How 'Bout Them Apples? 

A lot of people ask us if Apple devices are immune to hackersUnfortunately not—all apples can spoil, including Apple iPhones, iPads, and Macs. We’ll give credit where credit is due, Apple has invested a great deal in security and their track record shows it. However, it’s not perfect and we’re seeing more and more instances creep up.

Case in point, last week Apple released a software update for iPhones (iOS) and Mac computers (macOS) which fixed a flaw in their WiFi chips. This security flaw gave hackers the ability to take over an Apple device if in wireless range.

If you haven’t updated your Apple device software, do it now!

Apple does work hard to keep security strong. One way is by reviewing and approving every single application before it is put on the App Store. This process helps avoid a 3rd party app developer releasing a malicious game or application. A great concept in theory, but Symantec reported cyber criminals were able to sneak fake shopping apps into the App Store right before the holiday season. Shortly after, they were able to update the apps with malware—after the application was already approved.

Hackers figured out a process to bypass Apple’s stringent approvals and we’re sure they’ll keep trying—after all, they’re known to always be one step ahead!

Ransomware made the spotlight with the huge releases of WannaCry and Petya affecting millions of computers worldwide. If you missed it, check out our cover articleThe truth is, Apple devices are not protected from all ransomware. In a recent UK report, cyber criminals touted ransomware that targeted Apple owners available on the dark web. Cybersecurity researchers were able to obtain a copy and confirmed that it was in fact ransomware for Apple devices that successfully encrypted files and locked out users.

In today’s world, we shouldn’t expect that any device is secure or perfecteven an Apple device.

As an organization it’s important to build a program of framework, culture, and technology:

  • Ensure you are prepared with an incident response plan, just in case you do experience a breach.
  • Develop a cybersecurity culture and train your team on how to avoid phishing emails and other cyberattacks.
  • Protect all devices—including your Apple devices—with state of the art antivirus and advanced malware protection.

Also, if you are storing sensitive data on your iPhone, consider introducing a mobile management solution. One that allows you to lock and wipe remotely in case of loss or theft—yours and your employees, from one central location.

One thing we know for sure… an apple a day won’t keep the hackers away!

Stay Safe,

Your Friends @ Defendify

Resources & insights

Why You Could Be Denied Cyberattack Insurance Coverage
Blog
Why You Could Be Denied Cyberattack Insurance Coverage
As you’re working toward achieving robust cybersecurity, the subject of cyber attack insurance coverage and cybersecurity insurance requirements is sure to enter the discussion.
Cost of a Cyberattack vs. Cybersecurity Investment
Blog
Cost of a Cyberattack vs. Cybersecurity Investment 
Detailing the cost of a cyberattack versus the ROI of a cybersecurity investment enables leadership to see cybersecurity solutions are worth it.
Defendify Listed as a High Performer in Six G2 Grid Categories
Blog
Defendify Listed as a High Performer in Six G2 Grid Categories
The Defendify Cybersecurity Platform has been listed as a High Performer in six Summer 2022 Data Security Software Category Reports on the technology review site G2.

Protect and defend with multiple layers of cybersecurity

Defend your business with All-In-One Cybersecurity®.

Explore layered
security

Learn more about Defendify’s three key layers and All-In-One Cybersecurity®.

How can we help?

Schedule time to talk to a cybersecurity expert to discuss your needs.

See how it works

See how Defendify’s platform, modules, and expertise work to improve security posture.

Take the first step toward comprehensive cybersecurity with a free Defendify Essentials package

Gain access to 3 award-winning cybersecurity modules. Nothing to install. Nothing to pay for.