CybersecurityMac computer

For years, users of Apple desktops and laptops have generally been isolated from the cyber-attacks that target Microsoft PCs. However, according to TrendMicro, Apple is being targeted more than ever before by hackers.

Apple devices are gaining market share from Microsoft in computing devices. ExtremeTech reports that Microsoft dropped below 90% in the US market share for the first time in years. Also, IDC stated that Apple’s Mac shipments rose nearly 6% each year. In addition, TrendMicro states that declining PC sales and the switch to mobile devices lowered the interest in targeting devices running on Windows.

Cybercriminals will plan attacks that will make the most money by targeting the largest group of users they can reach. While Windows devices users are still the biggest group by far, Mac use is steadily increasing. As the platform’s popularity increases, the chances of a cyber-attack will increase as well. The cybercriminals deciding to attack Apple devices see a group of users that are typically wealthier than Microsoft PC users and do not secure their products as much.

How can you secure your Apple devices?

  • If you think Apple devices can’t get hacked, think again: Don’t click on everything you see because you are on an Apple device and think you’re safe from cyber-attacks. No device is immune to cybersecurity threats. You should protect Apple devices with as tough of security as Microsoft PCs.
  • Keep the operating system up to date: Apple will find security vulnerabilities on their devices on occasion and send fixes as they happen. Also, the operating system uses gatekeeper software called XProtect which works in the background to protect malware from running on your device. The program blacklists individual pieces of malware and inspects each file you download. It also restricts the types of programs you can run on your device. XProtect is updated through Apple’s normal software update process.
  • Run anti-virus/anti-malware scans regularly: The XProtect software does not remove existing infections and does not clean in the background. You’ll need to use a separate endpoint protection program to complete these duties.
  • Be careful with what you click on: As with any device, don’t open unexpected email attachments, and do not download files without checking the credibility of the source.
  • Set up an entry password for each device: Lock your screen whenever you leave your device unattended. Also, use a complicated password with a mix of upper/lower case letters, numbers, and symbols.
  • Backup computers regularly: In case your computer does get a virus, your IT company will be able to restore your computer to the latest working version available.
  • Set up policies and procedures for technology use: Establish your policy for proper use of email, internet browsing, collaboration software, and social media.

To learn more about our IT security services, contact us at info@swifttechsolutions.com or 877-794-3811.

SOURCES
Trend Micro. Will Apple see even more cyber attacks in 2017? Experts say “yes”. (2017, March 6). Retrieved from: http://blog.trendmicro.com/will-apple-see-even-more-cyber-attacks-in-2017-experts-say-yes/
Hruska, J. Windows drops below 90% market share for the first time in years; Windows 7 falls below 50%. (2016, May 3). Retrieved from: https://www.extremetech.com/computing/227693-windows-drops-below-90-market-share-for-the-first-time-in-years-windows-7-falls-below-50