- Posted By: tandem11
- Comments: 0
This is part three of a series titled “Cybersecurity Trends: What You and Your Customers Need to Know About Ransomware,” written by Fusion Managed IT.
In part 2 of our series on cybersecurity, we covered the value of hiring an outsourced IT team to assist in combating cyber threats and train your team on how to arm against ransomware.
Today, we will discuss a widespread myth: that Apple products are devoid of ransomware and computer viruses.
My Mac and IPhone are safe, right? I heard that this is a PC-only problem…
Historically PCs have been much more vulnerable and more targeted in ransomware and malware attacks than Mac, but that is starting to change.
Because Apple has been so successful in getting their products to the masses, there are becoming targets for this dark industry. Recently MacRansom and MacSpy, two ransomware programs written specifically for Macs, have been identified and found circulating on the internet. These programs are far less sophisticated than the Windows equivalents, but now that they are out there, they will be improved steadily and quickly. For now, over 90% of computers across the globe run Windows. Mac OS is the second most popular at 6%. As this increases, the targeting of MacOS will also increase.
Are mobile devices at risk for malware and ransomware?
In the mobile space, it is another story. The IPhone OS (IOS) accounts for roughly 18% of all smartphone and Android accounts for over 80% – so both of these represent rich targets. Now consider how many financial transactions are executed on smartphones. Smartphones have some built-in protections but are still vulnerable. There are many developers working diligently on creating effective malware and ransomware to exploit them.
Measures for mobile protection now include:
- Keep the operating system of your mobile devices updated as much as possible. Most OS updates contain security fixes. If your security partner offers a Mobile Device Management program, inquire about this can benefit your company.
- Do no install non-store applications. For most people this is not an issue as it only applies to those individuals are already hacking into their own phone’s root OS.
- Have an anti-malware software installed. Most people don’t realize that there are such programs for smartphone, but there are many good ones. Your security partner should provide you with a component that is compatible with our device and also centrally managed in a like manner to the anti-malware components that are deployed to your PCs and Macs.