Earlier this week, Apple released updates to the operating systems behind all its most popular devices to increase security —including the iPhone, iPad, Watch, TV, and Apple computers—and although the company often updates its operating systems with minor changes or fixes, these may be more pressing. As they do not provide specific information on the vulnerabilities it has discovered in its operating systems so as to not alert hackers to the issues, but as Wired points out, each operating system’s fixes involve removing an attacker’s ability to “execute arbitrary code with kernel privileges”—essentially being able to take control of the device running that system.
Cyber attacks and breaches in data security and IT security happen almost every single day. Many presume that software gaps or technology mistakes wholly contribute to these attacks, but in reality, human mistakes contribute about 31% of these cyber breaches.
The new year is now upon us and even in the space of a 1-2 week holiday period, things have changed. New types of fraud will have been devised when everyone's guard is down.
We have solutions that can benefit your business. Here’s how:
- Help protect sensitive info on mobile devices with built-in data encryption for data security. Make access easier and more secure with facial and fingerprint recognition. (Windows 10) Get up-to-date anti-malware protection and 247 incident response in the cloud. (Microsoft Office 365, Azure) Detect and alert security breaches early. Protect data sent in email by preventing actions like editing and copy-and-paste. (MS Enterprise Mobility Suite (EMS))
- Get scalable, cost-effective backup in the cloud, with the ability to restore quickly, and up to 99 years of data retention for legal compliance. (Azure Backup) Keep your files synchronized across devices and access them anywhere, anytime, both online and offline. (OneDrive for Business) Automate Microsoft SQL Server database backups to the cloud. Encrypt backup files and restore to the cloud if needed. (Azure)
- Get automated disaster recovery in the cloud without major capital expense. (Azure Site Recovery) Access your latest work even if you leave your laptop at home. (OneDrive for Business) Have confidence that a lost laptop is protected with built-in data encryption. (Windows 10 BitLocker) Remotely wipe business data from mobile devices. (Enterprise Mobility Suite)
- Help ensure compliant behavior by getting an alert when sensitive info is about to be emailed. (Office 365 Data Loss Prevention) Use cloud services that are independently verified for compliance with a range of standards, such as ISO 27001, HIPAA and EU Model Clauses. (Azure, Office 365) Have confidence that Microsoft is continually working to help customers meet the latest industry and regional certifications.
Spear phishing is a targeted email attack in which a hacker uses email to masquerade as someone the target knows and trusts.