Jamf VP explains enterprise security threats — and how to mitigate them

Apple-focused device management and security vendor Jamf today published its Security 360: Annual Trends report, which reveals the five security tends impacting organizations running hybrid work environments. As it is every year, the report is interesting, so I spoke to Michael Covington, vice president of portfolio strategy, for more details about what the company found this year.

First, here’s a brief rundown of some of the salient points in the report:

To read this article in full, please click here

Read more

Maybe one day every platform will be as secure as Apple

A look at the Biden Administration’s recently updated National Cybersecurity Strategy document seems to reflect some of the approaches to cybercrime Apple already employs. 

Take privacy, for example. The proposal suggests that privacy protection will no longer be something big tech can argue against – companies will be required to prioritize privacy. That’s fine if you run a business that does not require wholesale collection and analysis of user information, which has always been Apple’s approach. The best way to keep information private, the company argues, is not to collect it at all.

To read this article in full, please click here

Read more

Highlights from the New U.S. Cybersecurity Strategy

Credit to Author: BrianKrebs| Date: Fri, 03 Mar 2023 01:33:06 +0000

The Biden administration today issued its vision for beefing up the nation’s collective cybersecurity posture, including calls for legislation establishing liability for software products and services that are sold with little regard for security. The White House’s new national cybersecurity strategy also envisions a more active role by cloud providers and the U.S. military in disrupting cybercriminal infrastructure, and names China as the single biggest cyber threat to U.S. interests.

Read more

For Apple’s enterprise success, endpoint management is the new black

Yet more data shows the acceleration of Mac adoption in the business world.

Okta’s recent Businesses at Work 2023 report shared numerous insights into the state of enterprise IT. One in particular grabbed my attention: endpoint management and security tools have become the most popular category of security product across the enterprise, with some players achieving really significant growth, partly on the back of their Mac support.

The data: Jamf Pro has seen 428% customer growth across the last four years, while smaller vendor Kandji experienced a 172% increase in its customer base in just the last year.

To read this article in full, please click here

Read more

Microsoft Intune Suite consolidates endpoint management and protection

Microsoft has launched the general availability of Microsoft Intune Suite, a consolidation of its endpoint management and security solutions to streamline protection for cloud-connected and on-premises endpoints. 

The consolidation is aimed to serve as a single vendor for all endpoint security needs for the customers to have single analytics, rather than multiple disparate datasets, with a consistent visibility to potential vulnerabilities and anomalies, according to a company blog post.

To read this article in full, please click here

Read more

Apple’s MFi scheme for USB-C is a good thing

Apple appears poised to make it more difficult to use cheap USB-C cables with its devices, and while it may well make a few dollars more from the purported plan, there are also good reasons to put the system in place.

Apple got to make a dollar or two

The claim is that Apple plans to replace Lightning ports and cables with USB-C in the iPhone 15, and when it does it will introduce a Made For iPhone (MFi) scheme for such products.  The idea is that consumers will be able to purchase cables and other devices in full confidence that they will be compatible with their iPhone.

To read this article in full, please click here

Read more

Hackers Claim They Breached T-Mobile More Than 100 Times in 2022

Credit to Author: BrianKrebs| Date: Tue, 28 Feb 2023 16:14:57 +0000

Three different cybercriminal groups claimed access to internal networks at communications giant T-Mobile in more than 100 separate incidents throughout 2022, new data suggests. In each case, the goal of the attackers was the same: Phish T-Mobile employees for access to internal company tools, and then convert that access into a cybercrime service that could be hired to divert any T-Mobile user’s text messages and phone calls to another device.

Read more

Software bugs that bug me – and how to swat them down

Nearly every day, software updates of some kind roll out for our systems. From operating systems to antivirus software, to cloud services, to hardware devices, virtually none of the technology we use is static. And with these updates come side effects and problems that sometimes take a while to get fixed.

I recently found an interesting bug that hasn’t gotten a lot of attention when I purchased a Lexmark multi-function printer. As part of the installation process, I went online to download the latest printer driver. (I always recommend going to a vendor website to grab the latest drivers because, after all, the latest software should have the latest fixes, right?) I was able to set up the printer to print, scan, and electronically fax and figured I was done for the day.

To read this article in full, please click here

Read more