{"id":1619433,"date":"2022-03-28T10:20:00","date_gmt":"2022-03-28T14:20:00","guid":{"rendered":"https:\/\/www.computerworld.com\/article\/1619433\/keeping-mac-users-safe-security-tips-for-small-and-midsize-businesses.html"},"modified":"2022-03-28T10:20:00","modified_gmt":"2022-03-28T14:20:00","slug":"keeping-mac-users-safe-security-tips-for-small-and-midsize-businesses","status":"publish","type":"post","link":"https:\/\/www.computerworld.com\/article\/1619433\/keeping-mac-users-safe-security-tips-for-small-and-midsize-businesses.html","title":{"rendered":"Keeping Mac Users Safe: Security Tips for Small and Midsize Businesses"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<div id=\"remove_no_follow\">\n<body><div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n\t\t\t\t\t  <div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n\t\t\t\t\t\t<div class=\"article-column__content\">\n\t\t\t<section class=\"wp-block-bigbite-multi-title\"><div class=\"container\"><\/div><\/section>\n\t\t\t\n\t\t\t<p>Cyberattacks have grown in scope and tactics, and Apple devices &mdash; often, but incorrectly, thought of as &lsquo;immune&rsquo; to viruses and other threats &mdash; are becoming bigger targets.<\/p>\n<p>In February, researchers issued a second warning about Silver Sparrow malware, which first came to light in November 2021 on Apple&rsquo;s latest M1 chip. As of mid-February, Silver Sparrow had <a href=\"https:\/\/threatpost.com\/silver-sparrow-malware-30k-macs\/164121\/\" rel=\"nofollow noopener\" target=\"_blank\">already infected over 29,000 macOS devices<\/a> in 153 countries. Although it reportedly hasn&rsquo;t delivered any malicious payloads, <a href=\"https:\/\/redcanary.com\/blog\/clipping-silver-sparrows-wings\/\" rel=\"nofollow noopener\" target=\"_blank\">researchers called Silver Sparrow<\/a> &ldquo;a reasonably serious threat.&rdquo;<\/p>\n<p>Last year brought a slew of other Mac threats and attacks. In December, <a href=\"https:\/\/www.reuters.com\/technology\/exclusive-us-state-department-phones-hacked-with-israeli-company-spyware-sources-2021-12-03\/\" rel=\"nofollow noopener\" target=\"_blank\">Reuters<\/a> reported that the iPhones of at least nine U.S. State Department employees were hacked with spyware. In July, the Mac-targeting <a href=\"https:\/\/www.computerworld.com\/article\/1614637\/scary-malware-as-a-service-mac-attack-discovered.html\" target=\"_blank\">XLoader malware<\/a> &mdash; available for as little as $49 &mdash; was discovered. Early May found Apple releasing emergency fixes to its operating systems <a href=\"https:\/\/www.acronis.com\/en-us\/articles\/how-to-back-up-iphone\/?utm_source=idg&amp;utm_medium=referral&amp;utm_campaign=fy21-q4-idg-big-sp-8-mac_no_safe\" rel=\"nofollow noopener\" target=\"_blank\">on iPhones<\/a>, iPads and Apple Watches, which came on the heels of an update Apple issued one month earlier for those same devices to fix a vulnerability.<\/p>\n<p>These developments should serve as a wake-up call to small and midsize businesses (SMBs) that better data protection is required for Apple devices, which are at greater risk than ever from cyberattacks.<\/p>\n<p>Mac-targeting malware may historically have been uncommon, but that&rsquo;s simply no longer the case, explains Kevin Reed, CISO at Acronis. &ldquo;The market share of Macs has grown and it has become profitable to create malware for it. In the past, this simply was not cost-justified.&rsquo;&rsquo;<\/p>\n<p>Ransomware remains the biggest threat to Apple devices, followed by <a href=\"https:\/\/www.investopedia.com\/terms\/b\/banker-trojan.asp#:~:text=%20Key%20Takeaways%20%201%20A%20banker%20Trojan,if%20downloaded%20and%20installed%20onto%20a...%20More%20\" rel=\"nofollow noopener\" target=\"_blank\">banker trojans<\/a>, Reed says. Targeted malware from <a href=\"https:\/\/resources.infosecinstitute.com\/topic\/remote-access-tool\/#:~:text=Remote%20Access%20Tool%20is%20a%20piece%20of%20software,are%20known%20as%20a%20Remote%20Access%20Trojan%20%28RAT%29.\" rel=\"nofollow noopener\" target=\"_blank\">remote access tools\/trojans (RATs)<\/a> is another significant concern because often an attacker can control a system without a user&rsquo;s knowledge. &ldquo;In some sense, Macs are more vulnerable here, because not all developers provide protection for them,&rsquo;&rsquo; according to Reed.<\/p>\n<p>There is good news, says Reed. &ldquo;iOS devices are more secure in terms of [attackers attempting to deliver] off-the-shelf malware. With Android, attacks happen due to &lsquo;alternative stores&rsquo; and direct downloads, which is not possible on iOS; hence, low-end malware is rare.&rdquo;<\/p>\n<p>The other good news is that Apple has become a co-chair of the <a href=\"https:\/\/cyberreadinessinstitute.org\/\" rel=\"nofollow noopener\" target=\"_blank\">Cyber Readiness Institute<\/a>, which helps SMBs improve security practices with free resources and tools. With more businesses letting employees work in a hybrid model, there is a growing need to tighten security on mobile devices.<\/p>\n<p><strong>How SMBs should respond<\/strong><\/p>\n<p>First and foremost, SMBs should ensure they are applying patches across all endpoints on the network to fix vulnerabilities that are discovered seemingly daily. The Foundry <a href=\"https:\/\/foundryco.com\/tools-for-marketers\/research-security-priorities\/\" target=\"_blank\">2021 Security Priorities Study<\/a> found that unpatched software is one of the leading causes of security incidents.<\/p>\n<p>However, patches can only do so much if security gaps are left open. Effective security may be a struggle for SMBs, which typically have limited budgets and in-house expertise. Because they are focused on maintaining IT infrastructure on a daily basis, managing patches across multiple security systems is not always treated as high-priority.<\/p>\n<p>The next step is developing vulnerability assessments. SMBs need visibility into their infrastructure, which requires having a current inventory of all devices and programs. This strategy will help detect hosts that are vulnerable, and automated patch updates can then be applied accordingly.<\/p>\n<p>Make sure antivirus and data protection software is in place to protect <a href=\"https:\/\/www.acronis.com\/en-us\/products\/true-image\/features\/mac-backup\/?utm_source=idg&amp;utm_medium=referral&amp;utm_campaign=fy21-q4-idg-big-sp-8-mac_no_safe\" rel=\"nofollow noopener\" target=\"_blank\">macOS workstations<\/a>, just as you would secure your Windows PCs. Extend protection to mobile devices with a <a href=\"https:\/\/www.acronis.com\/en-us\/products\/true-image\/features\/backup-your-mobile\/?utm_source=idg&amp;utm_medium=referral&amp;utm_campaign=fy21-q4-idg-big-sp-8-mac_no_safe\" rel=\"nofollow noopener\" target=\"_blank\">robust backup and recovery solution<\/a>.<\/p>\n<p>Finally, educate users on the risks of downloading apps from a third-party store and advise them to trust their gut. If apps are asking for information users are not comfortable giving, they shouldn&rsquo;t provide it.<\/p>\n<p><em>Discover how to better secure your Mac users. Visit <\/em><a href=\"https:\/\/www.acronis.com\/en-us\/solutions\/backup\/endpoints\/?utm_source=idg&amp;utm_medium=referral&amp;utm_campaign=fy21-q4-idg-big-sp-8-mac_no_safe\" rel=\"nofollow noopener\" target=\"_blank\"><em>Acronis<\/em><\/a><em>.<\/em><\/p><\/div><\/div><\/div>\n<\/body><\/div>","protected":false},"excerpt":{"rendered":"<p>Cyberattacks have grown in scope and tactics, and Apple devices &mdash; often, but incorrectly, thought of as &lsquo;immune&rsquo; to viruses and other threats &mdash; are becoming bigger targets. In February, researchers issued a second warning about Silver Sparrow malware, which first came to light in November 2021 on Apple&rsquo;s latest M1 chip. As of mid-February, [&hellip;]<\/p>\n","protected":false},"author":1206,"featured_media":100006214,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"__idg_published_ids":[],"__idg_published_status":"draft","embargo_date":"","multi_title":"{\"titles\":{\"headline\":{\"value\":\"Keeping Mac Users Safe: Security Tips for Small and Midsize Businesses\",\"additional\":{\"headline_subheadline\":\"There&rsquo;s a misperception that macOS and iOS devices are immune to cyberthreats, but that&rsquo;s clearly not the case. \",\"headline_desc\":\"There&rsquo;s a misperception that macOS and iOS devices are immune to cyberthreats, but that&rsquo;s clearly not the case. \",\"short_title\":\"\"}},\"seo\":{\"value\":\"\",\"additional\":{\"seo_slug\":\"keeping-mac-users-safe-security-tips-for-small-and-midsize-businesses\",\"seo_desc\":\"\",\"seo_canonical_url\":\"\"}},\"social\":{\"value\":\"\",\"additional\":{\"social_desc\":\"\"}}},\"subtitles\":[]}","old_id_in_onecms":"3654953","_idg_updated_flag":false,"_idg_updated_date":"","hreflang_xdefault":0,"content_type":"BrandPost","suppress_html_meta":"{}","byline":"","featured_video_id":0,"supress_floating_video":false,"prevent_index":0,"has_duration":0,"teaser_paragraphs":"","is_translated_post":0,"idg_original_post_id":0,"idg_translated_post_ids":[],"idg_original_post_publication":"","idg_original_post_language":"","idg_original_post_brand":"","reviews":null,"suppress_monetization":"{}","is_premium":0,"external_post_link":"","suppress_fake_sidebar":"{}","first_published_date":"","hide_featured_image_for_post":false,"post_featured_image_nocaption":true,"post_featured_image_caption":"","automatic_content_time":4,"manual_content_time":0,"most_popular_author":true,"more_from_author":true,"footnotes":""},"categories":[2644],"tags":[],"languages":[21],"editions":[19],"publication":[9,10],"territory":[],"story_types":[33],"article_type":[6751],"sponsorships":[2985],"blogs":[],"podcast_series":[],"origin":[6752],"coauthors":[6966],"class_list":{"0":"post-1619433","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apple","8":"languages-en","9":"editions-us","10":"publication-computerworld","11":"publication-us-default","12":"story_types-brandpost","13":"article_type-default","14":"sponsorships-a-modern-approach-to-data-protection-3476","15":"origin-onecms"},"jetpack_featured_media_url":"https:\/\/www.computerworld.com\/wp-content\/uploads\/2024\/03\/istock-503734384-100922922-orig.jpg?quality=50&strip=all","eyebrow":{"eyebrow":"brandpost","eyebrow_style":"default","eyebrow_feed_title":"brandpost","eyebrow_feed_style":"default"},"review_score":null,"article_type_name":["default"],"author_name":"Esther Shein","author_meta":[{"authorID":1206,"name":"Esther Shein","url":"https:\/\/www.computerworld.com\/profile\/esther-shein\/","img":{"media_id":100050932,"full":"https:\/\/www.computerworld.com\/wp-content\/uploads\/2025\/04\/1206-0-90807200-1745434846-esther2014-cropped-100741042-orig.jpg?quality=50&strip=all"},"defaultUrl":"https:\/\/secure.gravatar.com\/avatar\/6bd92fd69a45fa880f317c6af7262506b6b720894db236d6bf4c15372c98a058?s=96&d=mm&r=g","profileImage":"<img data-hero alt=\"Esther Shein\" src=\"https:\/\/www.computerworld.com\/wp-content\/uploads\/2025\/04\/1206-0-90807200-1745434846-esther2014-cropped-100741042-orig.jpg?quality=50&#038;strip=all&#038;w=250\" class=\"author_photo\" height=\"250\" width=\"250\" \/>","job_title":"Contributing writer"}],"multiple_name":"Esther Shein","_embedded":"Esther Shein","_links":{"self":[{"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/posts\/1619433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/users\/1206"}],"replies":[{"embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/comments?post=1619433"}],"version-history":[{"count":0,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/posts\/1619433\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/media\/100006214"}],"wp:attachment":[{"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/media?parent=1619433"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/categories?post=1619433"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/tags?post=1619433"},{"taxonomy":"languages","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/languages?post=1619433"},{"taxonomy":"editions","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/editions?post=1619433"},{"taxonomy":"publication","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/publication?post=1619433"},{"taxonomy":"territory","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/territory?post=1619433"},{"taxonomy":"story_types","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/story_types?post=1619433"},{"taxonomy":"article_type","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/article_type?post=1619433"},{"taxonomy":"sponsorships","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/sponsorships?post=1619433"},{"taxonomy":"blogs","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/blogs?post=1619433"},{"taxonomy":"podcast_series","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/podcast_series?post=1619433"},{"taxonomy":"origin","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/origin?post=1619433"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.computerworld.com\/wp-json\/wp\/v2\/coauthors?post=1619433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}