Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 
 

Mac Malware

In the past, few viruses have targeted Apple operating systems — but this is gradually changing. The increased popularity of Apple smart devices has led some cybercriminals to exploit a traditionally ignored audience. IT admins needs to educate their users about this growing threat and implement a business antivirus solution for Macs as they do for PCs.

http://www.youtube.com/watch?v=MOflZBB4qGc

Comments
John Mcnamara June 27, 20129:33 pm

For me, where this creates the biggest threat is the lack of quality security tools on mobile and smart devices, which serve as an open door for malware to climb onto a network when a device connects to it. If the reliance and adoption of these devices continues to grow unchecked without the full support of major antivirus and firewall creators, it will persist as a viable security threat to any network.

Gerry Tanil June 30, 20125:46 pm

The minute anyone accepts the perception that his or her devices are “impenetrable” is when he or she becomes vulnerable. No one should be complacent when it comes to security. Impenetrability really is a myth propagated more by marketers than the platform developers.

It is always to the business’ best interest to deploy various security solutions to avoid exposing the company’s and its employees’ data.

Although, I am also an advocate for proper education of employees regarding the risks, it is always good to arm the company with technologies with the assumption that employees, though informed, won’t care, as that is often the case. I have yet to see a very effective employee education program about technology security risks.

 

Related Videos

 

Ten things administrators should never do

on June 6, 2012

Being a system administrator is a great job if you love juggling conflicting priorities, managing infinite to-do lists, annoying users and facing ever-changing technologies. In a busy environment, there are corners you can cut and those you really shouldn’t. There …

2

The Four Main Benefits of Automatic Patch Management

on May 30, 2012

Imagine having fully patched, fully protected computers without the days of planning, hours of downtime and the onerous job of applying them by hand. Imagine a place where you could automate the download and installation of patches across an entire …

3

The Perils of Public Wireless Networks

on April 18, 2012

We access Wi-Fi hotspots both for work and for play — but how much thought do we give security? Are administrators — and their users — fully aware of the risks of surfing openly on a public wireless network? This …

3

Why you Need to run a Vulnerability Assessment

on April 11, 2012

The old saying, “prevention is better than cure”, is as true today as it ever was – and it definitely applies to information security. But to protect against actual and potential network vulnerabilities, you first need to know what they …

1

10 Free Tools for Network Administrators

on March 21, 2012

Are you an administrator who wishes to reduce and facilitate your daily workload? If so, this video’s for you: It contains a list of free software tools that will be of tremendous assistance to the typical SMB (small and medium-size …

3