I get it. You’re one of those enterprises that doesn’t (yet) support Apple products among employees, but does that moratorium extend to the C-suite? I’m willing to bet it does not, and that’s why even Windows-only IT shops must learn how to secure Apple’s products.
Ignore the fantasy, this is reality
The reality is that Apple’s products are popular at work. And while there are many businesses that don’t officially support them, one section of civil society that pretty much always does their own thing no matter what are the boys and girls in the C-suite. I can still recall the number of CFOs I spoke with early on in the iPad days who were deeply interested in trying the Apple tablet. Many did. At a time when no one else could.
The rest is history.
That’s a pattern that continues today. Your employees may not be living like the Jetsons at work, but your CEO, CFO, COO and all the other Cs and near-Cs are far more likely to be giving it a go. Which means your corporate data is already on iPhones, iPads and Macs – and it’s not just any old data: This is the most confidential data your company holds – the information your executive teams use to run the business that pays your team’s wages.
That’s a valuable payload, which means those Apple devices are most certainly a target.
Are you protecting them?
What are the biggest threats?
There is a certain irony that one IT support chap I spoke with some years ago said his team didn’t pay attention to securing the CEO’s Mac because they were so much more secure. He seemed upset when I asked why, if that was the case, he was deploying other platforms across the company.
We don’t speak anymore.
He made a good point, of course. Apple’s products are inherently more secure. But that doesn’t mean they are perfectly secure. Bad things do still happen and there are well-paid industries focused on cracking the security protection on iPads, Macs and iPhones. Successful exploits (such as they are) sell for top dollar on the grey markets.
All the same, the biggest security threat for any company remains the humans using the technology. Criminals know they’ll make the money if they can convince someone to click that link, visit that spoofed website or accidentally install that keylogger or tidbit of software designed only to contact a remote server so ransomware can be installed. Then there are the phishing attempts, in which criminals attempt to exfiltrate passcodes, corporate and account data.
All those threats are bad in the consumer markets, but they can become even more vicious across the enterprise. Cleaning out a person’s bank account hurts badly, but what happens when someone raids the corporate treasury? How will bills and wages get paid? That’s a lot of money, and such attacks have become incredibly sophisticated. Which is why every Mac, iPad or iPhone-using C-suite executive really needs to ensure their tech teams are monitoring for the signs of such behaviours. And, typically, in companies that don’t officially support Apple’s kit (for reasons that make no sense to me), they’re not.
That’s a disaster waiting to happen.
What other people do
Those enterprises that do support Apple’s ecosystem typically use MDM solutions from the likes of Jamf, Addigy, Fleetsmith (as it was) and others to protect their entire fleet. These solutions don’t provide 100% protection and are typically boosted by products like Jamf Protect, partnerships with cybersecurity services, or at least some form of location-aware data and services firewall. That’s still not perfect, but it helps – and the understanding of security protection has moved to a more holistic models, rather than relying on outmoded models around perimeter security. The latter is necessary, of course, but the security it provides is limited in the current environment.
Larger companies may use a combination of on- and off-premises multi-cloud solutions to provide corporate and enterprise services and access to data, a model that means the information never really sits on the end user device, or (if it does) only a limited quantity of it is exposed at any time.
That’s fine if you support multiple platforms. But if you’re not supporting Apple in this way, then it’s your salty tears that will eventually become oceans when your CFO accidentally leaves her/his data-crammed laptop in a cab. If you’re lucky, they may have figured out how to best protect the Mac with perimeter security protections such as alphanumeric passcodes, biometric authentication, password protected folders, FileVault, malware checkers, the T2 chip and so on.
But you don’t know if that machine has such protection, (and you may not have added any sourced from an external provider). After all, you don’t support Apple.
Isn’t it time you secured the C-Suite?
Please follow me on Twitter, or join me in the AppleHolic’s bar & grill and Apple Discussions groups on MeWe.
Copyright © 2020 IDG Communications, Inc.
406686 515051You ought to experience a contest personally with the finest blogs on-line. Im going to suggest this page! 658434
Keep functioning ,impressive job!
https://buypropeciaon.com/ – Propecia
621360 204631Some really great articles on this web site , thankyou for contribution. 529841
of course like your web site however you need to test the spelling on several of your posts. A number of them are rife with spelling issues and I in finding it very troublesome to inform the reality nevertheless I?¦ll definitely come back again.
You have mentioned very interesting points! ps nice website . “Where can I find a man governed by reason instead of habits and urges” by Kahlil Gibran.
Everything is very open and very clear explanation of issues. was truly information. Your website is very useful. Thanks for sharing.
I’ve recently started a site, the info you offer on this site has helped me tremendously. Thank you for all of your time & work. “There can be no real freedom without the freedom to fail.” by Erich Fromm.
934269 951652There is visibly a bunch to know about this. I believe you made various good points in attributes also. 703320
Appreciating the hard work you put into your blog and detailed information you offer. It’s awesome to come across a blog every once in a while that isn’t the same outdated rehashed material. Excellent read! I’ve saved your site and I’m including your RSS feeds to my Google account.
202078 421755I believe that a simple and unassuming manner of life is greatest for every person, finest both for the body and the mind. 191596
575647 186811Respect to author , some wonderful info . 93929
You made several good points there. I did a search on the subject and found a good number of persons will consent with your blog.
240761 948302You seem to be quite skilled inside the way you write.::~ 491984
Great – I should certainly pronounce, impressed with your site. I had no trouble navigating through all tabs as well as related information ended up being truly simple to do to access. I recently found what I hoped for before you know it in the least. Quite unusual. Is likely to appreciate it for those who add forums or something, website theme . a tones way for your customer to communicate. Excellent task.
It is actually a great and useful piece of information. I’m happy that you just shared this helpful information with us. Please stay us informed like this. Thanks for sharing.
73561 880421hi and thanks for the actual blog post ive recently been looking regarding this specific advice on-line for sum hours these days as a result thanks 272490
410458 445132Hello, Neat post. There is an issue along with your web site in web explorer, could test thisK IE still may be the marketplace leader and a huge portion of other folks will miss your magnificent writing because of this issue. 558503