Apple released the beta version of iOS 17.3 to developers Tuesday, which includes a new "Stolen Device Protection" feature.

The feature, which beta users have to opt into, will require users to use either Touch ID or Face ID to access sensitive information such as iCloud keychain passwords and Apple Card access when away from home. It also implements a one-hour delay in addition to two biometric scans to access settings that would make the phone difficult to find.

The Wall Street Journal reported earlier this year on a rise in iPhone thefts where perpetrators spied on victim's phones, acquiring the passcode required to access sensitive portions of the phone, lock victims out of the Apple ecosystem and gain access to bank and email accounts.

"In the rare cases where a thief can observe the user entering the passcode and then steal the device, Stolen Device Protection adds a sophisticated new layer of protection," Apple said in a statement.

The beta also includes collaborative Apple Music playlists, according to Macrumors.

Stolen genes:23andMe hackers accessed data of 6.9 million users. How did it happen?

How to use Stolen Device Protection

Turning on Stolen Device Protection is simple, according to 9to5Mac.

  1. Opt into iOS 17.3 beta
  2. Open the Settings app
  3. Open FaceID & Passcode menu
  4. Toggle on Stolen Device Protection

How to create a strong password

While the increased security the Stolen Device Protection feature provides is welcome, creating strong passwords is key to protect information beyond the Apple ecosystem.

Passwords don’t need to be an overcomplicated string of numbers, letters and symbols that are impossible to memorize.

When creating a strong password, think of a phrase or a string of words that will be easy to remember. For example: Flowersgrowoutside

Then, add in some numbers and special characters. 

A password like Flow3rsgrow0uts!de% is trickier for a hacker, human or bot, to crack and gain access to your valuable information. 

If you don't want to memorize a plethora of passwords, one can use a digital password manager.

Contributing: Cody Goodwin

Disclaimer: The copyright of this article belongs to the original author. Reposting this article is solely for the purpose of information dissemination and does not constitute any investment advice. If there is any infringement, please contact us immediately. We will make corrections or deletions as necessary. Thank you.