📺 Stream EntrepreneurTV for Free 📺

The Celebrity-Hacking Scandal Is a Rude Wake-Up Call on Cloud Security As business owners, you have to take responsibility to protect your sensitive documents and photos.

By John Ackerly

entrepreneur daily

Opinions expressed by Entrepreneur contributors are their own.

The latest hack involving celebrities is much more than an embarrassing moment for a few superstars. It's a wake-up call for all of us.

Virtually everyone depends on the cloud to share sensitive information, but now we know that whether it's sensitive pictures or critical business plans, it's all potentially vulnerable.

While there are a million theories about how these images were obtained, including several focused on Apple's iCloud, it isn't clear where hackers got these pictures. Some suggest these images came from a ring of cybercriminals who brag online about "wins" from storage services such as iCloud and who offer to hack individual accounts for money. Read these threads and you'll realize that anything saved to your phone should be fit for public broadcast.

Related: Why the Naked Celeb Photo iCloud Hack Should Make You Nervous

Whatever happened to expose these pictures, the results are devastating. Everyone who uses a smartphone should now be wondering whether their data is safe. We're so used to the automatic convenience of sharing in the cloud we've completely lost track of security. With hindsight, these services should have included end-to-end encryption from the start. Two-factor authentication shouldn't be an option, it should be a requirement.

The risks of the cloud are nothing new -- Richard Stallman, a well-known open-source activist, has called cloud-storage services "a trap" numerous times, and comedian Louis C.K. warned against the dangers of handing over our photos to services such as iCloud back in 2012, on Jimmy Kimmel Live of all places.

We've all put these risks aside and made a collective compromise. We've opted for convenience over security when the professionals creating these services should have been building greater security into cloud services from the start.

Business professionals and entrepreneurs have a strong interest in security and privacy and we should demand end-to-end encryption and two-factor authentication for every service we depend on. Today, you should pause and assess your exposure to cloud-storage systems and answer the following questions for your own business:

1. How many people use an iPhone or an iOS device to conduct sensitive business transactions or share attachments for business?

2. When you take a picture of a whiteboard during a sensitive meeting about a secret project, do you know if your images are being automatically uploaded to Dropbox or iCloud?

3. When you receive an email with an attachment from a colleague at work do you know what happens to that attachment? Does it end up on Dropbox or iCloud if you open it on your phone?

Related: 8 of the Biggest Data Breaches Ever and How They Happened (Infographic)

4. How about backups? Do you backup the contents of your iPhone to iCloud? If so, do you know whether that backup contains all of your data, including images?

This week, none of us has a quick answer to the question, "Is your data safe?" Our mobile devices are leaky faucets for emails, images and attachments, and everything we do ends up generating a trail of data.

This scandal is a call to action for anyone who depends on the cloud. We practically live our lives on these mobile devices and we certainly conduct critical, sensitive business on smartphones every single day. Here are some concrete steps you can take to secure your business:

1. Understand what's in the cloud. When you share a document, send an email or take a picture on a phone, you and your employees may be inadvertently sending sensitive data to insecure servers. Know what's in the cloud.

2. Use end-to-end encryption for email. If you use Gmail or other cloud-based email services, you shouldn't assume that these companies are securing your information at rest. Use systems that encrypt information on your devices before it is sent to the cloud to become an inviting target for hackers.

3. Preserve the ability to take things back. If you send sensitive business documents to colleagues and partners, you need to have a strategy in place if they are compromised. You can take all security measures available to secure your information, but if email recipients are not as diligent, your information can still be compromised. Use services that secure information and give you the ability to track, control and revoke access.

So here's the wake-up call: As entrepreneurs and small-business people, you simply can't trust that service providers will always protect your sensitive information. It's time to take the necessary actions to protect yourself.

Related: Entrepreneurs Need to Get Serious About Security -- Now

John Ackerly

CEO and Co-founder of Virtru

John Ackerly is the CEO and co-founder of the digital privacy startup Virtru.  

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Editor's Pick

Fundraising

My Startup Couldn't Raise VC Funding, So We Became Profitable. Here's How We Did It — And How You Can Too.

Four months ago, my startup reached profitability for the first time. It came after more than a year of active work and planning, and here's what it took.

Starting a Business

Clinton Sparks Podcast: From Hit Records to Humanitarian Powerhouse, Akon Shares His Entrepreneurial Journey

This podcast is a fun, entertaining and informative show that will teach you how to succeed and achieve your goals with practical advice and actionable steps given through compelling stories and conversations with Clinton and his guests.

Business News

McDonald's Is Responding to Sky-High Fast Food Prices By Rolling Out a Much Cheaper Value Meal: Report

The news comes as the chain looks to redirect back to customer "affordability."

Starting a Business

Clinton Sparks Podcast: CEO of Complex Shares How Media, Culture Have Shifted in Recent Years

This podcast is a fun, entertaining and informative show that will teach you how to succeed and achieve your goals with practical advice and actionable steps given through compelling stories and conversations with Clinton and his guests.

Business News

Jack Dorsey Explains Bluesky Exit: 'Literally Repeating All the Mistakes We Made' at Twitter

Dorsey left the Bluesky board and deleted his account earlier this week.