{"id":16940,"date":"2019-11-20T08:30:43","date_gmt":"2019-11-20T16:30:43","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/11\/20\/news-10677\/"},"modified":"2019-11-20T08:30:43","modified_gmt":"2019-11-20T16:30:43","slug":"news-10677","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/11\/20\/news-10677\/","title":{"rendered":"Security lessons from a Mac-only fintech company"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/07\/edge-computing_budgets-up_spending_fintech_circuitry_ben-franklin-100765975-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Wed, 20 Nov 2019 07:43:00 -0800<\/strong><\/p>\n<p>Apple remains a highly secure choice for enterprise professionals, but security threats remain and the environment requires sophisticated endpoint management tools, confirmed <a href=\"https:\/\/buildamerica.com\/\" rel=\"noopener nofollow\" target=\"_blank\">Build America Mutual<\/a> (BAM) CTO, David McIntyre.<\/p>\n<p>BAM is one of the <a href=\"https:\/\/www.bondbuyer.com\/list\/top-municipal-bond-insurers\" rel=\"noopener nofollow\" target=\"_blank\">leading<\/a> U.S. municipal bond insurers and has insured over $65 billion since launch in 2012. It also has the rare distinction of being a fintech firm that is completely based on Macs.<\/p>\n<p>It has been an Apple-based enterprise since the start.<\/p>\n<p>\u201cThe founders all use Macs at home,\u201d McIntyre explained. \u201cWe said, let\u2019s try to build a financial firm that uses Macs.\u201d<\/p>\n<p>When the company launched, it also found most of its potential employees used Macs, so it made even more sense to standardize round Apple\u2019s platforms.<\/p>\n<p>\u201cWe thought it would be easier and would let a small team support the employees.\u201d<\/p>\n<p>McIntyre was speaking at the recent Jamf <a href=\"https:\/\/www.computerworld.com\/article\/3453641\/jnuc-2019-for-enterprise-pros-its-like-the-old-days-of-apple-events.html\">JNUC<\/a> event to talk about the recently announced <a href=\"https:\/\/www.jamf.com\/products\/jamf-protect\/\" rel=\"noopener nofollow\" target=\"_blank\">Jamf Protect<\/a> endpoint security solution, as noted <a href=\"https:\/\/www.computerworld.com\/article\/3453641\/jnuc-2019-for-enterprise-pros-its-like-the-old-days-of-apple-events.html\">here<\/a> and <a href=\"https:\/\/www.applemust.com\/jamf-protect-shows-the-future-for-mac-security-and-everyone-should-use-it\/\" rel=\"noopener nofollow\" target=\"_blank\">here<\/a>.<\/p>\n<p>The challenge his company faced is that it deals with financial transactions valued at billions of dollars for huge clients \u2013 and is also based in New York which has legendarily tough cybersecurity regulations.<\/p>\n<p>This means BAM must use the best security protection it can get.<\/p>\n<p>The company has learned as it grows \u2013 among other lessons it has learned that the security environment for even Apple\u2019s platforms is increasingly complicated.<\/p>\n<p>\u201cFive years ago, security was probably 10% of the jobs\u201d of the company\u2019s system admins, said McIntyre.<\/p>\n<p>\u201cNow probably 50-60% of their time is spent on cybersecurity,\u201d he added.<\/p>\n<p>\u201cNot just because of cybersecurity regulations, but also because we\u2019ve become a lot more aware of the security environment. It\u2019s a thing that keeps me up at night.\u201d<\/p>\n<p>Despite the size of its business, BAM is a small firm with just two system admins to handle the technical needs of its one hundred employees.<\/p>\n<p>Apple has a <a href=\"https:\/\/www.apple.com\/business\/docs\/resources\/macOS_Security_Overview.pdf\" rel=\"noopener nofollow\" target=\"_blank\">great reputation for security<\/a>, and usually moves fast to address platform-based threats, but those aren\u2019t the only exploits that exist on the platform.<\/p>\n<p>Regular security and OS updates and speedy response to most identified challenges mean the platform is innately robust, but while virus checkers and firewalls can provide permiter protection, most security researchers now agree that the threat environment demands a more complete insight into device and machine security.<\/p>\n<p>The challenge is that Mac malware does exist \u2013 and while Apple\u2019s platform has lots of built-in protection, the biggest security vulnerability tends to be the humans using the computers and the applications they choose to install on them.<\/p>\n<p>\u201cOne common way malware is distributed is by embedding it in a harmless-looking app,\u201d Apple states on a <a href=\"https:\/\/support.apple.com\/en-gb\/guide\/mac-help\/mh40596\/mac\" rel=\"noopener nofollow\" target=\"_blank\">support page<\/a>.<\/p>\n<p>When BAM started in business, it relied only on Apple\u2019s security.<\/p>\n<p>\u201cWe\u2019d always relied on software updates,\u201d said McIntyre. \u201cI hadn\u2019t realised the need for endpoint protection.\u201d<\/p>\n<p>He came to understand the need for tougher protection as his awareness of the big picture around Mac security grew and as the <a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/06\/june-was-a-busy-month-for-in-the-wild-mac-malware-heres-a-rundown\/\" rel=\"noopener nofollow\" target=\"_blank\">number of attempts<\/a> made against Apple\u2019s platforms continues to increase.<\/p>\n<p>BAM now uses Jamf\u2019s new endpoint security solution which has already protected it against threats.<\/p>\n<p>McIntryre told the JNUC audience of one of these:<\/p>\n<p>\u201cA few months ago, we had an alarm go off on Jamf Protect and at the same time our network stopped working,\u201d he said.<\/p>\n<p>\u201cIt turned out that one of our employees had downloaded the number one Chrome plug-in.\u201d<\/p>\n<p>The offending plug-in turned out to be a popular parcel tracking app that had \u201c50,000\u201d reviews, he said. Half of those reviews were positive, while the others described similar problems as his company faced, he said, calling it \u2018malware\u2019.<\/p>\n<p>BAM was able to isolate the problem and create a new set of rules through which to manage Mac security. These rules extended to the development of a white list of approved Chrome plug-ins.<\/p>\n<p>\u201cWe actually realised that Chrome browser plug-ins were a real Wild West,\u201d he said.<\/p>\n<p>Of course, not every Mac user has access to powerful enterprise security solutions.<\/p>\n<p>But the lessons for any Mac user should be the same as they always have been in cybersecurity:<\/p>\n<p>For more security tips for Mac users please <a href=\"https:\/\/www.computerworld.com\/article\/3237187\/lock-it-down-the-macos-security-guide-updated.html\">read this guide<\/a> (The report needs updating but still carries plenty of helpful suggestions).<\/p>\n<p>Please follow me on<em>\u00a0<a href=\"https:\/\/twitter.com\/jonnyevans_cw\" rel=\"nofollow\">Twitter<\/a>, or join me in the\u00a0<a href=\"https:\/\/mewe.com\/join\/appleholics_bar_and_grill\" rel=\"nofollow\">AppleHolic\u2019s bar &amp; grill<\/a>\u00a0and\u00a0<a href=\"https:\/\/mewe.com\/join\/apple_discussions\" rel=\"nofollow\">Apple Discussions<\/a>\u00a0groups on MeWe.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3454403\/security-lessons-from-a-mac-only-fintech-company.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/07\/edge-computing_budgets-up_spending_fintech_circuitry_ben-franklin-100765975-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Wed, 20 Nov 2019 07:43:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Apple remains a highly secure choice for enterprise professionals, but security threats remain and the environment requires sophisticated endpoint management tools, confirmed <a href=\"https:\/\/buildamerica.com\/\" rel=\"noopener nofollow\" target=\"_blank\">Build America Mutual<\/a> (BAM) CTO, David McIntyre.<\/p>\n<h2><strong>The Mac only bank<\/strong><\/h2>\n<p>BAM is one of the <a href=\"https:\/\/www.bondbuyer.com\/list\/top-municipal-bond-insurers\" rel=\"noopener nofollow\" target=\"_blank\">leading<\/a> U.S. municipal bond insurers and has insured over $65 billion since launch in 2012. It also has the rare distinction of being a fintech firm that is completely based on Macs.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3454403\/security-lessons-from-a-mac-only-fintech-company.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[2211,12014,21640,714],"class_list":["post-16940","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple","tag-browsers","tag-macs","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16940"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16940\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16940"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}