Advertisment

Security for SMBs – Mac vs Android

author-image
Harmeet
Updated On
New Update

The evolution of smartphones has led more and more users to embrace the power to access data from anywhere and anytime. Today's workaholic generation that wants to and is expected to stay connected and updated all the time is increasing mobility of data in corporate environments. The fast implementation of ‘bring your own device' and cloud is increasing mobility of data in corporate environments. This is one of the biggest challenges in the yesteryear that has provided new vectors of attack.

Advertisment

The generation has also seen changes in the endpoint devices in the organizations from a traditional homogeneous world of Windows system to various other platforms like Android and Mac. Modern malware is effective at attacking new platforms and we are seeing rapid growth of malware targeting mobile devices. While malware for Android was just a lab example a few years ago, it has become a serious and growing threat.

Bring your own device (BYOD) is a swiftly developing trend, in Small and Medium Businesses (SMBs) and many users are actively gripping this trend. Employees are looking to use their smart phone, tablet, or next generation notebook to connect to corporate networks. The challenge is that the IT department has to now focus on securing sensitive data on these devices that they have very little control over. BYOD is beneficial when it comes to professional use but the segregation of personal life and professional life is merging. The question is now on the ownership, management and security of the devices and the data in them.

The internet still remains the dominant source of spreading of malware. Malware are using social engineering or targeting the browser and associated applications with exploits. For example, malware kits like Black hole are a potent cocktail of a dozen or more exploits that target the tiniest security holes and take advantage of missing patches.

Advertisment

Cybercriminals have a tendency to zero in where the weak spots are and use a modus operandi until it becomes less effective, and then move on to the next frontier. Security is at the heart of this revolution of BYOD and cloud. Protecting data in a world where systems are changing rapidly and information flows freely requires a coordinated ecosystem of security technologies at the endpoint, gateway, and mobile devices and in the cloud.

IT security is budding from a device-centric to a user-centric view, and the security necessities are many. A modern security strategy must focus on all the major components-enforcement of use policies, data encryption, secure access to corporate networks, productivity and content filtering, vulnerability and patch management, and of course threat and malware protection. The number of Android users as compared to the PCs is increasing rapidly, which has made it prone to a huge number of dangerous applications targeting Android devices. According to researches, the number of such applications has grown six times than what it was in the month of June as compared to the month of September in the years 2012. These applications grew from just 30,000 in number to almost 175,000 and with only 20% of Android based devices that have security application installed; Android security is a big reason to worry.

Besides a lot of SMBs use Mac devices and with that the number of Mac users is growing. Though Google's Android platform remains the biggest target for the cybercriminals, it doesn't at all mean Mac could escape the unlawful eyes of the hackers. In fact, the rising reputation of Macs at work means they present a larger target for hackers - with a bigger payoff at the end. So it's time for small businesses to get serious about Mac security. As Apple's platform grows in popularity, so does its threat. Mac malware is quickly evolving to become more sophisticated and therefore more dangerous. It is now important to make people aware of the security threat in the Mac computing world and that Constant update of Mac endpoint protection is now essential. However, the protection for servers, mail and web gateways, and network infrastructure is also mandatory.

Both Mac and Android cannot escape the wrath of the Worms, scareware, spyware, and other menaces that has popped up. It's time SMBs took cognisance of this fact.

Advertisment