diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/103-popular-suites/100-icloud.md b/src/data/roadmaps/cyber-security/content/100-basic-it-skills/103-popular-suites/100-icloud.md index f7d0503ce..e7b39bee5 100644 --- a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/103-popular-suites/100-icloud.md +++ b/src/data/roadmaps/cyber-security/content/100-basic-it-skills/103-popular-suites/100-icloud.md @@ -27,3 +27,5 @@ Apple takes the security of iCloud very seriously and has implemented multiple l - **Secure Tokens**: Apple uses secure tokens for authentication, which means that your iCloud password is not stored on your devices or on Apple's servers. Overall, iCloud is a convenient and secure way for Apple device users to store and synchronize their data across devices. This cloud-based service offers numerous features to ensure seamless access and enhanced protection for user data. + +- [All about iCloud](https://www.intego.com/mac-security-blog/everything-you-can-do-with-icloud-the-complete-guide/) \ No newline at end of file