Jamf Blog

Posts in the Healthcare Category

October 18, 2023 by Jesus Vigo

What is a Whaling phishing attack and how to prevent it

Threats impacting your cybersecurity defenses continue to grow and evolve from one type of form to another. Advanced Persistent Threats (APT) and converged threat types were already difficult to detect, and now existing threats, like Whaling, are getting supercharged by AI to become more efficient and scalable. In this blog, we delve into Whaling Phishing attacks:

  • What Whaling attacks are?
  • How do they impact cybersecurity?
  • Provide examples of real-world attacks
  • Breakdown the anatomy of a Whaling attack
  • and discuss the different ways to prevent them
October 17, 2023 by Jesus Vigo

Assessing your organization’s security needs: Why it’s critical to your overall security posture

Understanding the security needs of an organization is only one component of maintaining a strong security posture. Knowing the risks that are unique to your organization and assessing them accurately are critical to the overall security posture as well.

In this paper, learn:

  • What risk is and how telemetry data collected provides visibility into device health and overall security posture
  • Why assessing risk must be performed at a regular cadence, iteratively as part of the security stack
  • How this data aids your organization in not only determining its security needs but also how to use it to protect against current and future risks
  • Why integrating risk data with endpoint security solutions helps organizations maintain a strong security posture while meeting compliance goals
October 12, 2023 by Jesus Vigo

macOS Security Basics series: The One Where Your Data Wasn’t Encrypted with FileVault

Encrypting your data may seem like a foreign concept to some users. It may be the stuff of thriller-type novels and spy yarns. But the reality is that encrypting data is a fundamental security control that is built into every version of macOS (and iOS/iPadOS for that matter) that serves a singular purpose: keeping unauthorized users from accessing your personal, corporate and privacy data whenever your computer is not in use. As a matter of fact, the benefits combined with a dead simple setup make it a “no-brainer” for business and personal users alike, leaving users to wonder why they didn’t enable it sooner.

October 6, 2023 by Jesus Vigo

Manage and secure your most vulnerable endpoints: Mobile devices

Managing and securing your most vulnerable endpoints, mobile devices requires more than just MDM or mobile threat defense solutions. Admins need to be able to converge these technologies as part of their existing security strategy to ensure a strong, organizational security posture.

In this blog, learn more about how the integration of macOS and mobile devices is the future but also key to holistic, endpoint protection strategies. Also:

  • Insight into current mobile security challenges and solutions
  • The importance of mobile-specific security measures
  • An overview of holistic endpoint protection
  • And best practices for mobile security policy implementation
September 15, 2023 by Jesus Vigo

What is Mobile Security?

Securing your mobile fleet, while sharing many similarities with desktop computers, may vary vastly depending on variables specific only to mobile technology. In this blog we breakdown some of those factors unique to mobile devices, which include:

August 22, 2023 by Jesus Vigo

Migrating to Jamf in 3 easy steps

Changing your Mobile Device Management (MDM) solution can greatly benefit your organization. Especially so if your current solution neither meets your unique technical and/or security requirements nor provides the flexibility or scale needed for rapid device growth. Discover how easy it is to migrate from your existing MDM provider to Jamf Pro while enabling user productivity— without wiping or reenrolling devices. Here are clear steps on how to effortlessly complete this project.

August 9, 2023 by Jesus Vigo

Understanding Security Frameworks: Guide for IT Security Professionals

In this webinar series, Aaron Webb explains what security frameworks are, their importance and explains the critical role they play when securing your organization’s environment. This includes the importance of establishing risk management and compliance best practices and how Jamf solutions brings together device management, user identity and endpoint security for a comprehensive security solution based on the security framework that meets your organizational needs.

August 3, 2023 by Jesus Vigo

What are the security risks of AI?

AI is the latest industry buzzword making the rounds. But beyond the hype lies a technology that aims to provide so many benefits – from agriculture to healthcare – a veritable “sky’s the limit” awaits us. As with all things technology, there are some steep downsides to AI in the form of security risks, but fret not as we cover the most critical ones while providing a silver lining in the form of strategies that may be used to minimize risk to further promote safe, ethical usage of AI-based models.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.