Collaborate with Colleagues in Google Docs.

Collaboration is what all the cool kids—well, all the competitive businesses—are doing these days because it’s efficient and effective. See “Stop Mailing Files Around and Use Collaborative Apps” and for users of Apple’s iWork, “Collaborate with Colleagues in Pages, Numbers, and Keynote.” Today we’re going to look at collaborating using Google’s Web-based productivity suite, Google Docs, which businesses can use for free or as part of a G Suitesubscription.

The Google Docs suite competes with Apple’s iWork and Microsoft’s Office 365, providing Google Docsfor word processing, Google Sheetsfor spreadsheet work, and Google Slidesfor presentations. You can manage all your files in Google Drive. Although all are Web-based and work best on a Mac or other desktop computer, Google also makes iOS apps that let you work—a bit less flexibly—on an iPad or iPhone.

You’ll need a free Google account to create new documents, and for full-fledged collaboration, your colleagues will need Google accounts too. You can share documents with people who lack Google accounts or don’t want to sign in, but their comments and changes will be anonymous.

Invite Collaborators

Once your document is ready to share, you can invite collaborators by clicking the large Share button in the upper-right corner of the window.

Flexible permissions let you share with specific people, and for each person, set whether they can edit, comment on, or just view the document (below left). You can also add a note that will be sent with the invitation.

Share-dialogs

If that’s too specific—you’re sharing with a large group, for instance—click Get Shareable Link to turn on link sharing (above right). Then you can set the permissions for the link by clicking the down-pointing arrow next to “Anyone with the link can…” This works well for things like self-service signup spreadsheets. Copy the link and send it however you like, such as via Messages or to a mailing list.

If you add people over time, you can see who has access by clicking Advanced. That view also provides more owner controls, including the option to prevent commenters and viewers from downloading, printing, or copying.

When you’re done, click Send or Done.

Accept an Invitation

People you invite receive an email invitation and click the Open In button to start working on the document. With link sharing, all the recipient has to do is click the link.

Accept-Google-invite

The main gotcha is that recipients must sign in to their Google accounts if sharing has been restricted to specific people. A less common problem can occur when you send an invitation to someone at an email address that doesn’t match their Google account, which prevents them from collaborating. They can then request that you share the document with their Google account; click the Open Sharing Settings button in the request email to grant access.

Request-access-email

Add and Change Data

Apart from the permissions that restrict collaborators to commenting or viewing, there are no limitations on what people can do in a shared document—all editors are equal, and Google Docs works the same whether a document has one person using it or ten.

You can see who is in the document by the little avatar icons in the menu bar. It also tells you when the last edit was, and Google Docs always shows where other users are working with a color-coded cursor and marks when other users have selected content in the document with a colored highlight box.

Using-Google-Slides

Add Comments

The beauty of comments in a collaborative scenario is that discussions can occur in context. To add a comment, select some text and choose Insert > Comment. Comments show up in the right-hand sidebar in Google Docs and Google Slides; in Google Sheets, the cell containing a comment gets a little yellow triangle in the corner, and the comment appears when you click the cell.

Google-Docs-comments

Google pioneered comment conversations, which allow collaborators to reply to each others’ comments and keep the discussion connected to the initial comment. You can edit or delete your own comments by clicking the stacked three-dot More menu. Do that for someone else’s comment and you can get a link to the comment—it’s useful if you need to point someone to the discussion.

To see all the comments in a stream, click the Comment History button in the menu bar, which looks like a speech balloon. It’s especially useful when reviewing comments in Sheets, where you would otherwise have to click all the little yellow triangles in cells.

Google-Docs-comment-stream

View Versions and Suggested Changes

The main way to see who has done what in a document is by choosing File > Version History > See Version History. That displays a right-hand sidebar showing dates when the file was changed; click an entry to see the changes in the main pane. Arrows above the main pane let you highlight each change in turn. If you want to revert to the selected version (which will delete all subsequent changes!), click Restore This Version.

Version-history

For Google Sheets and Google Slides, version history is all that’s available, which can be frustrating because when you’re reviewing edits in version history, you can’t make changes. As a workaround, open a second browser window so you can review changes in one window and make edits in another.

Google Docs (the word processor, in this case) offers another choice: Suggesting mode, which works more like Track Changes in Page or Word. Switch into it by clicking the pencil icon in the upper-right corner and choosing Suggesting. From then on, all edits are non-destructive and are color-coded by the person who makes them. They’re coupled with boxes in the right-hand sidebar that detail the change, provide ✔ and X icons for accepting or rejecting the change, and offer a Reply field that enables discussions of each change—a brilliant feature.

Suggesting-mode

If you want to be guided through all the suggested edits, or accept or reject changes all at once, rather than handling them one at a time in the right-hand sidebar, choose Tools > Review Suggested Changes.

Review-Suggested-Edits

When you’re done collaborating on a document, you can click the Share button and remove people or turn off link sharing. That immediately prevents others from making more changes.

When choosing a collaboration platform, you’ll generally pick what your colleagues use, whether that’s Google Docs, iWork, or Office 365. However, if you’re sharing with people whose platform and app details you don’t know, Google Docs is the best choice—Google accounts are common and the Google Docs apps work equally well on all computers. Plus, since Google Docs was built from the ground up for collaboration, it’s a mature solution that’s quick, easy, and effective.

 

Apple Updates iPad Lineup with new iPad mini and iPad Air

iPad mini lovers, rejoice! If you’ve been holding onto an aging iPad mini because of its small size, you’ll be happy to learn that Apple has at long last released a new 7.9-inch iPad mini with modern-day technologies. Joining it in the lineup is a new 10.5-inch iPad Air that turns out to be a retooled iPad Pro for a lot less money.

iPad mini Gains A12 Bionic Chip and Apple Pencil Support

iPad-mini-Apple-Pencil

It has been hard to recommend the iPad mini 4—last updated in September 2015—for several years now because its hardware was increasingly long in the tooth, and Apple hadn’t seemed enthused about updating it.

That has all changed with the fifth-generation iPad mini, which boasts the same speedy A12 Bionic chip that powers today’s iPhone XR, XS, and XS Max. It provides over three times the performance as the iPad mini 4’s A8 chip and graphics that are nine times faster. The other huge change is that the iPad mini now lets you use the $99 Apple Pencilfor drawing, taking notes, and more. Note that the iPad mini supports only with the first-generation Apple Pencil, not the second-generation model that’s specific to last year’s iPad Pro models.

Other welcome, but less notable, changes include a screen that is 25% brighter, displays more colors, and supports Apple’s True Tone technology for matching the color temperature of the screen to the light in your surroundings. The Wi-Fi + Cellular model of the iPad mini also now supports faster gigabit-class LTE connections and the improved Bluetooth 5.0.

The basic specs of the rear-facing camera on the new iPad mini haven’t changed—it’s still an 8-megapixel camera—but it likely takes better photos and videos thanks to the A12 Bionic chip’s computational photography capabilities. Plus, the front-facing FaceTime HD camera can now capture 1080p video at 30 frames per second for better FaceTime calls.

You can order the iPad mini now in silver, space gray, and gold. For 64 GB of storage, a Wi-Fi–only model costs $399, whereas a 256 GB model is $549. Adding cellular connectivity bumps the prices to $529 and $679.

iPad Air Lowers the 10.5-inch iPad Pro Price with a Less-Capable Camera

iPad-Air-Apple-Pencil

Despite its name, the new 10.5-inch iPad Airhas far more in common with the now-discontinued 10.5-inch iPad Pro from 2017 than it does with the 9.7-inch iPad Air 2 from 2014.

Apple has clearly taken the iPad Pro and modernized it with the current A12 Bionic chip, gigabit-class LTE, eSIM, and Bluetooth 5.0. But to cut $150 from the iPad Pro’s $649 starting price, Apple replaced the iPad Pro’s rear-facing camera with a less-capable model and traded the quad speaker system for stereo speakers. That’s not to say that the iPad Air’s rear-facing camera is a problem—it’s the same 8-megapixel camera as in the iPad mini—it’s just not at the level of the 12-megapixel camera that was in the 10.5-inch iPad Pro.

Like the old iPad Pro, the iPad Air supports the first-generation Apple Penciland the original $159 Smart Keyboard(again, not the Smart Keyboard Folio for the 2018 iPad Pro models).

As with the iPad mini, Apple offers only two tiers of storage, 64 GB for $499 and 256 GB for $649, and the cellular option increases the pricing to $629 and $779. The color choices are again silver, space gray, and gold.

Other iPads

Apple’s slate of iPads makes a lot of sense now, with this new fifth-generation iPad mini and third-generation iPad Air joining the sixth-generation iPad and the 11-inch iPad Pro and third-generation 12.9-inch iPad Pro.

If you want small, get an iPad mini. If you want cheap, buy the iPad. If you’re looking for a bigger screen or Apple keyboard (the Smart Keyboard is excellent), go for the iPad Air. And if you have the budget, the 11-inch and 12.9-inch iPad Pro models are fabulous. Apple has a helpful online comparison tool, or feel free to ask us what we’d recommend for you.

Need to Clear Space on an iPhone or iPad? Here’s How to Do It in iOS 12

Little is more frustrating than running out of space your iPhone or iPad. You can’t take new photos, you can’t download new apps, some things may not work at all, and iOS will nag you repeatedly about how you can “manage” your storage in Settings. Luckily, over the past few versions of iOS, Apple has significantly improved the options for clearing unnecessary data from your device.

Clear-space-warning-dialog

Storage Graph

To get started clearing space, go to Settings > iPhone/iPad Storage. At the top of the screen, a graph reveals where your space is going, such as Apps, Photos, Media, Messages, Mail, Books, iCloud Drive, and Other. You can’t do anything with the graph, but it will likely reveal the main culprits.

Clear-space-graph

Recommendations

Next, iOS shows recommendations for quick ways to recover space. These vary based on how you use your device, so you will likely see other options here.

Clear-space-recommendations

Some of the possibilities include:

  • Offload Unused Apps:This choice is particularly helpful if you download a lot of Clear-space-offloaded-iconapps that you later stop using. Enable it, and iOS automatically recovers space from unused apps when you’re low on storage. Each of these apps remains on your Home screen with a little cloud icon next to it, and when you next tap the app to open it, iOS re-downloads the app from the App Store. You won’t lose any documents, data, or settings associated with an offloaded app.
  • Review Downloaded Videos:Some apps, like Netflix, can download videos for offline watching. That’s great for when you’re on a long flight, but if you forget to delete the videos, they can consume a lot of space. This option shows them to you and lets you swipe left on any one to

Clear-space-remove-videos

  • Review Large Attachments:Photos, videos, and other files sent to you in Messages can take up a lot of space. This recommendation reveals them and lets you swipe left to delete those you don’t need to keep.
  • “Recently Deleted” Album:When you delete photos in the Photos app, they go into the Recently Deleted album, where they’ll be deleted automatically after up to 40 days. This recommendation lets you remove those images right away.
  • Review Personal Videos:Shooting videos with your iPhone or iPad can guzzle storage, so this recommendation shows you the videos you’ve taken in case you don’t want to keep them.

iOS’s recommendations are quite good and may be all you need to clear space quickly. However, if you need to dig deeper, you can look at the usage of individual apps.

Individual App Usage

The third and final section of the iPhone/iPad Storage screen lists every app on your device, sorted by how much space it takes up. Along with the app’s name and how much space it consumes, iOS helpfully tells you the last time you used the app. You may even see “Never Used” for older apps that you’ve carried over from previous devices but haven’t opened on this one.

When you tap an app, iOS shows more information about how much space the app and its documents occupy, and lets you tap Offload App or Delete App to recover its space. For some apps, mostly those from Apple, like Music and Podcasts, iOS also shows the data stored by the app and lets you delete any individual item (swipe left).

Clear-space-individual-apps

Focus on the apps at the top of the list—the list is sorted by size—since it will be a lot easier to realize, for instance, that you’ve never used GarageBand and recover its 1.59 GB of space than to sort through a long list of apps and their data.

With all these the tools from Apple, you should have no trouble making space on your device for more photos, videos, and apps that you actually want to use.

MacTLC: Tip of the week

Apple Music Can Be Your Personal DJ

If you’re an Apple Music subscriber, you probably know that it can play music that’s related to a particular artist or track—just tell Siri, “Play a radio station based on the Beatles” to get a bunch of songs from the likes of the Rolling Stones, Simon & Garfunkel, and Elton John. That radio station will show up in the Radio screen in the iOS Music app and in iTunes on the Mac. But you may not have realized that Apple Music can create a special radio station just for you, based on tracks you’ve played before, added to your library, or “loved.” To create it, just tell Siri, “Play my radio station.” Once made, it shows up with all the other radio stations, with your name underneath—it may not appear immediately. This can be a great way to get a selection of songs you’re almost certain to like, and the more you use Apple Music, the more it should adjust to your listening habits.

Apple-Music-Personal-Radio-screenshot

Gone Phishing: Five Signs That Identify Scam Email Messages

A significant danger to businesses today is phishing—the act of forging email to fool someone into revealing login credentials, credit card numbers, or other sensitive information. Of course, phishing is a problem for individuals too, but attackers more frequently target businesses for the same reason as bank robber Willie Sutton’s apocryphal quote about why he robbed banks: “Because that’s where the money is.”

The other reason that businesses are hit more often is that they have multiple points of entry—an attacker doesn’t need to go after a technically savvy CEO when they can get in by fooling a low-level employee in accounting. So company-wide training in identifying phishing attempts is absolutely essential.

Here are some tips you can share about how to identify fraudulent email messages. If you’d like us to put together a comprehensive training plan for your company’s employees, get in touch.

Beware of email asking you to reveal information, click a link, or sign a document

The number one thing to watch out for is any email that asks you to do something that could reveal personal information, expose your login credentials, get you to sign a document online, or open an attachment that could install malware. Anytime you receive such a message out of the blue, get suspicious.

attachment-phishing

If you think the message might be legitimate, confirm the request “out of band,” which means using another form of communication. For instance, if an email message asks you to log in to your bank account “for verification,” call the bank using a phone number you get from its Web site, not one that’s in the email message, and ask to speak to an account manager or someone in security.

Beware of email from a sender you’ve never heard of before

This is the email equivalent of “stranger danger.” If you don’t know the sender of an email that’s asking you do something out of the ordinary, treat it with suspicion (and don’t do whatever it’s asking!). Of course, that doesn’t mean you should be entirely paranoid—business involves contact with unknown people who might become customers or partners, after all—but people who are new to you shouldn’t be asking for anything unusual.

unknown-sender-phishing

Beware of email from large companies for whom you’re an anonymous customer

Attackers often forge email so it appears to come from a big company like Apple, Google, or PayPal. These companies are fully aware of the problem, and they never send email asking you to log in to your account, update your credit card information, or the like. (If a company did need you to do something along these lines, it would provide manual instructions so you could be sure you weren’t working on a forged Web site designed to steal your password.)

Apple-phishing

Since sample email from large companies is easy to come by, these phishing attacks can look a lot like legitimate email. Aside from the unusual call to action, though, they often aren’t quite right. If something seems off in an email from a big company, it probably is.

PayPal-phishing

Beware of email from a trusted source that asks for sensitive information

The most dangerous form of this sort of attack is spear phishing,where an attacker targets you personally. A spear phishing attack involves email forged to look like it’s from a trusted source—your boss, a co-worker, your bank, or a big customer. (The attacker might even have taken over the sender’s account.) The email then requests that you do something that reveals sensitive information or worse. In one famous spear-phishing incident, employees of networking firm Ubiquiti Networks were fooled into wiring $46.7 millionto accounts controlled by the attackers.

spear-phishing

Beware of email that has numerous spelling and grammar mistakes

Many phishing attacks come from overseas, and attackers from other countries seldom write English correctly. So no matter who a message purports to come from, or what it’s asking you to do, if its spelling, grammar, and capitalization are atrocious, it’s probably fraudulent. (This is yet another reason why it’s important to write carefully when sending important email—if you’re sloppy, the recipient might think the message is fake.)

spelling-phishing

One of the best ways to train employees about the dangers of phishing is with security awareness testing, which involves sending your own phishing messages to employees and seeing who, if anyone, falls for it. Again, if you need help doing this, let us know.

MacTLC: Tip of the week

iCloud Services Being Wonky? Check Apple’s System Status Page

Many Apple users rely on mac.com, me.com, or icloud.com email addresses, along with plenty of other iCloud-related services. So if you can’t send or receive email, if photos aren’t transferring via iCloud Photo Library, or if some other iCloud-related service isn’t responding, the first thing to do is check Apple’s System Status page. It’s updated every minute, and if it shows that the associated Apple service is having problems, you know to sit tight until things come back up. If everything is green, you’ll have to look elsewhere for a solution—or get in touch with us.

Apple-System-Status-page

 

What Is a “Managed IT Services” Model and Why Is It Important for Your Business?

You’ve chosen Apple devices to run your business. That’s great, but are you still dealing with each of those devices individually? If you hire a new employee, do you go to the Apple Store to buy a new Mac, bring it back to the office, spend a few hours installing the right software, and then sit down with the employee to get them started with email accounts and other logins?

That self-support approach can work when your company has only a few users, but as your business grows, how much of your time can you afford to spend on IT? You might enjoy it, but it distracts you from what you need to do to make your company thrive. Sure, you might think you’re saving money by doing this work yourself instead of hiring an IT professional, but that amount may pale in comparison to the amount you could make in your primary role. There’s a better way: managed IT services with device-management software.

In essence, with managed IT services, we become part of your team, creating systems that simplify and speed up the process of onboarding new devices, monitoring their usage, ensuring their security, and providing ongoing support. Here are some of the ways managed services can help your business.

Faster and More Accurate Setup

With managed IT services and properly configured device-management software, you can order a Mac or iOS device from Apple (through an Apple Business Manager account) and when it arrives, your employee can take it out of the box, log in, and have the entire device automatically configured over the network with required apps, server settings, security policies, and more.

If you’ve spent several hours configuring devices manually, it’s magical to watch a device pick up apps and settings automatically. And it’s not just for new devices. If an employee leaves or you need to repurpose a Mac or iOS device, device-management software can automatically wipe it and set it up for its new role with minimal effort.

Increased Security

An important aspect of switching to a managed IT services model that relies on device-management software is requiring security policies. If you’ve ever worried about an employee losing a company device containing confidential data, device-management software can eliminate those concerns by automatically enabling FileVault for Macs or enforcing non-trivial passcodes on iOS devices. Lost devices can even be locked or wiped remotely from a central management console.

Also, device-management software can restrict what apps users may install, so you don’t have to worry about apps that could leak confidential information or malware that could be stealing passwords.

Proactive Monitoring

A managed IT services support model lets your users focus on their work, rather than on their Macs. Monitoring software can report if Mac hard drives start to fail, when laptop batteries start to go, if RAM is faulty, and more. It’s better to know that a drive is dying beforeyou lose data.

Watchman-Report

Monitoring software can also check on important events, making sure that backups are happening regularly, warning if a user has downloaded a potentially problematic operating system update, and making sure anti-malware software is up to date.

Proactive Maintenance

Monitoring helps identify issues early on, but perhaps the most important aspect of a managed IT services solution is how it combines proactive monitoring with proactive maintenance. It uses software and services that go beyond identifying problems to fixing them—blocking undesirable software upgrades, automatically deploying essential security updates, and removing malware—before they impact your workflow. This saves your users downtime and frustration, and lets you focus on your work rather than troubleshooting problems.

Improved Reporting

It may not be difficult to keep track of a handful of Macs and iPhones, but as your business grows, inventory can become daunting. A managed IT services solution helps you know exactly what devices you have, who is using them, and more. It can also report on installed software to make sure you’re in compliance with your software licenses.

Jamf-dashboard

Predictable Pricing

If your company pays for support on an hourly billing model, there’s no way to budget accurately for expenses, since no one can predict what will go wrong. Plus, it takes longer to investigate and resolve problems because of the time necessary to figure out the status of the device in question. Solving complex or recurring problems can get expensive in such a scenario.

With managed IT services, we instead charge a flat monthly fee based on how many devices you have. Thanks to proactive monitoring and device management, we can fix many problems before the user even notices. And if a user does need in-person support, it’s faster and easier to help them when we know exactly what device they’re using, what version of the operating system it’s using, what software they have installed, and more.

A managed IT services model isn’t for every situation, but if your business has more than a handful of Macs, iPhones, and iPads in use by your employees, it could reduce downtime, save you money, and increase security.

 

MacTLC: Tip of the week

Ignore Unsolicited Calls and Texts from Apple and Other Tech Companies

We don’t want to belabor the point, but multinational tech companies like Apple, Facebook, and Google will nevercall or text you personally out of the blue. So if you get a call or text purporting to be from such a company, it’s 99.9% likely to be a scam, and you should ignore it regardless of whether the caller ID seems legitimate. If you’re still worried, look up the company’s tech support phone number separately—never respond directly to such a call or tap a link in a text—and discuss the situation with the support reps. Or contact us, and we’ll talk it through with you.

Apple-text-scam

 

Winter Weather Warning: Keep Your Tech Toasty!

When it’s cold out, you can always throw on a sweater to stay warm. But your electronics are more reptilian—they can get sluggish or even fail to work in freezing weather. (No, that’s not what iPod Socks were designed to fix.) Worse, charging batteries at low temperatures or moving tech gear between extreme temperature ranges can cause damage.

There’s a difference between temperatures your devices can withstand when you’re actively using them and when they’re just being stored. Manufacturers usually publish the environmental requirements for devices, though it may take a little searching to find the details. Here are the ranges for the devices you’re most likely to care about:

  • iPhone/iPad: Operating temperatures from 32° to 95° F (0° to 35° C) and nonoperating temperatures from −4° to 113° F (−20° to 45° C)
  • MacBook (Air/Pro): Operating temperatures from 50° to 95° F (10° to 35° C) and storage temperatures from −13° to 113° F (−25° to 45° C)

 

It’s easy to imagine wanting to use an iPhone in temperatures below freezing or a MacBook outdoors on a crisp autumn day. And in fact, they probably won’t stop working entirely. After all, putting your iPhone in your pocket next to your body will keep it warmer than the outside air, and it will take a while to cool down. But you shouldn’t be surprised by crashes, shutdowns, or other unusual behavior if you do use your device below its recommended operating temperature for a while.

Batteries Hate Working in the Cold

The main problem is that batteries prefer to be used in moderate temperatures (they hate heat even more than cold). When batteries get cold, they appear to discharge more quickly. That’s because the chemical reactions that generate electricity proceed more slowly at lower temperatures, and thus produce less current. The weak discharge fools the device’s power management circuitry into thinking that the battery is nearly dead; hence the shutdowns. Once your device has had a chance to warm up, the battery should revive.

However, don’t charge batteries when it’s very cold, as in −4° F (−20° C). Doing so can cause plating of the graphite anode in the battery, which will reduce battery performance.

Other Technologies That Dislike Cold

Two other standard bits of technology don’t like operating in the cold either: hard drives and LCD screens.

Hard drives aren’t nearly as common as they used to be, particularly in laptops that are likely to be left outside in cold cars. Most have a minimum operating temperature of 32° F (0° C), and you’re unlikely to want to use a laptop in temperatures lower than that. In very cold temperatures, the lubricant inside the drive can become too viscous to allow the motor to spin up the platters. Although solid-state drives have no moving parts, most are rated for the same minimum operating temperature, oddly enough.

LCD screens can also have problems. Extreme cold can slow their response times, leading to slow or jerky screen drawing. OLED displays, such as in the iPhone X, XS, and XS Max, withstand cold significantly better—some OLED displays are rated for temperatures as low as −40º (which—trivia tip!—is the same in Fahrenheit and Celsius).

Avoid Temperature Swings

Regardless of whether you want to use your devices in cold weather, you’ll extend their lifespans if you don’t regularly expose them to significant temperature swings. There are two reasons for this: condensation and thermal expansion.

Those who wear glasses know that when you come into a warm house from the cold, your glasses immediately fog up with condensation. That’s true even though most houses are quite dry in the winter. Wait a few minutes and the condensation evaporates back into the air. The same can happen with any electronic device that’s open to the air, and moisture inside electronics is never good. It’s thus best to let electronics warm up slowly (and in their cases or boxes) to reduce the impact of condensation.

Finally, as you remember from high school science, objects expand when heated and contract when cooled. The amount they expand and contract may be very small, but the tolerances inside electronics are often extremely tight, and even the tiniest changes can cause mechanical failures, particularly with repeated cycles of expanding and contracting. Try to avoid subjecting devices to significant temperature swings on a regular basis or you may find yourself replacing them more frequently than you’d like.

In the end, our advice is to keep your gear warm whenever possible, and if you must use it in temperatures below freezing, be aware that battery life and screen responsiveness may be reduced.

MacTLC: Tip of the week

Apple Has Disabled Group FaceTime to Prevent Pre-call Eavesdropping

A serious bug has been discovered in Apple’s Group FaceTime multi-person video chat technology. It allows someone to call you via FaceTime and then, with just a few simple steps, listen in on audio from your iPhone, iPad, or Mac while the call is ringing, before you have accepted or rejected it. To prevent the problem from being exploited, Apple says it has disabled Group FaceTime and promises a fix “later this week.”

In the meantime, if you’re still concerned (there were some reports of people being able to invoke the bug even after Apple disabled Group FaceTime), we recommend turning off FaceTime entirely in Settings > FaceTime in iOS and by launching the FaceTime app in macOS and then choosing FaceTime > Turn FaceTime Off. (Or just be quiet when a FaceTime call comes in.) Apple may be able to fix the problem without requiring users to update software; if iOS and macOS updates do prove to be necessary, we recommend that you install them sooner rather than later.