{"id":8184,"date":"2017-06-28T04:30:01","date_gmt":"2017-06-28T12:30:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/06\/28\/news-1960\/"},"modified":"2017-06-28T04:30:01","modified_gmt":"2017-06-28T12:30:01","slug":"news-1960","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/06\/28\/news-1960\/","title":{"rendered":"Why Apple\u2019s future\u2019s up on ransomware"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt4.staticworld.net\/images\/article\/2017\/04\/threat-ransomware-response-100719856-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Wed, 28 Jun 2017 03:59:00 -0700<\/strong><\/p>\n<p>This week\u2019s big security story is the so-called \u2018<em>Petya<\/em>\u2019 ransomware attack. It is not the first such attack, won\u2019t be the last, and its success will prompt cybercriminals to attack again, and again, and again. In this new threat environment, there are zero excuses for any enterprise, public or private, <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms17-010.aspx\">to be running Windows XP<\/a>, or any other insecure platform.<\/p>\n<p>Chronic underfunding and a conservative government ideologically committed to cuts mean key UK public services remain under threat of cyberattack. In recent weeks, the National Health Service saw its computing systems fail because they relied too much on unprotected Windows systems. This morning we learned that the UK\u2019s Metropolitan Police force still uses over 1<a href=\"http:\/\/www.computerweekly.com\/news\/450421531\/Met-Police-vulnerable-to-cyber-attacks-due-to-Windows-XP-use-GLA-warned\">8,000 computers running Windows XP<\/a>. The key police force of the UK\u2019s biggest city is therefore currently vulnerable to cyber-attack.<\/p>\n<p>Coming from a government with a record of failure culminating most recently in the dreadful and potentially preventable Grenfell Tower tragedy, <a href=\"https:\/\/www.theguardian.com\/uk-news\/2017\/jun\/28\/grenfell-residents-groups-compile-lists-of-victims-and-survivors\">final death toll of which remains unknown<\/a>, this vulnerability is incompetent at best.<\/p>\n<p>Of course, this reliance on dated kit isn\u2019t unique to the UK government. A glance at the chaos unleashed across the IT systems of multiple big enterprises by Petya shows you this. The biggest problem seems to be the continued used of older (<a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms17-010.aspx\">frequently unsupported<\/a>) Windows systems by cash-strapped firms struggling to make money in a tough and uncertain economic climate. Yet, how much cash do they lose in the event of a successful ransomware attack?<\/p>\n<p>We know that the PC market has been soft, slow, or slumping (pick your euphemism) in recent years. A move to mobile devices \u2013 tablets, smartphones and their far more secure iPad and iPhone alternative \u2013 has eaten away at the edge of PC industry profits.<\/p>\n<p>This trend means many firms have opted to squeeze as much use out of their existing IT investments while they wait for mobile devices to truly turn PCs into \u201ctrucks\u201d. This hasn\u2019t quite happened yet, but that future remains close and the recent iOS 11 improvements for Apple\u2019s iPad Pro mean many now see that tablet as a strong choice for enterprise IT.<\/p>\n<p>Security, a commitment to regular software updates, privacy and Apple\u2019s long string of enterprise-focused alliances also come into the frame here.<\/p>\n<p>These days, software is everything.<\/p>\n<p>When mission-critical enterprise applications go offline this isn\u2019t just an excuse to grab a cup of coffee \u2013 these systems drive entire industries, and their collapse means companies lose time, money and reputation. (In a connected age, reputation is everything).<\/p>\n<p>This goes beyond internal systems, of course \u2013 <a href=\"http:\/\/www.cio.com\/article\/3204007\/internet-of-things\/5-of-the-biggest-cybersecurity-risks-surrounding-iot-development.html#tk.rss_all\">Internet of Things devices<\/a> (particularly in the first-generation) are notoriously poorly-protected, giving increasingly sophisticated cybercriminals ample opportunity to penetrate deep into the heart of corporate IT using these poorly-protected endpoints. This may even put key infrastructure at risk.<\/p>\n<p>We already know the alternative. It\u2019s the same alternative Apple CEO, Tim Cook appeared on stage at <a href=\"http:\/\/www.computerworld.com\/article\/3203930\/apple-ios\/with-cisco-apple-weaves-itself-into-enterprise-infrastructure.html\">Cisco Live to promote<\/a>, and it\u2019s an upstart little Californian company called <a href=\"http:\/\/www.computerworld.com\/article\/3203709\/11-ways-apple-s-iphone-changed-the-enterprise.html\">Apple<\/a>.<\/p>\n<p>Apple and Cisco are working together to create a best in industry security proposition for enterprise users. And yes, you read that right: they are working together to ensure that if a business customer takes cybersecurity insurance and uses Apple\/Cisco kit they will get a better deal than they would if their IT is built around other systems.<\/p>\n<p>\u00a0\u201cWe believe with every release we need to make security better and better,\u201d <a href=\"http:\/\/www.applemust.com\/apple-ceo-tim-cook-speaks-at-cisco-live-confirms-enterprise-focus\/\">said Cook<\/a>. \u201cHackers aren\u2019t hackers any more. It\u2019s a sophisticated enterprise.\u201d<\/p>\n<p>Apple and Cisco both understand that in a world of highly complex cyber threat those with the skills to create attacks have become highly paid professionals.<\/p>\n<p>This means that those choosing to create attacks will get more for their money if they target less well-protected systems, like the old Windows installations that we now know for certain remain in critical positions across public and private infrastructure. Or, indeed, those <a href=\"http:\/\/www.applemust.com\/malware-scourge-threatens-billions-of-android-devices\/\">poorly protected mobile device<\/a>s that aren\u2019t made by Apple.<\/p>\n<p>Enterprises everywhere need to take a close look at what\u2019s happening.<\/p>\n<p>It must surely be clear to them at this point that these attacks are not going to reduce in frequency.<\/p>\n<p>It is also critical they understand that their IT systems must be fit for use in the always-on, always-connected digital future. Security isn\u2019t a \u2018nice to have\u2019, it has become a \u2018must have\u2019. Entire economies may be at risk if good security practise is not in play.<\/p>\n<p>Whatever the budget seems to be, CIOs must \u2013 immediately \u2013 secure additional funding with which to replace their old and creaky unsupported Windows kit.<\/p>\n<p>They can choose to deploy mobile devices where those devices can make sense. (On the grounds of security alone, I recommend Apple and help from systems integrators like JAMF, Dimension Data, IBM, Deloitte\u2026 That list will inevitably grow).<\/p>\n<p>They may also choose to <a href=\"http:\/\/www.applemust.com\/apples-huge-mac-advantage-confirmed-by-consumer-reports\/\">deploy Macs<\/a>. Why wouldn\u2019t they, given they share the same basic OS as the mobile devices most enterprises now are choosing to deploy, and <a href=\"http:\/\/www.computerworld.com\/article\/3201009\/apple-ios\/apple-is-pervasive-in-the-enterprise-says-ibm.html\">cost much less to run<\/a>?<\/p>\n<p>I\u2019m in little doubt that Apple is the right solution at the right time to create a <a href=\"http:\/\/www.applemust.com\/apple-the-future-of-enterprise-it\/\">much brighter future for enterprise IT<\/a> \u2013 your life does not need to be at ransom.<\/p>\n<p><strong>Google+?<\/strong>\u00a0If you use social media and happen to be a Google+ user, why not join\u00a0<a href=\"https:\/\/plus.google.com\/u\/0\/communities\/102592251674546201152\">AppleHolic&#8217;s Kool Aid Corner community<\/a>\u00a0and join the conversation as we pursue the spirit of the New Model Apple?<\/p>\n<p><strong>Got a story?<\/strong>\u00a0<a href=\"https:\/\/twitter.com\/jonnyevans_cw\"><strong>Drop me a line via Twitter<\/strong><\/a>\u00a0and let me know. I&#8217;d like it if you chose to follow me on Twitter so I can let you know when fresh items are published here first on Computerworld.<\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3204225\/apple-mac\/why-apple-s-future-s-up-on-ransomware.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt4.staticworld.net\/images\/article\/2017\/04\/threat-ransomware-response-100719856-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Wed, 28 Jun 2017 03:59:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>This week\u2019s big security story is the so-called \u2018<em>Petya<\/em>\u2019 ransomware attack. It is not the first such attack, won\u2019t be the last, and its success will prompt cybercriminals to attack again, and again, and again. In this new threat environment, there are zero excuses for any enterprise, public or private, <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms17-010.aspx\">to be running Windows XP<\/a>, or any other insecure platform.<\/p>\n<h3><strong>Even the cops<\/strong><\/h3>\n<p>Chronic underfunding and a conservative government ideologically committed to cuts mean key UK public services remain under threat of cyberattack. In recent weeks, the National Health Service saw its computing systems fail because they relied too much on unprotected Windows systems. This morning we learned that the UK\u2019s Metropolitan Police force still uses over 1<a href=\"http:\/\/www.computerweekly.com\/news\/450421531\/Met-Police-vulnerable-to-cyber-attacks-due-to-Windows-XP-use-GLA-warned\">8,000 computers running Windows XP<\/a>. The key police force of the UK\u2019s biggest city is therefore currently vulnerable to cyber-attack.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3204225\/apple-mac\/why-apple-s-future-s-up-on-ransomware.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11078,10480,714],"class_list":["post-8184","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple-mac","tag-ios","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8184"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8184\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}