I get it. You’re a type of enterprises that doesn’t (but) support Apple merchandise amongst staff, however does that moratorium prolong to the C-suite? I’m keen to wager it doesn’t, and that’s why even Windows-only IT retailers should find out how to secure Apple’s merchandise.
Ignore the fantasy, that is actuality
The actuality is that Apple’s merchandise are common at work. And whereas there are numerous companies that don’t formally support them, one part of civil society that just about all the time does their very own factor it doesn’t matter what are the girls and boys in the C-suite. I can nonetheless recall the variety of CFOs I spoke with early on in the iPad days who have been deeply considering making an attempt the Apple pill. Many did. At a time when nobody else may.
The relaxation is historical past.
That’s a sample that continues immediately. Your staff will not be dwelling like the Jetsons at work, however your CEO, CFO, COO and all the different Cs and near-Cs are way more seemingly to be giving it a go. Which means your company knowledge is already on iPhones, iPads and Macs – and it’s not simply any previous knowledge: This is the most confidential knowledge your organization holds – the data your govt groups use to run the enterprise that pays your group’s wages.
That’s a priceless payload, which suggests these Apple units are most definitely a goal.
Are you defending them?
What are the greatest threats?
There is a sure irony that one IT support chap I spoke with some years in the past stated his group didn’t concentrate to securing the CEO’s Mac as a result of they have been a lot extra secure. He appeared upset after I requested why, if that was the case, he was deploying different platforms throughout the firm.
We don’t communicate anymore.
He made level, after all. Apple’s merchandise are inherently extra secure. But that doesn’t imply they’re completely secure. Bad issues do nonetheless occur and there are well-paid industries targeted on cracking the safety safety on iPads, Macs and iPhones. Successful exploits (comparable to they’re) promote for high greenback on the gray markets.
All the identical, the greatest safety risk for any firm stays the humans using the technology. Criminals know they’ll make the money if they can convince someone to click that link, visit that spoofed website or accidentally install that keylogger or tidbit of software designed only to contact a remote server so ransomware can be installed. Then there are the phishing attempts, in which criminals attempt to exfiltrate passcodes, corporate and account data.
All those threats are bad in the consumer markets, but they can become even more vicious across the enterprise. Cleaning out a person’s bank account hurts badly, but what happens when someone raids the corporate treasury? How will bills and wages get paid? That’s a lot of money, and such attacks have become incredibly sophisticated. Which is why every Mac, iPad or iPhone-using C-suite executive really needs to ensure their tech teams are monitoring for the signs of such behaviours. And, typically, in companies that don’t officially support Apple’s kit (for reasons that make no sense to me), they’re not.
That’s a disaster waiting to happen.
What other people do
Those enterprises that do support Apple’s ecosystem typically use MDM solutions from the likes of Jamf, Addigy, Fleetsmith (as it was) and others to protect their entire fleet. These solutions don’t provide 100% protection and are typically boosted by products like Jamf Protect, partnerships with cybersecurity services, or at least some form of location-aware data and services firewall. That’s still not perfect, but it helps – and the understanding of security protection has moved to a more holistic models, rather than relying on outmoded models around perimeter security. The latter is necessary, of course, but the security it provides is limited in the current environment.
Larger companies may use a combination of on- and off-premises multi-cloud solutions to provide corporate and enterprise services and access to data, a model that means the information never really sits on the end user device, or (if it does) only a limited quantity of it is exposed at any time.
That’s fine if you support multiple platforms. But if you’re not supporting Apple in this way, then it’s your salty tears that will eventually become oceans when your CFO accidentally leaves her/his data-crammed laptop in a cab. If you’re lucky, they may have figured out how to best protect the Mac with perimeter security protections such as alphanumeric passcodes, biometric authentication, password protected folders, FileVault, malware checkers, the T2 chip and so on.
But you don’t know if that machine has such protection, (and you may not have added any sourced from an external provider). After all, you don’t support Apple.
Isn’t it time you secured the C-Suite?
Please follow me on Twitter, or be part of me in the AppleHolic’s bar & grill and Apple Discussions teams on MeWe.
Copyright © 2020 IDG Communications, Inc.