Drive, and Other. You can’t do anything with the graph, but it will likely reveal the main culprits.

Clear-space-graph

Recommendations

Next, iOS shows recommendations for quick ways to recover space. These vary based on how you use your device, so you will likely see other options here.

Clear-space-recommendations

Some of the possibilities include:

  • Offload Unused Apps:This choice is particularly helpful if you download a lot of Clear-space-offloaded-iconapps that you later stop using. Enable it, and iOS automatically recovers space from unused apps when you’re low on storage. Each of these apps remains on your Home screen with a little cloud icon next to it, and when you next tap the app to open it, iOS re-downloads the app from the App Store. You won’t lose any documents, data, or settings associated with an offloaded app.
  • Review Downloaded Videos:Some apps, like Netflix, can download videos for offline watching. That’s great for when you’re on a long flight, but if you forget to delete the videos, they can consume a lot of space. This option shows them to you and lets you swipe left on any one to

Clear-space-remove-videos

  • Review Large Attachments:Photos, videos, and other files sent to you in Messages can take up a lot of space. This recommendation reveals them and lets you swipe left to delete those you don’t need to keep.
  • “Recently Deleted” Album:When you delete photos in the Photos app, they go into the Recently Deleted album, where they’ll be deleted automatically after up to 40 days. This recommendation lets you remove those images right away.
  • Review Personal Videos:Shooting videos with your iPhone or iPad can guzzle storage, so this recommendation shows you the videos you’ve taken in case you don’t want to keep them.

iOS’s recommendations are quite good and may be all you need to clear space quickly. However, if you need to dig deeper, you can look at the usage of individual apps.

Individual App Usage

The third and final section of the iPhone/iPad Storage screen lists every app on your device, sorted by how much space it takes up. Along with the app’s name and how much space it consumes, iOS helpfully tells you the last time you used the app. You may even see “Never Used” for older apps that you’ve carried over from previous devices but haven’t opened on this one.

When you tap an app, iOS shows more information about how much space the app and its documents occupy, and lets you tap Offload App or Delete App to recover its space. For some apps, mostly those from Apple, like Music and Podcasts, iOS also shows the data stored by the app and lets you delete any individual item (swipe left).

Clear-space-individual-apps

Focus on the apps at the top of the list—the list is sorted by size—since it will be a lot easier to realize, for instance, that you’ve never used GarageBand and recover its 1.59 GB of space than to sort through a long list of apps and their data.

With all these the tools from Apple, you should have no trouble making space on your device for more photos, videos, and apps that you actually want to use.

Advertisement

Gone Phishing: Five Signs That Identify Scam Email Messages

A significant danger to businesses today is phishing—the act of forging email to fool someone into revealing login credentials, credit card numbers, or other sensitive information. Of course, phishing is a problem for individuals too, but attackers more frequently target businesses for the same reason as bank robber Willie Sutton’s apocryphal quote about why he robbed banks: “Because that’s where the money is.”

The other reason that businesses are hit more often is that they have multiple points of entry—an attacker doesn’t need to go after a technically savvy CEO when they can get in by fooling a low-level employee in accounting. So company-wide training in identifying phishing attempts is absolutely essential.

Here are some tips you can share about how to identify fraudulent email messages. If you’d like us to put together a comprehensive training plan for your company’s employees, get in touch.

Beware of email asking you to reveal information, click a link, or sign a document

The number one thing to watch out for is any email that asks you to do something that could reveal personal information, expose your login credentials, get you to sign a document online, or open an attachment that could install malware. Anytime you receive such a message out of the blue, get suspicious.

attachment-phishing

If you think the message might be legitimate, confirm the request “out of band,” which means using another form of communication. For instance, if an email message asks you to log in to your bank account “for verification,” call the bank using a phone number you get from its Web site, not one that’s in the email message, and ask to speak to an account manager or someone in security.

Beware of email from a sender you’ve never heard of before

This is the email equivalent of “stranger danger.” If you don’t know the sender of an email that’s asking you do something out of the ordinary, treat it with suspicion (and don’t do whatever it’s asking!). Of course, that doesn’t mean you should be entirely paranoid—business involves contact with unknown people who might become customers or partners, after all—but people who are new to you shouldn’t be asking for anything unusual.

unknown-sender-phishing

Beware of email from large companies for whom you’re an anonymous customer

Attackers often forge email so it appears to come from a big company like Apple, Google, or PayPal. These companies are fully aware of the problem, and they never send email asking you to log in to your account, update your credit card information, or the like. (If a company did need you to do something along these lines, it would provide manual instructions so you could be sure you weren’t working on a forged Web site designed to steal your password.)

Apple-phishing

Since sample email from large companies is easy to come by, these phishing attacks can look a lot like legitimate email. Aside from the unusual call to action, though, they often aren’t quite right. If something seems off in an email from a big company, it probably is.

PayPal-phishing

Beware of email from a trusted source that asks for sensitive information

The most dangerous form of this sort of attack is spear phishing,where an attacker targets you personally. A spear phishing attack involves email forged to look like it’s from a trusted source—your boss, a co-worker, your bank, or a big customer. (The attacker might even have taken over the sender’s account.) The email then requests that you do something that reveals sensitive information or worse. In one famous spear-phishing incident, employees of networking firm Ubiquiti Networks were fooled into wiring $46.7 millionto accounts controlled by the attackers.

spear-phishing

Beware of email that has numerous spelling and grammar mistakes

Many phishing attacks come from overseas, and attackers from other countries seldom write English correctly. So no matter who a message purports to come from, or what it’s asking you to do, if its spelling, grammar, and capitalization are atrocious, it’s probably fraudulent. (This is yet another reason why it’s important to write carefully when sending important email—if you’re sloppy, the recipient might think the message is fake.)

spelling-phishing

One of the best ways to train employees about the dangers of phishing is with security awareness testing, which involves sending your own phishing messages to employees and seeing who, if anyone, falls for it. Again, if you need help doing this, let us know.