Written By Roark Pollock And Presented By Charles Leaver
Do you have Mac computers? That’s fine. I have one too. Are your’s locked down? If not, your business has a possibly major security weakness.
It’s a fallacy to believe that Macintosh computers are inherently secure and don’t have to be protected against hacking or malware. People think Macs are undoubtedly probably more secure than Windows desktops and notebooks, due to the style of the Unix-oriented kernel. Definitely, we see less security patches released for macOS from Apple, compared with security patches for Windows from Microsoft.
Less security defects is not absolutely no defects. And much safer doesn’t indicate 100% safe.
Examples of Mac Vulnerabilities
Take, for instance, the macOS 10.13.3 update, released on January 23, 2018, for the current variations of the Mac’s operating system. Like a lot of current computer systems running Intel processors, the Mac was susceptible to the Meltdown defect, which implied that malicious applications might be able to read kernel memory.
Apple had to patch this defect – along with lots of others.
For instance, another flaw might allow malicious audio files to perform random code, which might break the system’s security integrity. Apple needed to patch it.
A kernel flaw meant that a malicious application may be able to execute random code with kernel privileges, giving cyber criminals access to anything on the device. Apple needed to patch the kernel.
A flaw in the WebKit library indicated that processing maliciously crafted web content might result in arbitrary code execution. Apple needed to patch WebKit.
Another flaw meant that processing a malicious text message might result in application denial of service, locking up the system. Whoops. Apple had to patch that flaw too.
Do not Make The Exact Same Errors as Customers
Numerous customers, believing all the talk about how terrific macOS is, choose to run without protection, trusting the macOS and its built-in application firewall program to obstruct all manner of bad code. Problem: There’s no built-in anti virus or anti-malware, and the firewall program can only do so much. And many enterprises want to overlook macOS when it pertains to visibility for posture tracking and hardening, and threat detection/ hazard searching.
Customers often make these assumptions due to the fact that they do not know any better. IT and Security experts need to never ever make the same mistakes – we need to understand better.
If a Mac user sets up bad software, or adds a harmful internet browser extension, or opens a bad e-mail attachment, or clicks a phishing link or a nasty advertisement, their device is corrupted – similar to a Windows computer. But within the business, we have to be prepared to deal with these concerns, even with Mac computers.
So What Do You Do?
Exactly what do you need to do?
– Install anti virus and anti malware on business Macs – or any Mac that has access to your company’s material, servers, or networks.
– Monitor the state of Mac computers, just like you would with Windows machines.
– Be proactive in applying patches and fixes to Mac computers, once again, similar to with Windows.
You must likewise get rid of Macs from your business environment which are too old to run the latest version of macOS. That’s a lot of them, because Apple is pretty good at maintaining hardware that is older. Here is Apple’s list of Mac models that can run macOS 10.13:
– MacBook (Late 2009 or newer).
– MacBook Pro (Mid 2010 or newer).
– MacBook Air (Late 2010 or more recent).
– Mac mini (Mid 2010 or more recent).
– iMac (Late 2009 or more recent).
– Mac Pro (Mid 2010 or more recent).
When the next version of macOS comes out, some of your older machines may drop off the list. They ought to fall off your inventory as well.
At Ziften, with our Zenith security platform, we work hard to keep visibility and security feature parity between Windows systems, macOS systems, and Linux-based systems.
In fact, we’ve partnered with Microsoft to incorporate our Zenith security platform with Microsoft Windows Defender Advanced Threat Protection (ATP) for macOS and Linux monitoring and risk detection and response coverage. The combination allows customers to find, view, investigate, and react to innovative cyber-attacks on macOS computers (as well as Windows and Linux-based endpoints) straight within the Microsoft WDATP Management Console.
From our perspective, it has actually constantly been very important to give your security teams confidence that every desktop/ notebook endpoint is safeguarded – and thus, the enterprise is protected.
It can be hard to believe, 91% of enterprises say they have a number of Mac computers. If those computers aren’t secured, and also properly integrated into your endpoint security systems, the enterprise is not protected. It’s just that basic.