Jamf Blog

Posts in the Government Category

March 6, 2024 by Jesus Vigo

Risk vectors can be mitigated and attack surfaces hardened against threats. But security gaps happen. With a robust incident response and recovery plan, gaps can be minimized so that known threats are prevented and unknown threats can be detected proactively before they can become something worse.

January 24, 2024 by Jesus Vigo

Learn about the basics of compliance in cybersecurity and why it is a crucial component of your organization’s security posture. Also, understand how achieving a balance between security and compliance is table stakes for regulated businesses and how critical factors like key regulations, industry standards and best practices, integrated alongside advanced technologies and security tooling, work hand in glove to benefit organizations while minimizing the risk of non-compliance.

November 30, 2023 by Jesus Vigo

It's never been simpler to redeploy devices or sanitize shared ones in a secure, efficient manner while ensuring they are reenrolled with your MDM solution, ready for new users. Learn more about how Apple’s Return to Service Command helps IT achieve this quickly and easily.

October 18, 2023 by Jesus Vigo

Threats impacting your cybersecurity defenses continue to grow and evolve from one type of form to another. Advanced Persistent Threats (APT) and converged threat types were already difficult to detect, and now existing threats, like Whaling, are getting supercharged by AI to become more efficient and scalable. In this blog, we delve into Whaling Phishing attacks:

  • What Whaling attacks are?
  • How do they impact cybersecurity?
  • Provide examples of real-world attacks
  • Breakdown the anatomy of a Whaling attack
  • and discuss the different ways to prevent them
October 17, 2023 by Jesus Vigo

Understanding the security needs of an organization is only one component of maintaining a strong security posture. Knowing the risks that are unique to your organization and assessing them accurately are critical to the overall security posture as well.

In this paper, learn:

  • What risk is and how telemetry data collected provides visibility into device health and overall security posture
  • Why assessing risk must be performed at a regular cadence, iteratively as part of the security stack
  • How this data aids your organization in not only determining its security needs but also how to use it to protect against current and future risks
  • Why integrating risk data with endpoint security solutions helps organizations maintain a strong security posture while meeting compliance goals
August 9, 2023 by Jesus Vigo

In this webinar series, Aaron Webb explains what security frameworks are, their importance and explains the critical role they play when securing your organization’s environment. This includes the importance of establishing risk management and compliance best practices and how Jamf solutions brings together device management, user identity and endpoint security for a comprehensive security solution based on the security framework that meets your organizational needs.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.