Get All Access for $5/mo

The Celebrity-Hacking Scandal Is a Rude Wake-Up Call on Cloud Security As business owners, you have to take responsibility to protect your sensitive documents and photos.

By John Ackerly Edited by Dan Bova

Opinions expressed by Entrepreneur contributors are their own.

The latest hack involving celebrities is much more than an embarrassing moment for a few superstars. It's a wake-up call for all of us.

Virtually everyone depends on the cloud to share sensitive information, but now we know that whether it's sensitive pictures or critical business plans, it's all potentially vulnerable.

While there are a million theories about how these images were obtained, including several focused on Apple's iCloud, it isn't clear where hackers got these pictures. Some suggest these images came from a ring of cybercriminals who brag online about "wins" from storage services such as iCloud and who offer to hack individual accounts for money. Read these threads and you'll realize that anything saved to your phone should be fit for public broadcast.

Related: Why the Naked Celeb Photo iCloud Hack Should Make You Nervous

Whatever happened to expose these pictures, the results are devastating. Everyone who uses a smartphone should now be wondering whether their data is safe. We're so used to the automatic convenience of sharing in the cloud we've completely lost track of security. With hindsight, these services should have included end-to-end encryption from the start. Two-factor authentication shouldn't be an option, it should be a requirement.

The risks of the cloud are nothing new -- Richard Stallman, a well-known open-source activist, has called cloud-storage services "a trap" numerous times, and comedian Louis C.K. warned against the dangers of handing over our photos to services such as iCloud back in 2012, on Jimmy Kimmel Live of all places.

We've all put these risks aside and made a collective compromise. We've opted for convenience over security when the professionals creating these services should have been building greater security into cloud services from the start.

Business professionals and entrepreneurs have a strong interest in security and privacy and we should demand end-to-end encryption and two-factor authentication for every service we depend on. Today, you should pause and assess your exposure to cloud-storage systems and answer the following questions for your own business:

1. How many people use an iPhone or an iOS device to conduct sensitive business transactions or share attachments for business?

2. When you take a picture of a whiteboard during a sensitive meeting about a secret project, do you know if your images are being automatically uploaded to Dropbox or iCloud?

3. When you receive an email with an attachment from a colleague at work do you know what happens to that attachment? Does it end up on Dropbox or iCloud if you open it on your phone?

Related: 8 of the Biggest Data Breaches Ever and How They Happened (Infographic)

4. How about backups? Do you backup the contents of your iPhone to iCloud? If so, do you know whether that backup contains all of your data, including images?

This week, none of us has a quick answer to the question, "Is your data safe?" Our mobile devices are leaky faucets for emails, images and attachments, and everything we do ends up generating a trail of data.

This scandal is a call to action for anyone who depends on the cloud. We practically live our lives on these mobile devices and we certainly conduct critical, sensitive business on smartphones every single day. Here are some concrete steps you can take to secure your business:

1. Understand what's in the cloud. When you share a document, send an email or take a picture on a phone, you and your employees may be inadvertently sending sensitive data to insecure servers. Know what's in the cloud.

2. Use end-to-end encryption for email. If you use Gmail or other cloud-based email services, you shouldn't assume that these companies are securing your information at rest. Use systems that encrypt information on your devices before it is sent to the cloud to become an inviting target for hackers.

3. Preserve the ability to take things back. If you send sensitive business documents to colleagues and partners, you need to have a strategy in place if they are compromised. You can take all security measures available to secure your information, but if email recipients are not as diligent, your information can still be compromised. Use services that secure information and give you the ability to track, control and revoke access.

So here's the wake-up call: As entrepreneurs and small-business people, you simply can't trust that service providers will always protect your sensitive information. It's time to take the necessary actions to protect yourself.

Related: Entrepreneurs Need to Get Serious About Security -- Now

John Ackerly

CEO and Co-founder of Virtru

John Ackerly is the CEO and co-founder of the digital privacy startup Virtru.  

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Side Hustle

At Age 15, He Used Facebook Marketplace to Start a Side Hustle — Then It Became Something Much Bigger: 'Raised Over $1.6 Million'

Dylan Zajac, now a 21-year-old senior at Babson College, wanted to bridge the digital divide.

Business Ideas

63 Small Business Ideas to Start in 2024

We put together a list of the best, most profitable small business ideas for entrepreneurs to pursue in 2024.

Innovation

These Entrepreneurs Created a League That Turns Gamers Into Pro Race Car Drivers: 'We're Giving Drivers a Sustainable Career Path'

Racing Prodigy's innovative E2Real sports league is lowering the high-cost barrier to entry for drivers to take their passion to the track.

Side Hustle

'I Just Hustled': She Earned More Than $300,000 Wrapping Gifts Last Year — and It All Started With a Side Hustle

When Michelle Hensley lost her husband to cancer, she needed to figure out how to earn an income for her family.

Franchise

McDonald's Announces the Return of the Snack Wrap in 2025 — Here's What to Expect From Its Comeback

The decision comes after years of persistent customer demand for the portable snack, which debuted nearly two decades ago.

Business News

OpenAI Just Released Its Text-to-Video Generator, Sora. Here's How the New AI Could Impact Small Businesses and Creators.

Sora has a variety of use cases for businesses, from social media campaigns to video creation.