MobileIron adds Apple security along with support for iOS 11

Credit to Author: Lucas Mearian| Date: Tue, 05 Sep 2017 21:04:00 -0700

Enterprise mobility management (EMM) software vendor MobileIron today announced its Apple release, aimed at the growing need for enterprises to provide IT managers with more robust management and security features for Macs.

While Windows and even Chrome-based laptops are already included in EMM consoles, macOS hardware has traditionally been treated as an outlier in the office, according to Nick McGuire, vice president of Enterprise Research at CCS Insight.

While MobileIron’s software suite already supported macOS for basic functions, including device configuration, millennials entering the workforce favor Apple’s line of laptops – driving the need for a unified endpoint management strategy that includes security and bulk licensing, according to Ojas Rege, MobileIron’s chief strategy officer.

To read this article in full or to leave a comment, please click here

Read more

iCloud security: How (and why) to enable two-factor authentication

Credit to Author: Michael deAgonia| Date: Fri, 18 Aug 2017 03:11:00 -0700

Given that so many of the details of our digital lives are either with us (on our smartphones) or easily accessible (via the web), you should be doing everything you can to protect that information and data. On iPhones and iPads, data is largely kept in a vault, sealed behind strong encryption and (hopefully) a strong password. Even if the device is lost or stolen, chances are good that encryption will keep data safe. (That vault is secure enough to frustrate even the FBI.)

Although iOS devices are designed and built to be secure, data is also stored and accessible online. With security breaches occurring routinely, your data is vulnerable to anyone in the world with an internet connection and a halfway decent browser. If a breach occurs and thieves gain access to your email and password, they can easily reset any account linked to that email, change the password, and lock you out of your own data.

To read this article in full or to leave a comment, please click here

Read more

Verifying and testing that Firefox is restricted to TLS 1.2

Credit to Author: Michael Horowitz| Date: Sun, 16 Jul 2017 12:56:00 -0700

TLS is the protocol invoked under the covers when viewing secure websites (those loaded with HTTPS rather than HTTP). There are multiple versions of the TLS protocol, and the most recent version, 1.2, is the most secure. Last time, I discussed tweaking Firefox so that it only supports TLS version 1.2 and not the older versions (1.0 and 1.1) of the protocol.

But that begs the question: what happens when a security-reinforced copy of Firefox encounters a website that does not support TLS 1.2? The answer is shown below.

To read this article in full or to leave a comment, please click here

Read more

Restricting Firefox to TLS version 1.2 makes browsing safer

Credit to Author: Michael Horowitz| Date: Thu, 13 Jul 2017 19:43:00 -0700

Although its common to think of a secure website as the opposite of an insecure one, the choice is not, in fact, binary. For a website to be truly secure, there are about a dozen or so ducks that all need to be lined up in a row.

Seeing HTTPS does not mean that the security is well done, secure websites exist in many shades of gray. Since web browsers don’t offer a dozen visual indicators, many sites that are not particularly secure appear, to all but the most techie nerds, to be secure nonetheless. Browser vendors have dumbed things down for non-techies.

Last September, I took Apple to task for not having all their ducks in a row, writing that some of their security oversights allowed Apple websites to leak passwords.

To read this article in full or to leave a comment, please click here

Read more

The paranoid Mac traveler’s 10-point data protection checklist

Credit to Author: Richard Hoffman| Date: Fri, 30 Jun 2017 03:01:00 -0700

Here’s an increasingly common scenario: You’re on a business trip, either entering a foreign country or returning home. As you go through customs, a border-control agent asks you to turn on and hand over your iPhone, then starts poking around, looking at your text messages, call logs and apps. The agent then asks you to wake your MacBook, log into your social media accounts and open your email. After the agent reads your tweets and posts for a few minutes, your phone and laptop are taken “for further inspection” — and returned some time later.

Alternatively, the equivalent of the Transportation Security Administration (TSA) in a foreign country declares that all laptops on international flights must be put in checked baggage — a scenario only narrowly averted a few weeks ago. Your company laptop is properly checked in, but when you arrive at your destination, you discover that not only has your bag been searched, but your laptop appears to have been opened and powered on.

To read this article in full or to leave a comment, please click here

Read more

How IT should prep for Apple's public OS betas

Credit to Author: Ryan Faas| Date: Thu, 22 Jun 2017 09:22:00 -0700

As has become Apple’s standard practice in recent years, the company will soon roll out public betas of iOS 11 and macOS High Sierra. Both are expected to arrive by the end of June.

Public betas can be useful for Apple and other tech companies. They accelerate feedback and can ensure that bugs — including ones that internal testing might not spot — get fixed before the final version of an operating system ships. And because public betas are exciting for early adopters who want to play with new features of an upcoming upgrade before everyone else, they tend to generate useful buzz.

To read this article in full or to leave a comment, please click here

Read more