Thwart targeted attacks with a layered approach to network security

Thwart targeted attacks with a layered approach to network security

If you think that running a strong antivirus program, or running Macs instead of PC’s keep you safe from aggressive cyber attacks – think again. If you’re serious about protecting your IT assets, it’s time to get proactive about your platform and think hard about vendor consolidation.

[Read more…]

The Top 3 Questions Asked About Mac OS X Mavericks

The Top 3 Questions Asked About Mac OS X Mavericks

When Apple® introduced the new MacBook Pro® with Retina® display late in October, they also unveiled the latest version of Mac® OS X® operation system, Mavericks. With over 200 new features it quickly reached critical acclaim – especially considering the upgrade is free for users as far back as Snow Leopard.

Unbeknownst to the average user, Apple introduced a lot of new business features into Mac OS X Mavericks, which Apple has outlined in their new Mac in Enterprise Webinar series . In order to prepare our clients for the change, and understand the new features, Softchoice recently hosted a webinar. We asked clients to submit questions they have about Mac – and we discovered some interesting trends. Here are the top 3 questions we are routinely asked by clients regarding Mac OS X Mavericks.

[Read more…]

6 Things Every Smart IT Manager Knows About Mac Security

macsecurity

Many people believe the Mac® is more secure than PCs, and that hackers don’t waste time on them. Forrester has even reported that a Mac is “more secure than a Windows machine,” as “historically there have been relatively few intrusions on a Mac.”

However, the Mac has become commonplace in the enterprise and 50% of businesses now issue them to employees. This means the Mac is becoming an attractive target.

According to a Kaspersky Security Bulletin, the main reason why cyber-criminals are targeting the Mac is because “Apple® products are popular with many influential politicians and prominent businessmen, and the information stored in the devices owned by these people is of interest to a certain category of cyber-criminal”.

While Mac OS X® has strong built-in security features, there are six specific things smart IT managers already do to protect their organizations from breaches and data loss – without investing in expensive security solutions to get started.

[Read more…]