Skip to main content
ADOA-ASET Logo
  • Home
  • About
    • Careers
    • Leadership Team
    • Statutes and Rules
    • Meeting Requests
  • Services
    • Current Rates
  • Strategy
    • ACT Recommendations
    • Digital Government
    • Enterprise Architecture
    • Enterprise Project Management Office
    • Strategic Oversight
    • Statewide Strategic IT Plans
  • Governance
    • IT Authorization Committee (ITAC)
    • Chief Information Officer (CIO) Council
    • Change Advisory Board (CAB)
    • Enterprise Security Program Advisory Council (ESPAC)
  • Programs
    • AZNET II - Arizona Network
    • Archived Programs
  • Resources
    • ASET Billing
    • Glossary
    • Policies, Standards and Procedures
    • Security
      • Incident Reporting
    • Service Desk
    • Training
    • Agency Engagement Manager List
  • Home
  • Resources
  • Security

Security

Primary tabs

  • Best Practices
  • Awareness
  • Privacy(active tab)
  • Forms
  • News
The word "encryption" is spelled out with letters cut from newspaper print

Shonky = dubious, unreliable 

 

Right now the public is more skeptical about the privacy claims of businesses than ever before. However, that could change if more tech providers engineer their systems to adequately protect the data, security and privacy of their customers. 

Apple is taking what may appear to its user base as an important step in this regard (good timing given the recent negative PR from its iCloud hack of celebrity photos). The tech giant says its new encryption will no longer allow it to bypass a customer's passcode to access data. This data includes that contained in text messages, emails, photographs and more. 

Interestingly, CNN reported this encryption not only prevents creeps and crooks from accessing the data from iOS-powered devices; it also makes it difficult for anyone else, including law enforcement, to do the same. 

However, there is at least one way police will work around this roadblock. Just as the celebrity-photo hacker gained his entry to sensitive photos through the iCloud, detectives and other government officials are likely to emulate this method. Apple has said it will comply with warrants to turn over information hosted on its servers, which is essentially what iCloud is - an collection of Apple-owned and operated servers. 

In another move, Apple has said it is now working with two-step verification to ensure proper authentication of its users' identity. Two-step verification is good, and long over-due. Anyone with information security expertise can tell you that such verification has been recommended for decades. My own personal thoughts? Welcome to the cybersecurity club, Apple, we've been waiting on you for a VERY long time. 

All mobile (and now wearable) device users should check to see if their devices are automatically backing up information to a cloud-based server. Often consumers have no idea this is even happening. You may be surprised of the private information about you floating around out there. 

If you're looking for tips on how to secure your iCloud specifically, check out this article by Jordon Golson.

Helpful Link(s):
  1. Frad!org

Resources

  • ASET Billing
  • Glossary
  • Policies, Standards and Procedures
  • Security
    • Incident Reporting
  • Service Desk
  • Training
  • Agency Engagement Manager List

Daily Tips

When Online, Free Isn't Always Free

There are a lot of free services online these days. You can store pictures "in the cloud,"...

Continue to "When Online, Free Isn't Always Free"

Security Blogs

On Guard Online

Stay Safe Online

AVAST

Microsoft

McAfee

Security Newsletters

PDF icon April 2014

Security Alert Level

Shape of the State of Arizona colored green to represent a low alert level

Low

Green or Low Indicates a low risk.  No unusual activity...

Review definition of "Low"
LinkedIn Twitter YouTube This site (RSS)
Arizona State Seal
Contact Us
ADOA-ASET
100 N. 15th Avenue, Suite 400
Phoenix, AZ 85007
Find in Google Maps
Phone: 602.542.2250
Map Image

Footer Utility

  • Statewide Website Policies
  • Site Map
  • Meeting Requests