How to protect your iCloud account

If you haven’t heard, iCloud security is a hot topic these days. From claims that China infiltrated Apple with hidden spy chips (reports that Apple vigorously denies) to last year’s threats from the “Turkish Crime Family” regarding stolen account passwords, it’s understandable if you’re worried about how safe your iCloud data is.

You can learn more about how Apple works on end-to-end encryption that has thus far kept iCloud largely safe from hackers. But there’s plenty you can do on your end to help make iCloud safer and well protected as well. Here are the basic steps you should to increase your iCloud security.

Step 1: Create a strong password

Apple Password

The password you use for iCloud is the same password for your Apple account. Apple requires that this password must be at least eight characters long, use upper and lowercase letters, and have at least one number, but we can do a lot better.

Reset your Apple ID password and make it as strong as possible. That means around 15 characters, both upper and lowercase letters, multiple numbers, and symbols. If you’re worried about remembering a random string of characters, a common tactic is to take a familiar phrase or word and exchange letters for numbers and symbols. However, if you want to invest time in a dedicated password manager, the software can come up with very strong passwords for you. Password managers are becoming increasingly important in today’s digital security environment, so if you don’t use one yet it’s certainly worth considering.

Step 2: Set up your security questions if necessary

Apple Security Questions

If you haven’t visited your Apple ID in a while, you may not have gotten a chance to set up any security questions. These questions work just like the security questions for any thorough online security portal — you set a few specific questions about your life with answers that strangers would never know. Apple will ask these questions when you log into your Apple account or make big changes.

To find your security questions, log into your Apple account with your ID and password, and look for the section that says “Security.” On the right-hand side of the page, select the Edit button to expand the section so you can examine the Security Questions heading. . If you haven’t added any questions, you will see an option to “Add Questions.” If you have set questions up but want to check and refine them, you will see an option to “Change Questions.”

Note: Some people cannot see an option to set up security questions when they log into Apple ID. If you don’t see this option, you can skip this step: This happens when someone sets up two-factor authentication, which overrides the need for security questions and may erase from your account info.

Step 3: Enable two-factor authentication

Apple Two-Factor Authentication

Apple used to have “two-step verification” but upgraded to “two-factor authentication” which is an effective method of making sure that the real you is accessing your account from one of your real devices. Basically, this authentication sets up a trusted device and/or phone number that Apple will send a verification code to when you try to log in from an unrecognized device.

If you haven’t already done so, turning on two-factor authentication is a simple processiPhone Two-Factor Authentication. If you have already logged into your Apple account online, you can go to the Security section and look at the section for Two-Factor Authentication, which will take you through the process of setting it up. You can also set up the authentication at any time on your iPhone by going to “Settings, Password & Security,” and enabling “Two-Factor Authentication.”

Again, remember that two-factor authentication will probably cancel out your security questions. We encourage you to set up security questions first so that they (hopefully) remain associated with your account in case support staff needs to verify your identity or something goes wrong with the authentication. However, you are perfectly free to skip right to the two-factor authentication if you want.

Step 4: Always sign out when not using your devices

iPhone XS Max
Julian Chokkattu/Digital Trends

Finally, always be aware if you are signing into your Apple account on a public device or a device that isn’t yours. This isn’t a very good idea (especially when connected to guest Wi-Fi), but sometimes it may be necessary. Just remember to log back out from your account when you are finished.

In a similar vein, don’t give out your Apple ID or password to anyone if you aren’t sure it’s an official Apple login or representative.

Product Review

The Oculus Rift is cheaper, the Vive Pro is better. Is the original Vive still worth it?

The Oculus Rift may have brought virtual reality into the public eye, but HTC’s Vive, built in partnership with Valve, does it better. Does the Vive still represent the true future of virtual reality, or are there better competitors on…
Mobile

Here’s how to set up an alternate appearance for Face ID

Would like to add a second face for your iPhone FaceID? Maybe your face looks different at work, or you have a loved one that you want to be able to unlock your phone. Here's how to set up an alternate appearance for Face ID.
Cars

Can't see all of a sudden? Our quick guide on defogging your car windows

Did you suddenly lose exterior visibility while driving because of foggy windows? Don't panic! Here's our quick guide on defogging your car windows in a safe manner while on the go, and a few steps on how to prevent them.
Home Theater

How to wall mount a TV: Tips and tricks to cut down on frustration

This how-to guide includes a video on how to wall mount a TV, along with other tips and tricks about the process. Step by step, we'll take you through what you have to do to successfully get your TV on your wall.
Social Media

Sick of Facebook privacy scandals? Here's how to protect your personal data

With a number of security scandals in 2018, it has us questioning if we should get rid of Facebook. Here's how to protect your personal data without deleting your account, as well as how to just nuke the thing altogether.
Computing

Don't take your ISP's word for it: Here's how to test your internet speed

If you're worried that you aren't getting the most from your internet package, speed tests are a great way to find out what your real connection is capable of. Here are the best internet speed tests available today.
Emerging Tech

Awesome Tech You Can’t Buy Yet: DIY smartphones and zip-on bike tires

Check out our roundup of the best new crowdfunding projects and product announcements that hit the web this week. You may not be able to buy this stuff yet, but it sure is fun to gawk!
Computing

Nvidia is slowly rolling out its next generation of GPUs. Here's what you need to know about them

Nvidia's new RTX 2000 series graphics cards are impressive pieces of hardware, with some amazing advancements and some rather high price tags to match. Here's everything you need to know about Nvidia's new top-tier cards.
Computing

Lenovo and Dell make great professional laptops, but who does it best?

Finding the best laptop for professional use at the office, on the move, and at home is no easy task. There's plenty to choose but to find the best of the best, we pitted the Lenovo ThinkPad X1 Extreme vs. Dell XPS 15.
Emerging Tech

Here’s all the best gear and gadgetry you can snag for $100 or less

A $100 bill can get you further than you might think -- so long as you know where to look. Check out our picks for the best tech under $100, whether you're in the market for headphones or a virtual-reality headset.
Emerging Tech

What the heck is machine learning, and why is it everywhere these days?

Machine learning has been responsible for some of the biggest advances in artificial intelligence over the past decade. But what exactly is it? Check out our handy beginner's guide.
Computing

Personal info of 30,000-plus Pentagon employees compromised in contractor breach

The Pentagon is facing another security problem after it was discovered that a contractor was responsible for a leak of data that affected more than 30,000 Pentagon employees, both civilian and military.
Computing

Did your Windows 10 audio stop working after the update? Microsoft has a fix

Microsoft has released a small patch for its October 2018 Update build of Windows 10 following some users facing audio issues that resulted in no sound output at all. After this fix, that problem should disappear for good.
Photography

Adobe’s Premiere Rush is a video-editing app designed for social media projects

At Adobe MAX 2018, Adobe unveiled updates across the board for all of its Creative Cloud apps, from the release of Premiere Rush CC, a social-focused video editor, to Project Gemini, a digital drawing and painting tool.