How to Protect Your Apple iCloud Account

Is It Safe for You to Use the Cloud After Celebrity Hack?

Justin Sullivan—Getty Images

Use Two-Step Authentication

Two-step authentication requires you to answer two questions before you can access an account. Typically, one question requires you to recall a password and another requires you to look at a text message or email and enter an authentication code. The process is a huge deterrent for hackers who may use one of many sophisticated methods to guess a password but have no way to access your phone to tap in an authentication code. A number of services offer two-step authentication, including the iCloud, Gmail and many banks. For most services you have to opt in.

Check the Cloud, Not Just Your Device

After hearing that her photos had made their way to the Internet, Scott Pilgrim star Mary E. Winstead said she had deleted the photos in question “long ago.” But deleting photos from your phone doesn’t mean that they’re deleted from the cloud. In fact, the cloud exists to back up everything you do and create on a device. If there’s something you never want anyone to see, delete it everywhere!

Newsletter

Sign up for the EBONY Newsletter

By subscribing, you agree to share your email address with EBONY to receive our weekly emails, events, and other updates. Please see our privacy policy for more information.

By subscribing, you agree to share your email address with EBONY to receive our weekly emails, events, and other updates. Please see our privacy policy for more information.

Newsletter

Sign up for the EBONY Newsletter

When you sign up for the EBONY newsletter, you’ll be the first to know about all the latest news and updates that are important to you. Gain access to exclusive interviews, videos, special events, and product giveaways delivered right to your inbox!

By subscribing, you agree to share your email address with EBONY to receive our weekly emails, events, and other updates. Please see our privacy policy for more information.