How to protect personal cloud security in cloud era data crisis outbreak

Source: Internet
Author: User
Keywords Cloud times cloud security cloud security
Tags access activate apple authentication change click cloud cloud era

"China Daily Entrepreneur" icloud is a typical representative of cloud services, providing photos, video synchronization, users can share synchronized data across multiple platforms. For example, when traveling, mobile phone photos, you can use the home printer output pictures, family can be in the computer, tablet computer, TV sync to watch photos, play video.

Cloud service brings great convenience to people's life and work, but it also brings information security problem. icloud is a typical cloud service representative that provides photos, video synchronization, and the user can share synchronized data across multiple platforms. For example, when traveling, mobile phone photos, you can use the home printer output pictures, family can be in the computer, tablet computer, TV sync to watch photos, play video. After Apple's icloud, other smartphone manufacturers also launched their own Cross-platform data sharing tools, such as millet cloud services, Baidu Network disk, Jinshan fast and so on. To enjoy the technological achievements and easy lives of the cloud era, you need to know how to protect your personal cloud security.

According to news reports that hackers cracked celebrities ' icloud accounts, many of Hollywood's female stars were leaked online, and many people were blaming Apple for their own security problems after the leaked photos of Apple's "Find My iphone" security leak.

The security breach, known as "Ibrute", was released in GitHub last Saturday. It leverages a security vulnerability on the "Find My iphone" Service Application Programming Interface (API). This vulnerability allows hackers to try passwords one after another until they find the correct password. Once the password is discovered, it can be used to access the user's icloud account.

Apple said in Monday it would code again, saying it was "actively investigating" whether the icloud accounts were hacked. The iphone and ipad makers rarely deal with the press, suggesting that it attaches great importance to the event.

While this is a terrible security loophole, the use of such a vulnerability relies on the use of bad passwords by ordinary account holders. The password attempt to automate using this vulnerability only uses a list of 500 commonly used passwords. So, if you want to protect your private photos or the security of your company's industry secrets, you must start using passwords that are not "password" or "123456". So you need to set a can remember and cumbersome irregular password, more secure.

But for websites and services that really care about securing data, dual authentication can be the most powerful tool for ordinary users to block unauthorized users from accessing their data. In this way, even if someone has your password, they have to access the device in your hand, such as a cell phone, to change the password. Typically, the dual authentication system sends you an email or text message, or calls you to enter the resulting code to modify the password.

Here's how to turn on dual authentication in the most popular personal cloud storage service:

Apple's icloud

Log in to your AppleID.

Select Manage your AppleID and login

Select Password and security

In two-step authentication, select QuickStart, and then follow the instructions.

Note: Please note that when you change your AppleID for double authentication, this is a one-way process. You can only change your password in a double authentication way later.

Dropbox

Log on to the Dropbox.

Click your name in the top right corner of any page to open your account menu.

Click "Settings" in the Account menu and select the "Security" tab.

Select Enable in the two-step authentication area.

Click "Start using" and follow the instructions.

Note: You will need to re-enter the password to activate dual authentication. Once you activate the certification, you have the option to accept the security code via SMS or mobile apps.

Google's Drive

Log in to Google from this link.

Enter your cell phone number.

Enter the security code you obtained via SMS or voice phone.

Follow the instructions.

Note: You need to get a new code for a computer or device that uses any Google service. For certain services, such as Gmail, you will also need to set the application-specific password if you want to access it on an Apple device or through an e-mail client or some Instant messaging client.

Microsoft's OneDrive

Log in to your Microsoft account.

Go to security and password.

In Password and security information, click or click Edit Security information.

In "Two-Step Authentication", click or click "Set Two Step Authentication".

Click Next, and then follow the instructions.

Note: Microsoft may send you the authentication code by phone or email before you activate the two-step authentication, and require you to enter this authentication code before activating the two-step authentication.

Double authentication cannot protect you if your photos or data have been compromised, but doing so will help prevent such attacks in the future.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.