{"id":21426,"date":"2023-03-07T10:30:07","date_gmt":"2023-03-07T18:30:07","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/03\/07\/news-15157\/"},"modified":"2023-03-07T10:30:07","modified_gmt":"2023-03-07T18:30:07","slug":"news-15157","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/03\/07\/news-15157\/","title":{"rendered":"Jamf VP explains enterprise security threats \u2014 and how to mitigate them"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2022\/03\/18\/09\/bucket_leaks_breach_hacked_cybersecurity-100747431-small-100922294-small.jpg\"\/><\/p>\n<p>Apple-focused device management and security vendor Jamf today published <a href=\"https:\/\/www.jamf.com\/resources\/white-papers\/security-360-annual-trends-report\/\" rel=\"noopener nofollow\" target=\"_blank\">its Security 360: Annual Trends report<\/a>, which reveals the five security tends impacting organizations running hybrid work environments. <a href=\"https:\/\/www.computerworld.com\/article\/3648589\/jamf-ceo-weighs-in-on-apple-deployments-and-enterprise-security.html\">As it is every year<\/a>, the report is interesting, so I spoke to Michael Covington, vice president of portfolio strategy, for more details about\u00a0what the company found this year.<\/p>\n<p>First, here&#8217;s a brief rundown of some of the salient points in the report:<\/p>\n<p>The report confirms that some of the most well-known bad security habits continue. For example, 16% of users are regularly exposing confidential or sensitive data by sharing it via unsecured Wi-Fi hotspots.<\/p>\n<p>Security 360 also gives a good set of insights into how important privacy is to overall enterprise security.<\/p>\n<p>The report points to a range of ways in which privacy, once broken, creates security instability, including nation states that subvert device security to watch, photograph, and record what people do in order to blackmail or otherwise exploit victims.<\/p>\n<p>Another threat is poor data lifecycle management, when companies that do gather private information don\u2019t protect that data well enough. The company <a href=\"https:\/\/www.applemust.com\/jamf-to-fund-new-apple-security-and-enterprise-startups\/\" rel=\"noopener nofollow\" target=\"_blank\">continues to invest in approaches<\/a> to challenge all of these. There\u2019s a host of additional information available in the report, <a href=\"https:\/\/www.jamf.com\/resources\/white-papers\/security-360-annual-trends-report\/\" rel=\"noopener nofollow\" target=\"_blank\">which you can explore here<\/a>.<\/p>\n<p>Covington has extensive experience in tech. A published computer science researcher and IT pro, he has held leadership roles at Intel, Cisco Security, and Juniper Networks.<\/p>\n<p>Michael Covington, vice president of portfolio strategy.<\/p>\n<p>At Jamf, he oversees the blending of the company\u2019s security and management solutions into a cohesive platform and has a self-described passion for working on products that \u201csit at the intersection of security, privacy and usability.\u201d<\/p>\n<p>Here\u2019s what he had to say:<\/p>\n<p><strong>Why typically do business employees have misconfigured devices? What can a business do to manage these, particularly when using employee-owned devices?\u00a0<\/strong>&#8220;Misconfigurations occur when organizations choose not to manage, or under-manage, the devices their employees use for work. This could be a result of limited IT staffing, poorly defined standards, or a desire to operate an unrestricted IT program. Regardless of the reasons, these misconfigurations significantly increase the risk organizations face.<\/p>\n<p>&#8220;Many organizations look at security in the context of an \u2018incident;&#8217; they want to stop bad things from happening, so they focus on threat events like malware detection and phishing blocks. What they fail to realize, however, is that the best risk management begins by practicing good security hygiene. Organizations need to do more to ensure that every device meets the company\u2019s baseline standards \u2014 regardless of whether it is company-owned, contractor-operated, or a personal device used under a BYOD program \u2014 before it is allowed to access sensitive business data.<\/p>\n<p>&#8220;Beyond basic management controls, organizations must also look to their users to maintain proper device configurations over time. Users should be part of the security solution, and that includes actioning updates to the operating system or applications in a timely fashion, when prompted.&#8221;<\/p>\n<p><strong>What is the consequence of a phishing attack? Do they typically lead to further breaches? What is the average consequence to a user?\u00a0<\/strong>&#8220;Successful phishing attacks inevitably lead to consequences down the road. A worst-case scenario occurs when work credentials are stolen by an attacker who uses them to subsequently steal valuable business data, to blackmail the organization, or pivot to the next system or social engineering exploit. Other side effects can include misinformation campaigns launched against the business or its partners, personal data loss, and financial exploitation.&#8221;<\/p>\n<p><strong>How can you tell a legitimate software store from an illegitimate one? What can be done to protect users? <\/strong><em>&#8220;<\/em>The best software stores have well-documented processes in place to vet incoming applications and monitor for abuses over time. The iOS AppStore and the Google Play store are great examples of where a defined process helps eliminate a lot of the risk up-front, before users download the apps.<\/p>\n<p>&#8220;But there are plenty of examples of where this isn\u2019t always possible or desirable. As organizations adopt more applications that are distributed by third parties outside of the app stores \u2014 a scenario that is quite common with macOS, for example \u2014 they also need to have processes in place to manage the lifecycle around those applications.<\/p>\n<p>&#8220;Best practices include assessing the permissions each app requests to ensure the developers respect end user privacy, maintaining regular checks to ensure the most stable and secure version is distributed to devices, and monitoring known vulnerabilities for each application to understand the organization\u2019s risk exposure.&#8221;<\/p>\n<p><strong>What is the difference between malicious network traffic and malware? Are they seeking different things?<\/strong><em> &#8220;<\/em>All malware is built with an intended purpose. Some malware was designed to deliver advertisements. Some malware encrypts data so the attacker can demand a ransom. And some malware steals intellectual property. Most modern malware is connected to infrastructure that is used to facilitate distribution, implement command &amp; control, and receive exfiltrated content.<\/p>\n<p>&#8220;Malicious network traffic refers to the network-based infrastructure that supports malware campaigns and data theft. Network-based indicators of compromise can serve as a strong indicator of malicious activity on a device, even when a specific malware has not yet been identified on the device.<\/p>\n<p>&#8220;Jamf Threat Labs\u00a0<a href=\"https:\/\/www.jamf.com\/blog\/cryptojacking-macos-malware-discovered-by-jamf-threat-labs\/\" rel=\"noopener nofollow\" target=\"_blank\">recently discovered a malicious cryptomining campaign<\/a>\u00a0that was targeting macOS devices through <a href=\"https:\/\/www.computerworld.com\/article\/3689149\/hard-to-spot-mac-crypto-mining-threat-xmrig-hits-pirate-bay.html\" rel=\"noopener\" target=\"_blank\">compromised pirated software<\/a>; the software used network communication to send mined cryptocurrency to the attacker.&#8221;<\/p>\n<p><strong>Isn&#8217;t using a virus checker enough? (No is the answer, but why?)<\/strong><em> &#8220;<\/em>No, a virus checker is not enough.\u00a0Organizations should be thinking holistically about their endpoint security solutions. Good security on the device begins with secure baselines that are established and maintained over time. Best practices include regular checks on OS patch levels and application versions.<\/p>\n<p>&#8220;And when it comes to malware detection, organizations must be using solutions that go beyond signature detection. Data-driven heuristics and machine learning have reached a level of maturity that result in more accurate detections and far fewer false positives. It\u2019s time to embrace these technologies.<\/p>\n<p>&#8220;Finally, device security should include tools to help prevent user-introduced risk. This includes protections against sophisticated phishing attacks and social engineering exploits that trick users into installing malicious code on the device.<\/p>\n<p>&#8220;Organizations should avoid thinking in security silos. Malware detection, for example, is only minimally useful in isolation. IT and security teams should start looking for an overall assessment of endpoint health that can be communicated to other tools and infrastructure so that intelligence can help provide better protections for the organization\u2019s most sensitive applications.<\/p>\n<p><strong>How can employers\/employees better protect themselves against social engineering-based attacks?<\/strong><em> &#8220;<\/em>Organizations invest in tools and employee training that protect corporate data. To take this a step further, organizations can and should help employees improve security and privacy in their personal life, as when workers are educated on personal security risks, they are more likely to help improve their habits when dealing with those same risks at work.<\/p>\n<p>&#8220;Employers should have a multi-pronged approach.<\/p>\n<p><strong>What should employers look for when sourcing employee security training? <\/strong><em>&#8220;<\/em>Most critically, employers should ensure that their employee security training has been modernized. Content should cover on-premises use cases, remote\/anywhere work scenarios, a combination of desktop, laptop, and mobile form-factors, plus include references to cloud applications.\u00a0 Users should feel like they are the first line of defense and not be ashamed to report incidents they have observed.&#8221;<\/p>\n<p><strong>What can an enterprise do to protect against the weak links in their security chain (human or otherwise)?<\/strong><\/p>\n<p><em>Please follow me on\u00a0<a href=\"https:\/\/social.vivaldi.net\/@jonnyevans\" rel=\"nofollow noopener\" target=\"_blank\">Mastodon<\/a>, or join me in the\u00a0<a href=\"https:\/\/mewe.com\/join\/appleholics_bar_and_grill\" rel=\"nofollow noopener\" target=\"_blank\">AppleHolic\u2019s bar &amp; grill<\/a>\u00a0and\u00a0<\/em><a href=\"https:\/\/mewe.com\/join\/apple_discussions\" rel=\"nofollow noopener\" target=\"_blank\"><em style=\"font-weight: inherit;\">Apple<\/em>\u00a0<em style=\"font-weight: inherit;\">Discussions<\/em><\/a><em>\u00a0groups on MeWe.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3690149\/jamf-vp-explains-enterprise-security-threats-and-how-to-mitigate-them.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2022\/03\/18\/09\/bucket_leaks_breach_hacked_cybersecurity-100747431-small-100922294-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p>Apple-focused device management and security vendor Jamf today published <a href=\"https:\/\/www.jamf.com\/resources\/white-papers\/security-360-annual-trends-report\/\" rel=\"noopener nofollow\" target=\"_blank\">its Security 360: Annual Trends report<\/a>, which reveals the five security tends impacting organizations running hybrid work environments. <a href=\"https:\/\/www.computerworld.com\/article\/3648589\/jamf-ceo-weighs-in-on-apple-deployments-and-enterprise-security.html\">As it is every year<\/a>, the report is interesting, so I spoke to Michael Covington, vice president of portfolio strategy, for more details about\u00a0what the company found this year.<\/p>\n<p>First, here&#8217;s a brief rundown of some of the salient points in the report:<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3690149\/jamf-vp-explains-enterprise-security-threats-and-how-to-mitigate-them.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[2211,10480,10403,10554,12555,714,24580],"class_list":["post-21426","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple","tag-ios","tag-macos","tag-mobile","tag-mobile-device-management","tag-security","tag-small-and-medium-business"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21426","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21426"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21426\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21426"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}