On September 1, 2014, a successful hack of a celebrity’s iCloud account was heavily publicized. In the aftermath of this type of event, it is normal for consumers of similar services from other ISVs, most prominently, Office 365 from Microsoft, to look for assurance from their IT department of the comparative security of their online […]