Skip to main content

How to protect your iCloud account

If you haven’t heard, iCloud security is a hot topic these days. From claims that China infiltrated Apple with hidden spy chips (reports that Apple vigorously denies) to last year’s threats from the “Turkish Crime Family” regarding stolen account passwords, it’s understandable if you’re worried about how safe your iCloud data is.

You can learn more about how Apple works on end-to-end encryption that has thus far kept iCloud largely safe from hackers. But there’s plenty you can do on your end to help make iCloud safer and well protected as well. Here are the basic steps you should to increase your iCloud security.

Step 1: Create a strong password

Apple Password
Image used with permission by copyright holder

The password you use for iCloud is the same password for your Apple account. Apple requires that this password must be at least eight characters long, use upper and lowercase letters, and have at least one number, but we can do a lot better.

Reset your Apple ID password and make it as strong as possible. That means around 15 characters, both upper and lowercase letters, multiple numbers, and symbols. If you’re worried about remembering a random string of characters, a common tactic is to take a familiar phrase or word and exchange letters for numbers and symbols. However, if you want to invest time in a dedicated password manager, the software can come up with very strong passwords for you. Password managers are becoming increasingly important in today’s digital security environment, so if you don’t use one yet it’s certainly worth considering.

Step 2: Set up your security questions if necessary

Apple Security Questions
Image used with permission by copyright holder

If you haven’t visited your Apple ID in a while, you may not have gotten a chance to set up any security questions. These questions work just like the security questions for any thorough online security portal — you set a few specific questions about your life with answers that strangers would never know. Apple will ask these questions when you log into your Apple account or make big changes.

To find your security questions, log into your Apple account with your ID and password, and look for the section that says “Security.” On the right-hand side of the page, select the Edit button to expand the section so you can examine the Security Questions heading. . If you haven’t added any questions, you will see an option to “Add Questions.” If you have set questions up but want to check and refine them, you will see an option to “Change Questions.”

Note: Some people cannot see an option to set up security questions when they log into Apple ID. If you don’t see this option, you can skip this step: This happens when someone sets up two-factor authentication, which overrides the need for security questions and may erase from your account info.

Step 3: Enable two-factor authentication

Apple Two-Factor Authentication
Image used with permission by copyright holder

Apple used to have “two-step verification” but upgraded to “two-factor authentication” which is an effective method of making sure that the real you is accessing your account from one of your real devices. Basically, this authentication sets up a trusted device and/or phone number that Apple will send a verification code to when you try to log in from an unrecognized device.

If you haven’t already done so, turning on two-factor authentication is a simple processiPhone Two-Factor Authentication. If you have already logged into your Apple account online, you can go to the Security section and look at the section for Two-Factor Authentication, which will take you through the process of setting it up. You can also set up the authentication at any time on your iPhone by going to “Settings, Password & Security,” and enabling “Two-Factor Authentication.”

Again, remember that two-factor authentication will probably cancel out your security questions. We encourage you to set up security questions first so that they (hopefully) remain associated with your account in case support staff needs to verify your identity or something goes wrong with the authentication. However, you are perfectly free to skip right to the two-factor authentication if you want.

Step 4: Always sign out when not using your devices

iPhone XS Max
Julian Chokkattu/Digital Trends

Finally, always be aware if you are signing into your Apple account on a public device or a device that isn’t yours. This isn’t a very good idea (especially when connected to guest Wi-Fi), but sometimes it may be necessary. Just remember to log back out from your account when you are finished.

In a similar vein, don’t give out your Apple ID or password to anyone if you aren’t sure it’s an official Apple login or representative.

Editors' Recommendations

Tyler Lacoma
Former Digital Trends Contributor
If it can be streamed, voice-activated, made better with an app, or beaten by mashing buttons, Tyler's into it. When he's not…
How to change your router’s Wi-Fi password
Netgear's Nighthawk RAXE500 tri-band router.

When it comes to getting devices online, Wi-Fi is the gold standard. Millions of people use their laptops, TVs, gaming consoles, and smartphones with the wireless technology – and routers are the magical devices that make this possible. Setting a password on your Wi-Fi router is crucial to keeping it safe and secure, as an unprotected router can easily be targeted by hackers or bogged down by neighbors who take advantage of the free access.

Because of this, it's important to change the default password for your router. A good Wi-Fi password consists of a long alphanumeric string that can't be easily guessed. Changing your router's Wi-Fi password is a pretty easy process, though it might be a bit confusing if you're new to the concept.

Read more
How to change your Zoom background on Mac and Windows
A man working from home.

Not everyone builds their home office around video calls. And if your home office also doubles as your bedroom, kitchen, or is tucked away in a cluttered corner of your basement, you'll be glad to know that Zoom lets you hide your surroundings from your co-workers. One way the software does this is by letting you change your Zoom background, allowing others in the chat to see you while swapping out your environment for something more professional.

Want to make use of the cool feature? In this guide, we'll go over how to change your Zoom background using both built-in images and custom images uploaded by the user. We also cover how to blur your Zoom background, in case you want something a bit more low-key, along with how to add filters for something more fun.
Step 1: Access your Zoom settings

Read more
How Intel and Microsoft are teaming up to take on Apple
An Intel Meteor Lake system-on-a-chip.

It seems like Apple might need to watch out, because Intel and Microsoft are coming for it after the latter two companies reportedly forged a close partnership during the development of Intel Lunar Lake chips. Lunar Lake refers to Intel's upcoming generation of mobile processors that are aimed specifically at the thin and light segment. While the specs are said to be fairly modest, some signs hint that Lunar Lake may have enough of an advantage to pose a threat to some of the best processors.

Today's round of Intel Lunar Lake leaks comes from Igor's Lab. The system-on-a-chip (SoC), pictured above, is Intel's low-power solution made for thin laptops that's said to be coming out later this year. Curiously, the chips weren't manufactured on Intel's own process, but on TSMC's N3B node. This is an interesting development because Intel typically sticks to its own fabs, and it even plans to sell its manufacturing services to rivals like AMD. This time, however, Intel opted for the N3B node for its compute tile.

Read more