iCloud Security Breach; Five Things You Need To Know About iCloud Security! What Are They?

Tags

Apples's iCloude service is hyped to let consumers to save their data on access and Cupertino servers, transfer the data between applications and devices. On the other hand, like any cloud app, iCloud users were confronted by the risks to privacy and data security. Lately, famous celebrities have been a victim when iCloud was hacked. What you need to know about iCloud?

1. No data visibility

Scott Chasin of McAfee said, "While the tagline for iCloud simply states, 'It just works', consumers and businesses alike need to remember that Apple has yet to publicly address security around iCloud, as it has with previous releases of the iOS platforms,[Users] may have to think twice before trusting iCloud with important data."

2. A password to rule everything

According to David Jacoby, senior security researcher of Nordics Global Research, "The only protection is the Apple ID and its password. If you can obtain that, you can import e-mail, pictures, calendar and possibly even more."

3. Convenient but unsecured data syncing

One of the advantages of iCloud is that users can sync their files from Apple to single data set, but this also seems that the data can be controlled from a device should it be stolen or lost. Chasin added, "The most important thing for users is to ensure they are aware that their data is being synced to iCloud," he said. "Where necessary, users can simply turn off iCloud syncing for documents, data backup and photos if they choose to."

4. Store corporate information, allowing iCloud to access

Firms that let their staff to have access to corporate data by their personal Apple devices should decide if they are at ease to use the iCloud.

5. User privacy at risk.

Health records and other confidential data of Apple users should be backed up and well encrypted by CoSoSys or Foeckl on their devices. Chasin added, "This way, when transferred into the iCloud, it will still be encrypted so even when it is accessed or stolen, it cannot be easily used," he said.

Join the Discussion

Latest News

Real Time Analytics