Skip to main content

Stolen Privacy: Enterprise Lessons from the Hollywood iCloud Attack


With the recent iCloud incident heard around the world this Labor Day weekend, data security is front page news, and everyone is talking about how safe the cloud really is. The sad reality is that hacking can happen to anyone, anywhere, and across any application. As such, safeguarding our data and dispensing the right safety protocols and firewalls is all we can do to ensure data remains safe. This incident should make enterprises (as well as the rest of us hosting content we may not want made public) think twice about their cloud security strategies as well.

In recent years, there has been an influx of personal devices entering the enterprise, and today Apple devices are proliferating. Apple’s iOS has historically been considered a secure option for a variety of reasons. But these devices are used on the edge of the enterprise network as an access asset, and as such they should be secured properly like any other enterprise assets.  Most enterprises have, in fact, taken the proper precautions to protect themselves from potential security issues that are introduced from the edge of the network.  But as proven this past weekend, cyber attackers can leverage Apple iOS as an entrance point.

Since Apple is predominantly a consumer product, and given that most large enterprises already have security measures in place, you may think that the recent breach won’t impact the enterprise at all. But, it’s important for enterprises to use this as a warning and an opportunity to re-examine their security strategies as mobility, cloud, and networks become so interwoven.

This incident illustrates the collision of consumer and enterprise technology and the blurred lines between these two worlds. The cloud is a terrific asset for businesses, but this breach sheds light on the fact that businesses need to implement a true enterprise cloud (private, public, or hybrid cloud) strategy to prevent malicious attacks like this from occurring. No one technology—not even Apple’s—is immune from challenges.

Apple and the enterprise should continue the narrative of a secure cloud environment, which includes the network, application, mobility, and datacenter. I’m confident that this unfortunate event will only drive Apple and other providers to further its ability to provide a more secure environment… both for consumers and for enterprises.