{"id":19597,"date":"2022-07-14T07:10:06","date_gmt":"2022-07-14T15:10:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/07\/14\/news-13330\/"},"modified":"2022-07-14T07:10:06","modified_gmt":"2022-07-14T15:10:06","slug":"news-13330","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/07\/14\/news-13330\/","title":{"rendered":"Endpoint security for Mac: 3 best practices"},"content":{"rendered":"<p><strong>Credit to Author: Bill Cozens| Date: Thu, 14 Jul 2022 14:35:10 +0000<\/strong><\/p>\n<p>If you\u2019re one of the <a href=\"https:\/\/www.parallels.com\/blogs\/mac-survey\/#:~:text=Today%2055%25%20of%20businesses%20use,%2Dsized%20enterprises%20(SMEs).\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">50% of small and medium-sized businesses (SMBs) that use Mac <\/a>devices today, chances are your IT and security teams have a ton of Mac endpoints to monitor.&nbsp;<\/p>\n<p>Securing that many endpoints can get really complex, really fast, especially when you consider that the common wisdom that <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/03\/mac-security-facts-and-fallacies\/\">Macs don\u2019t get malware<\/a> simply isn\u2019t true: in fact, <a href=\"https:\/\/www.malwarebytes.com\/resources\/malwarebytes-threat-review-2022\/index.html\">the number of malware detections on Mac jumped 200%<\/a> year-on-year in 2021.&nbsp;<\/p>\n<p>And it\u2019s not just malware you have to worry about with your Mac endpoints.&nbsp;<\/p>\n<p>Phishing attacks, vulnerability exploits, DDoS attacks, and much more threaten your company&#8217;s Macs at any time \u2014 and if any of them are successful, it could <a href=\"https:\/\/www.morphisec.com\/hubfs\/2020%20State%20of%20Endpoint%20Security%20Final.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">cost your business millions in lost productivity and information theft<\/a>.&nbsp;<\/p>\n<p>Needless to say, these are a lot of different threats to deal with when it comes to Mac endpoint security. But Thomas Reed, Director of Mac &amp; Mobile at Malwarebytes, is here to remind us of a few simple things we can do to make our Mac endpoints more secure.&nbsp;<\/p>\n<p>In this post, we break down three of Reed\u2019s best practices for endpoint security for Mac.&nbsp;<\/p>\n<h2>1. Update frequently<\/h2>\n<p>As in the Windows world, one of your top priorities needs to be keeping your Macs up to date \u2014 and by now we <a href=\"https:\/\/blog.malwarebytes.com\/business\/2022\/06\/security-vulnerabilities-5-times-that-organizations-got-hacked\/\">should all understand why<\/a>. Just consider the fact that 60% of companies say breaches <a href=\"https:\/\/www.syxsense.com\/thank-you-for-not-patching\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">could have been avoided<\/a> if they had patched known vulnerabilities.&nbsp;<\/p>\n<p>Tracking and patching vulnerabilities on macOS, however, is a little more difficult to do than on Windows.&nbsp;<\/p>\n<p>While Microsoft regularly advertises its security updates with its <a href=\"https:\/\/en.wikipedia.org\/wiki\/Patch_Tuesday\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Patch Tuesdays<\/a>,&nbsp; Apple slips in patches on an ad-hoc basis \u2014 meaning MacOS admins need to put in a little more legwork to keep their devices up-to-date.<\/p>\n<p>To ensure that you know about the latest updates for your Mac endpoints, there are two things you should do.<\/p>\n<ol>\n<li><strong>Sign up for Apple\u2019s <a href=\"https:\/\/lists.apple.com\/mailman\/listinfo\/security-announce\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">public security notifications and announcements mailing list<\/a><\/strong>. You\u2019ll get an email anytime Apple releases a patch for macOS.<\/li>\n<li><strong>Regularly check Apple\u2019s <a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">list of security updates and patches<\/a>.<\/strong> It provides patch names, patch information, affected devices, and release dates.<\/li>\n<\/ol>\n<p>Additionally, if you\u2019re like most businesses and find that having no common view of assets is causing you major delays in patching, you should <a href=\"https:\/\/www.malwarebytes.com\/cybersecurity\/business\/what-is-vulnerability-management\">consider a vulnerability management solution<\/a> that gives you <a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">instant visibility into potential vulnerabilities<\/a> across your macOS environment.<\/p>\n<h2>2. Use a DNS filter to stop web-based attacks<\/h2>\n<p>Since Macs have a much smaller amount of \u201ctraditional\u201d malware attacking them compared to Windows, you might think your endpoints are in the clear of cyberattacks.&nbsp;<\/p>\n<p>Not so.&nbsp;<\/p>\n<p>Instead of file-based malware, a lot of Mac users get attacked with <a href=\"https:\/\/www.malwarebytes.com\/adware\">adware<\/a> and <a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/02\/how-to-avoid-potentially-unwanted-programs\/\">PUPs<\/a> that are typically delivered through a number of web-based scams. These threats can throw advertisements up on your screen and slow your computer down, among other things.<\/p>\n<p>OK, that sounds annoying. But surely a few advertisements aren\u2019t too big a threat to your Mac endpoint security, right? <a href=\"https:\/\/blog.malwarebytes.com\/mac\/2020\/02\/mac-adware-is-more-sophisticated-dangerous-than-traditional-mac-malware\/\">Not quite<\/a>, says Thomas Reed.<\/p>\n<p>\u201cSome of the adware out there is more sophisticated than most of the malware that we see for Mac,\u201d Reed says. \u201cIt can do all kinds of stuff, like sending all your network traffic through a proxy or changing system settings to be less secure.\u201d<\/p>\n<p>Reed also mentions that a lot of adware and PUPs are part of the payload of scam sites that direct you to some kind of installer that you download \u2014 and so having some sort of web-based protection is vital. That\u2019s where <a href=\"https:\/\/www.malwarebytes.com\/cybersecurity\/business\/what-is-dns-filtering\">DNS filtering comes in<\/a>.<\/p>\n<p>\u201cThe source of all of these kinds of attacks is through the web, and DNS filtering can help with that by blocking some of those sites,\u201d Reed says.<\/p>\n<p>DNS filtering <a href=\"https:\/\/www.malwarebytes.com\/business\/dns-filtering\">blocks connections<\/a> to malicious web servers attempting to deliver malware payloads, so any business interested in Mac endpoint security should have it. Learn more about the ways DNS filtering can save your business <a href=\"https:\/\/blog.malwarebytes.com\/business\/2022\/06\/3-ways-dns-filtering-can-save-smbs-from-cyberattacks\/\">from cyberattacks<\/a>.<\/p>\n<h2>3. Don\u2019t rely on Mac AV &#8211; use EDR&nbsp;<\/h2>\n<p>Since 2009, Apple has included a built-in antivirus (AV) technology called XProtect on all Macs \u2014 and while it\u2019s fairly good, there are a lot of threats that it doesn\u2019t detect (that <a href=\"https:\/\/www.malwarebytes.com\/mac\">a third-party would<\/a>).<\/p>\n<p>\u201cYou can&#8217;t rely on the built-in antivirus that&#8217;s in Mac OS to do the job,\u201d Reed says. \u201cYou really need to have something else on top of that.\u201d<\/p>\n<p>Even so, let\u2019s be overly generous and say XProtect and your third-party AV detects and removes every Mac malware threat. Throw in the fact that traditional AVs can\u2019t prevent sophisticated threats <a href=\"https:\/\/blog.malwarebytes.com\/explained\/2021\/10\/what-is-fileless-malware\/\">such as file-based malware<\/a>, and you just may be left wondering what you can do to best protect your Macs from damaging endpoint attacks.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/cybersecurity\/business\/what-is-edr\">Endpoint detection and response (EDR) <\/a>is the answer.&nbsp;<\/p>\n<p>EDR gives you a real-time \u201cbirds-eye view\u201d of all of your Mac endpoints, so whenever something happens outside the norm, you isolate an endpoint, quarantine the threat, or remediate. This stands in stark contrast to more reactive signature-based solutions (like AVs) that allow malware to execute before working.<\/p>\n<p>A key feature of EDR is its threat hunting capabilities. <a href=\"https:\/\/go.malwarebytes.com\/Ebook_BuyersGuide.html\">Read our Threat Hunting Made Easy eBook to learn<\/a> how to save hours every month on threat investigation and response.<\/p>\n<h2>Prevent your Mac endpoints from online threats&nbsp;<\/h2>\n<p>With everything from security vulnerabilities to malware threatening your company&#8217;s Macs at all times, Mac endpoint security is high-up on the list of priorities for macOS admins. In this post, we explained how macOS admins can stay on top of their patching game and why having a DNS filter and EDR are so essential for protecting Mac endpoints from a variety of threats.  <\/p>\n<p>Want to learn more about what simple and effective Mac endpoint protection looks like in action? <a href=\"https:\/\/go.malwarebytes.com\/wb_na_product_demo_lp.html\">Watch the demonstration of Malwarebytes Endpoint Detection and Response (EDR<\/a>)!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/business\/2022\/07\/endpoint-security-for-mac-3-best-practices\/\">Endpoint security for Mac: 3 best practices<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/business\/2022\/07\/endpoint-security-for-mac-3-best-practices\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Bill Cozens| Date: Thu, 14 Jul 2022 14:35:10 +0000<\/strong><\/p>\n<p>In this post, we break down three endpoint security for Mac best practices to help you prevent phishing attacks, DDoS attacks, and much more.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/business\/2022\/07\/endpoint-security-for-mac-3-best-practices\/\">Endpoint security for Mac: 3 best practices<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10468,2211,1001,26388,19941,10403,2130],"class_list":["post-19597","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-adware","tag-apple","tag-business","tag-dns-filtering","tag-endpoint-detection-and-response","tag-macos","tag-pups"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19597"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19597\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19597"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}