6 Things Every Smart IT Manager Knows About Mac Security

macsecurity

Many people believe the Mac® is more secure than PCs, and that hackers don’t waste time on them. Forrester has even reported that a Mac is “more secure than a Windows machine,” as “historically there have been relatively few intrusions on a Mac.”

However, the Mac has become commonplace in the enterprise and 50% of businesses now issue them to employees. This means the Mac is becoming an attractive target.

According to a Kaspersky Security Bulletin, the main reason why cyber-criminals are targeting the Mac is because “Apple® products are popular with many influential politicians and prominent businessmen, and the information stored in the devices owned by these people is of interest to a certain category of cyber-criminal”.

While Mac OS X® has strong built-in security features, there are six specific things smart IT managers already do to protect their organizations from breaches and data loss – without investing in expensive security solutions to get started.

[Read more...]

How to Secure the Cloud with Symantec O3

How to Secure the Cloud with Symantec O3

A recent blog post by Softchoice security expert Stephen Perciballi outlines the challenges faced by organizations that use third-party services to store their data. He points out that while it’s not unusual for companies to spend thousands, or even millions of dollars securing their corporate data center, a single critical file saved by an employee to a less-than-secure consumer Cloud solution circumvents it all.

IT managers are well aware of this risk and worry about hackers getting hold of user login credentials, and the potential for viruses, Trojans and malware to infiltrate sensitive corporate information. In the worst-case scenario, these propagate right up to the server level in a DDoS attack – to bring it all down.

The fact is users enjoy the collaboration and productivity third-party Cloud SaaS apps provide. And all they need is a credit card to access an app like Yammer from the office, cottage, or coffee shop. This puts IT Managers in a bit of a quandary. Do they take the unpopular but safe approach and block Cloud SaaS apps altogether? And is that even possible? Or, do they accept these changing times – and a changing workforce – and work with users to make access to third party Cloud SaaS apps secure?

[Read more...]

Four Things You Need to Do to Protect your VMs

Four Things You Need to Do to Protect your VMs

According to Frank Gens, IDC Senior VP & Chief Analyst at Trend Micro, the number one concern about cloud services is security.

As you know, physical firewalls don’t inspect or filter the vast amount of traffic that originates from a hypervisor running several virtualized servers. It turns out that this is a significant vulnerability when you consider that VMs start, stop, and move from one hypervisor to another at the click of a button.

Additionally, few hypervisors have the access controls that even the most basic file server has, and once someone gains access to the hypervisor, they could potentially access and control all of the VMs housed there.

Finally, protective features have to handle all these movements and activities, and agent backups are complex to manage — with one agent required per VM.

Even with the vulnerabilities clearly spelled out, many IT managers may still have “secure the hypervisor” way down on their to-do list – there are just so many priorities. That’s fine, of course – until the unthinkable happens.

So how should IT Managers protect VMs? Here are the four key things to consider:

[Read more...]