Experts Say Apple Will See Even More Cyberattacks in 2017


For years, users of Apple desktops and laptops have generally been isolated from the cyber-attacks that target Microsoft PCs. However, according to TrendMicro, Apple is being targeted more than ever before by hackers.

Apple devices are gaining market share from Microsoft in computing devices. ExtremeTech reports that Microsoft dropped below 90% in US market share for the first time in years. Also, IDC stated that Apple’s Mac shipments rose nearly 6% each year. In addition, TrendMicro states that declining PC sales and the switch to mobile devices lowered the interest in targeting devices running on Windows.

Cybercriminals will plan attacks that will make the most money by targeting the largest group of users they can reach. While Windows devices users are still the biggest group by far, Mac use is steadily increasing. As the platform popularity increases, the chances of a cyber-attack will increase as well. The cyber criminals deciding to attack Apple devices see a group of users that are typically wealthier than Microsoft PC users and do not secure their products as much.

How can I keep our Apple devices secure?
If you think Apple devices can’t get hacked, think again: Don’t click on everything you see because you are on an Apple device and think you’re safe from cyber-attacks. No device is immune to cyber security threats. You should protect Apple devices with as tough of security as Microsoft PCs.
Keep the operating system up to date: Apple will find security vulnerabilities on their devices on occasion and send fixes as they happen. Also, the operating system uses gatekeeper software called XProtect that work in the background to protect malware from running on your device. The program blacklists individual pieces of malware and inspects each file you download. It also restricts the types of programs you can run on your device. XProtect is updated through Apple’s normal software update process.
Run anti-virus/anti-malware scans regularly: The XProtect software does not remove existing infections and does not clean in the background. You’ll need to use a separate endpoint protection program to complete these duties.
Be careful with what you click on: As with any device, don’t open unexpected email attachments and do not download files without checking the credibility of the source.
Set up an entry password for each device: Lock your screen whenever you leave your device unattended. Also, use a complicated password with a mix of upper/lower case letters, numbers, and symbols.
Backup computers regularly: In case your computer does get a virus, your IT company will be able to restore your computer to the latest working version available.
Set up policies and procedures for technology use: Establish your policy for proper use of email, internet browsing, collaboration software, and social media.

To learn more about our IT services, contact us at This email address is being protected from spambots. You need JavaScript enabled to view it. or 877-794-3811.


Trend Micro. Will Apple see even more cyber attacks in 2017? Experts say “yes”. (2017, March 6). Retrieved from:
Hruska, J. Windows drops below 90% market share for the first time in years; Windows 7 falls below 50%. (2016, May 3). Retrieved from:


Contact us at 877-794-3811 or [email protected] for Professional IT Support

get in touch