Is It Safe for You to Use the Cloud After Celebrity Hack?

Justin Sullivan—Getty Images

Use Two-Step Authentication

Two-step authentication requires you to answer two questions before you can access an account. Typically, one question requires you to recall a password and another requires you to look at a text message or email and enter an authentication code. The process is a huge deterrent for hackers who may use one of many sophisticated methods to guess a password but have no way to access your phone to tap in an authentication code. A number of services offer two-step authentication, including the iCloud, Gmail and many banks. For most services you have to opt in.

Check the Cloud, Not Just Your Device

After hearing that her photos had made their way to the Internet, Scott Pilgrim star Mary E. Winstead said she had deleted the photos in question “long ago.” But deleting photos from your phone doesn’t mean that they’re deleted from the cloud. In fact, the cloud exists to back up everything you do and create on a device. If there’s something you never want anyone to see, delete it everywhere!





You may also like

Comments

More in Black Listed