iCloud Security & Apple

iCloud Security & Apple

Many users of Apple devices are now able to enjoy the abundant features and convenience of iCloud, the company’s cloud computing services that aims to give users a proprietary opportunity to manage and synchronize their data and applications across all their devices from just about anywhere. iCloud can even be set up to work on a Windows PC, and recent upgrades to the service now allow some level of remote management.

The Trajectory of iCloud

iCloud, Apple’s suite of personal cloud services, has had a somewhat rocky history that dates back to the days of eWorld, a prototype service that required installation from floppy disks and only lasted a couple of years during the mid-1990s. The first 21st-century foray by Apple in this regard was iTools, which arrived in early 2000 and was transformed to Mac in 2002 and later to MobileMe in 2008.

MobileMe was not exactly a worthy successor to.Mac, and it reportedly provoked the ire of the late Steve Jobs, who infamously admitted that this was not Apple’s best approach to the personal cloud computing paradigm in a lengthy corporate email. By the time the iPhone 4S and iOS 5 were ready to launch in October 2011, Steve Jobs took the opportunity to announce the launch of iCloud and put MobileMe to rest.

In the three years, that iCloud has been around, the service has already been immortalized in the 2014 comedic film “Sex Tape,” featuring Cameron Diaz and Jason Siegel. Storage, synchronization, automatic downloads, backups, device tracking, mobile payments, and security are among the many features of iCloud, and the latter two can now be remotely managed from web browsers.

Remote Management of iCloud Security Settings

iCloud can be accessed from a Web browser for the purpose of adjusting settings related to security or the Apple Pay mobile payment service. One of the first steps in this regard is to decide whether two-step verification should be activated. Setting up this secure mode of logging in required the use of a trusted device that is powered by the latest version of iOS.

After accessing the URL www.iCloud.com, users will see a display that is similar to an iPhone grid of apps. To access the security settings, users should click or tap the Settings icon followed by Data & Security. Users who feel that their safety has already been compromised should select the option to Sign Out Everywhere before updating their passwords and activating two-step verification, which can be accessed from the Apple ID option. At this point, users have already signed out from all devices, which means they will have to sign in again to access the Password and Security section on the left.

Trusted devices such as iMacs, MacBooks, iPods, iPhones, and iPads can be added at this point, and two-step verification can now be enabled using a code that will be sent to a chosen trusted device. This system will now be used to access all devices, and there will be an option to create a Recovery Key in case the original verification code is lost or forgotten.

Another security setting that can be managed remotely is Family Sharing, but this will require accessing iCloud from a device that runs iOS 8 or the Yosemite version of OS X. Finally, Apple Pay can be managed from here as long as an iPhone 6 has been added as a trusted device. In the case of a lost or stolen iPhone 6, users will be able to remove all their credit card information remotely.

Sources:
http://www.apple.com/pr/library/2002/07/17Apple-Launches-Mac.html
http://arstechnica.com/apple/2008/08/steve-jobs-on-mobileme-the-full-e-mail/
http://edition.cnn.com/2011/TECH/web/06/07/icloud.reaction/index.html?iref=allsearch
http://appleinsider.com/articles/14/11/29/how-to-manage-your-icloud-security-and-apple-pay-settings-from-the-web
http://www.apple.com/icloud/setup/ios.html

CATEGORIES