• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
CommentaryCybersecurity

What Adele’s Photo Hack Says About Cybersecurity

By
Rajiv Gupta
Rajiv Gupta
Down Arrow Button Icon
By
Rajiv Gupta
Rajiv Gupta
Down Arrow Button Icon
March 24, 2016, 7:00 PM ET
THE TONIGHT SHOW STARRING JIMMY FALLON -- Episode 0374 -- Pictured: (l-r) Host Jimmy Fallon and The Roots sing with Adele during the Music Room bit on November 24, 2015 -- (Photo by: Douglas Gorenstein/NBC/NBCU Photo Bank)
THE TONIGHT SHOW STARRING JIMMY FALLON -- Episode 0374 -- Pictured: (l-r) Host Jimmy Fallon and The Roots sing with Adele during the Music Room bit on November 24, 2015 -- (Photo by: Douglas Gorenstein/NBC/NBCU Photo Bank)Photograph by Douglas Gorenstein— NBC/Getty Images

Bank robbery and medical information theft have moved to the Internet, so it is disappointing but not surprising that criminal invasions of personal privacy have followed suit. British pop star Adele just fell victim to a targeted breach of her private pregnancy photos, echoing the theft of hundreds of sensitive celebrity photos in 2014, including nude photos of Jennifer Lawrence and photos of Harry Styles and Kendall Jenner vacationing in St. Barts.

In both cases, the perpetrators stole photos from online cloud services: first from iCloud accounts and now from a private email. Some will inevitably scold celebrities for storing private information in online applications, but the details behind these celebrity hacks actually closely resemble breaches of on-premises applications at companies with multi-million-dollar security budgets. Whether for a celebrity or a federal bank employee, cybersecurity needs to adapt to the way people use technology.

The methods are not necessarily technologically advanced, but just like celebrities, a majority of businesses have fallen victim to phishing and social engineering attacks. Celebrity data breaches illustrate first hand the human behaviors that hackers exploit, especially at scale in companies with thousands of employees, and those common behaviors are absent-mindedness, ignorance, and curiosity. Much of the advice directed to consumers on keeping data safe in the cloud applies to businesses as well: choose secure cloud services, turn on the appropriate security features in the service like multi-factor authentication, and actively manage who has access to data.

In a method called phishing, a hacker attempts to trick the victim into entering their login information on a fake form. This was how a hacker accessed celebrities’ iCloud accounts and, although details have not yet been released, is the most likely way an overzealous fan obtained photos from Adele’s partner’s email account.

Celebrities are not alone in struggling to avoid phishing attacks, as 84% of companies report that their organization has been the victim of a phishing attack, and this technique successfully factored into breaches at eBay (EBAY), Target (TGT), and TalkTalk, among others. Even security professionals struggle when put to the test: only 3% of a test group were able to correctly identify ten phishing emails, and 80% failed to identify a single one. The numbers point to the human factor as an effective target for hackers.

In a postmortem on this latest incident, there are bound to be voices who suggest Adele never should have sent private files via email. This approach ignores the reason people (and companies) create and collect data: to use it! One security executive at a financial services company compared keeping data safe to working as a secret service agent traveling with the president. It might be safer in theory to keep the president hidden in a bunker, but it isn’t possible. Similarly, it’s impractical and unrealistic to advise celebrities not to privately share personal information over email.

In the enterprise, we talk about user-centric security – designing security around human behavior because convenience will always trump security. I’ve witnessed the chief information security officer of a large bank taking notes with Evernote, a cloud service his own department banned. If a security executive doesn’t follow restrictive policies, why should we expect consumers to? Rather than give advice that cuts people off from the tools they need, we need to provide security of their data in the tools they use (within reason). Celebrity data breaches strike at the core of what cybersecurity needs to accomplish: account for human error and adapt to the way people use data.

After incidents involving cloud services (email is a cloud service) there is a tendency to hold everything cloud up as an enemy of keeping data safe. On the contrary, cloud services are uniquely positioned to provide secure, convenient solutions. Fear of cloud ignores the fact that in these data breaches, cloud providers’ systems are rarely compromised. Software-as-a-service providers stake their entire business models on the integrity of their applications, since a breach could pose an existential threat to the company. Experts acknowledge the progress; 64.9% of IT professionals now consider cloud services just as or more secure than traditional on-premises software.

Besides email consider another common type of cloud service, that for sharing files. Consumers have the choice of multiple file sharing services many with robust security features. There are, however, certain red flags to avoid. The terms and conditions can be full of dubious provisions: no retention of ownership, no ability to delete data, or no encryption, for example. Any of these provisions suggests the service is not the right choice for your most sensitive data.

Selecting a reputed service is only half the battle. Apple is considered a leader in security and privacy, but hackers can still log in to an account with a stolen password if the user has not taken the time to set up advanced security settings. Multi-factor authentication is a key feature that needs to be turned on. It likely would have prevented both the iCloud and email breaches because it requires additional identity confirmation at sign on, making it impossible for hackers to take control of an account with just a stolen password.

Adele’s leak stands out because her photos were not taken from her own email, but from her partner’s. This adds a very interesting wrinkle that has been observed in enterprise settings too, namely, the weakest link as target of attack. Hackers in the Target breach didn’t attack and compromise Target’s IT systems or applications. Instead, they targeted the IT systems of an HVAC partner who had access to Target’s IT systems. In Adele’s case, this thread can unravel many times over – it is possible Adele’s partner account was compromised because her partner received spurious email purportedly from a friend whose email account had been compromised.

Email is a much more egalitarian service compared to others where a user, typically the originator or creator has more control. For example, cloud file-sharing services enable a user to regulate who can view, edit, or download certain files. Enforcing permissions can provide an extra layer of control, allowing users to share with confidence. The last line of defense, and with the sophistication of security attacks, a critical line of defense is threat detection, which monitors for suspicious activity. For example, when you log in from a new computer or from a new location, many services like gmail who detect that as abnormal behavior require an additional factor of authentication helping to serve as a deterrent to hackers.

Celebrities, enterprise users, and consumers alike have to remember that they are responsible to use cloud services (and traditional software applications) in a secure, responsible way. To underscore that point, research firm Gartner declared that 95% of breaches will be the cloud customers’ faults.

As Adele sang, when you get a hello from the other side take extra care to make sure the hello is truly from that long-lost friend before you click on any link and find yourself the victim of a phishing attack.

Rajiv Gupta is CEO of Skyhigh Networks, a Campbell, CA-based cloud security and enablement company.

About the Author
By Rajiv Gupta
See full bioRight Arrow Button Icon

Latest in Commentary

carbon
Commentaryclimate change
Banking on carbon markets 2.0: why financial institutions should engage with carbon credits
By Usha Rao-MonariDecember 13, 2025
58 minutes ago
Dr. Javier Cárdenas is the director of the Rockefeller Neuroscience Institute NeuroPerformance Innovation Center.
Commentaryconcussions
Fists, not football: There is no concussion protocol for domestic violence survivors
By Javier CárdenasDecember 12, 2025
24 hours ago
Gary Locke is the former U.S. ambassador to China, U.S. secretary of commerce, and governor of Washington.
CommentaryChina
China is winning the biotech race. Patent reform is how we catch up
By Gary LockeDecember 12, 2025
24 hours ago
millennial
CommentaryConsumer Spending
Meet the 2025 holiday white whale: the millennial dad spending $500+ per kid
By Phillip GoerickeDecember 12, 2025
24 hours ago
Sarandos
CommentaryAntitrust
Netflix, Warner, Paramount and antitrust: Entertainment megadeal’s outcome must follow the evidence, not politics or fear of integration
By Satya MararDecember 12, 2025
1 day ago
CommentaryLeadership
Leading the agentic enterprise: What the next wave of AI demands from CEOs
By François Candelon, Amartya Das, Sesh Iyer, Shervin Khodabandeh and Sam RansbothamDecember 12, 2025
1 day ago

Most Popular

placeholder alt text
Economy
Tariffs are taxes and they were used to finance the federal government until the 1913 income tax. A top economist breaks it down
By Kent JonesDecember 12, 2025
1 day ago
placeholder alt text
Success
Apple cofounder Ronald Wayne sold his 10% stake for $800 in 1976—today it’d be worth up to $400 billion
By Preston ForeDecember 12, 2025
23 hours ago
placeholder alt text
Success
40% of Stanford undergrads receive disability accommodations—but it’s become a college-wide phenomenon as Gen Z try to succeed in the current climate
By Preston ForeDecember 12, 2025
22 hours ago
placeholder alt text
Economy
For the first time since Trump’s tariff rollout, import tax revenue has fallen, threatening his lofty plans to slash the $38 trillion national debt
By Sasha RogelbergDecember 12, 2025
18 hours ago
placeholder alt text
Economy
The Fed just ‘Trump-proofed’ itself with a unanimous move to preempt a potential leadership shake-up
By Jason MaDecember 12, 2025
16 hours ago
placeholder alt text
Success
At 18, doctors gave him three hours to live. He played video games from his hospital bed—and now, he’s built a $10 million-a-year video game studio
By Preston ForeDecember 10, 2025
3 days ago
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Fortune Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.