Protect Your Assets
Showing results for 
Search instead for 
Do you mean 

How Safe is Your Data in the Cloud?

KariH_1 ‎07-11-2014 07:40 AM - edited ‎09-28-2015 10:12 AM

"Team DoulCi," a Dutch-Moroccan team of hackers, recently claimed to have compromised a protective feature on Apple's iCloud system that could leverage an attacker to remove security measures on lost or stolen iPhone devices. In a technically dependent and mobile world, the impact of this type of breach is mind-boggling! The volume of data is growing exponentially and the need to access it and securely store it is essential--application security has never been more important.


hp-a-cloudsecurity.jpgApple encourages its customers to sync their data to iCloud. Google's entire operating system is cloud-based. Windows 8, the most cloud-centric operating system to date, will hit desktops by the millions in the coming year. So with cloud storage becoming the wave of the future, how real of a threat do we face?


iCloud storage allows users to keep and store large amounts of personal data in the cloud, but it can also expose data to security risks, including viruses and wi-fi vulnerabilities, ultimately resulting in data theft. Passwords are often insecure, as iCloud does enforce the use of a strong password policy, and the optional use of two-factor authentication does not include device-to-storage syncing.


Let's expand our minds beyond iCloud storage—just how safe is safe? With all of the news stories about hacking credit cards and identify theft, it doesn’t take long before concern turns to obsession, and before you know it, we are putting retinal scanners on mobile devices. Just imagine yourself in the coffee shop BYOD-devices-623x424.pngor grocery store as you try to scan your eyeball. Don't chuckle, its coming! I suggest instead, that we all take reasonable precautions: Mobile Application Security!  For example, individuals need to become more educated about the mobile apps they download and the security permissions they require! Companies that encourage a BYOD policy should consider making use of mobile-testing solutions for better visibility into the risk mobile devices and their apps present.


In the end, I strongly believe that the movement towards stricter and more consistently applied security controls for all mobile devices, mobile apps and their storage solutions would greatly improve the overall security of mobile data; therefore, making storage offerings like iCloud much safer for your data. What do you think?



1 Khandelwal, Swati "Apple iCloud and Activation Lock Hacked; Allows Hackers to Unlock Stolen Devices" DDOS Attack Trends Report The Hacker News, May 21, 2014.


About the Author


I have a passion for security and endeavor to participate in strong security defenses.

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
January 2016
Software Expert Days - 2016
Join us online to talk directly with our Software experts during the online Expert Days - see details below. Software experts do not monitor this foru...
Read more
See board event postings
Vivit Events - 2016
Learn about upcoming Vivit webinars and live events in 2016.
Read more
View all