Tuesday, September 2, 2014

In Light of Celebrity Hacks, How to Protect Data - ABC News


Associated Press


The theft of nude photographs from celebrities' online accounts has thrown a spotlight on the security of cloud computing, a system used by a growing number of Americans to store personal information over the Internet.


On Tuesday, Apple acknowledged the security breakdown and blamed it on intruders who were able to figure out usernames and passwords and bypass other safeguards. The company said it found no evidence of a widespread problem in its iCloud or Find my iPhone services. But the theft of the photos raises questions about the protection of data stored beyond a person's own computer or mobile device.


If celebrities' photos aren't safe, then whose are? Some key questions and answers about files that are stored remotely:


———


Q: What is the cloud?


A: The cloud is a way of storing photos, documents, email and other data on faraway machines. Amazon, Apple, Google and Microsoft all offer cloud-based storage. Smaller companies like Dropbox and Evernote do, too.


The practice saves space on computers, smartphones and tablets and allows users to access the same information from any device. And if you lose your phone, for example, you don't lose your vacation pictures. The drawback is that you are putting your information somewhere else, so you run the risk of a hacking attack on those systems and accounts.


Q: Is it secure?


A: For the most part, yes. Companies invest a lot to ensure that customers' private information stays private. "The short answer is the cloud is often more secure than other storage," says Rich Mogull, CEO of security research and advisory firm Securosis.


But that doesn't mean the system can't be compromised. "There are a lot of attackers who have a lot of time," Mogull says.


Q: How can individuals make their data more secure?


A: You need passwords to access your accounts, so choosing a strong one is important.


Tim Bajarin, an analyst at technology research firm Creative Strategies, recommends having different passwords for each online account you hold, so a breach in one system won't compromise another. It is also important to have a number and punctuation mark in each password or a creative spelling of a word to make it harder to guess. Also, avoid using common words or notable birthdays as passwords. A strong password is particularly important if you store sensitive information online.


Another way to make your information harder to hack is called multi-factor, or two-step, identification. That means the first time you log onto an account from a new device, you are asked for a second form of identification. Usually, that involves getting sent a code as a text on your phone or an email. A hacker who has your password would still need physical possession of your phone to get the text.


Most major cloud services, including Apple's iCloud, Google Drive and Dropbox, offer this kind of protection. Amazon's Cloud Drive is the notable exception. But you usually have to activate the extra layer of protection.


Apple is urging its users to switch to stronger passwords and to enable the two-step authentication feature in the aftermath of the celebrity hacking attacks.


Q: How can I tell if my phone or computer is uploading information to the cloud?


A: You had to have signed up and agreed to the cloud services' terms, but that might have happened long ago, as you were setting up your device. If you are not sure if you have opted in, check your phone's settings.









Source: Top Stories - Google News - http://ift.tt/W8ubHx

0 comments:

Post a Comment