Apple Advances User Security With Powerful New Data Protections

By   ISBuzz Staff
Editorial Team , Information Security Buzz | Dec 08, 2022 05:22 am PST

As the latest step in its continuous endeavor to provide people with even better ways to secure their data. Apple today unveiled three cutting-edge security capabilities aimed at defending against attacks on customer data in the cloud. Customers may confirm they are speaking exclusively with the people. They wish to with the help of iMessage Contact Key Verification. Users can choose to use a physical key pair to sign in to an Apple ID account with Keys for Apple ID. Users may choose to further safeguard sensitive iCloud data, such as iCloud, Photos, Notes, and more. Along with Enhanced Privacy Laws for iCloud, which employs end-to-end encryption. To give Apple’s highest level of cloud security Advance Data Protection.

With best-in-class device data encryption and protections built into our custom chips, as well as features like Standoff Mode. This provides an extremely high level of optional security for users like columnists, human rights activists, as well as diplomats. These new versions join a suite of other safeguards which makes Apple phones the most protected on the market. Apple is dedicated to enhancing security on devices and in the cloud, as well as to continuously introducing additional safeguards.

“At Apple, we are steadfast in our dedication to provide our customers the greatest data security available. The senior VP of software engineering at Apple, Craig Federighi, stated. “We continuously discover and mitigate emerging risks to their private data on phone and in the cloud. Consumers will have three potent new tools to better safeguard their most sensitive information. And communication via iMessage Contact Key Verify, Security Keys, and Advance Data Protection for iCloud, according to Apple. “Our security teams work relentlessly to keep users’ data safe.”

Advanced iCloud Data Protection

With the advanced file encryption mechanism included in the iPhone, iPad, and Mac, Data Protection. Apple has long provided the industry’s best data protection on its products. The most secure mobiles are those made by Apple. Ivan Kristi, Apple’s senior vice president of security and architecture, stated that the company is now expanding on that strong basis. Apple’s highest degree of cloud data security is called “Advanced Data Protection,” which gives customers the option to encrypt end-to-end the overwhelming majority of their most personal iCloud data so it can only be read on their devices. For users who want to participate, Advanced Data Protection maintains the majority of iCloud data secure even in the event of a cloud data breach.

Subscribe
Notify of
guest
4 Expert Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Erfan Shadabi
Erfan Shadabi , Cybersecurity Expert
InfoSec Expert
December 8, 2022 1:45 pm

Apple’s hardware is probably the most secure in the market but for years, privacy advocates have been saying that Apple could do more to protect user data from landing in the wrong hands. So, for instance, there were major privacy concerns when it came to iCloud. While iMessages sent between Apple devices were end-to-end encrypted, preventing anyone but the sender and recipient from accessing it, not all information backed up to iCloud, Apple’s cloud server, had the same level of encryption. So these new updates seem to address such issues but we have to wait and analyse the details and implications as they become available.

Last edited 1 month ago by Erfan Shadabi
Jake Moore
Jake Moore , Cybersecurity Specialist
InfoSec Expert
December 8, 2022 1:33 pm

“Hardware security keys offer protection and peace of mind knowing that it is one of the most secure ways of entering an account and is often offered as an entry method to highly sensitive accounts. Attackers still largely target Apple users with phishing scams or via physical device thefts, but the use of security keys will potentially go one step further towards mitigating this common risk and it will inevitably protect Apple accounts even more. 

To gain the full security benefits of this new feature, it is best to remove all other forms of account verification and solely rely on physical security keys to gain access which will stop hackers bypassing this form of chosen authentication. It is also a good reminder to remain vigilant to potential phishing and vishing emails and calls from those trying to gain access to your Apple accounts.”

Last edited 1 month ago by Jake Moore
Jamie Akhtar
Jamie Akhtar , CEO and Co-founder
InfoSec Expert
December 8, 2022 1:24 pm

“We have never been more reliant on technology than we are today; much of it storing and processing a monumental amount of sensitive data. This data can and has been utilised in improving our everyday lives, but in the wrong hands, can be catastrophic. That said, it is critical that companies do right by its customers by taking all the necessary precautions to protect data privacy. Indeed, with increased cybersecurity awareness among the general public, cultivating digital trust is imperative to business survival. Apple has long been the exemplar of this, having time and again invested in its user security. Unfortunately, the downside of Apple’s latest measures is the requirement for users to ‘opt-in’ which will likely leave many unprotected as the onus is on them to take action.”

Last edited 1 month ago by Jamie Akhtar
Javvad Malik
Javvad Malik , Security Awareness Advocate
InfoSec Expert
December 8, 2022 1:23 pm

“Any steps that protect the privacy of individuals and give them the option to protect their data in transit and in storage is a good move. 

While many will claim that this will impede law enforcement, there are many ways to pursue criminals without compromising everyone’s privacy. Something that many privacy rights activists have been promoting for a long time, which was likely a major contributing factor to Apple making this decision.”

Last edited 1 month ago by Javvad Malik

Recent Posts

4
0
Would love your thoughts, please comment.x
()
x