Jamf Blog

Posts in the Healthcare Category

February 23, 2024 by Jesus Vigo

14 things you need to know about IT security compliance

Learn about IT and security compliance, answering critical questions about their differences, similarities and more importantly, how best practices help your organization develop their IT security compliance plan.

January 24, 2024 by Jesus Vigo

Balancing Security + Compliance

Learn about the basics of compliance in cybersecurity and why it is a crucial component of your organization’s security posture. Also, understand how achieving a balance between security and compliance is table stakes for regulated businesses and how critical factors like key regulations, industry standards and best practices, integrated alongside advanced technologies and security tooling, work hand in glove to benefit organizations while minimizing the risk of non-compliance.

November 30, 2023 by Jesus Vigo

Streamline device redeployment workflows with Return to Service Command

It's never been simpler to redeploy devices or sanitize shared ones in a secure, efficient manner while ensuring they are reenrolled with your MDM solution, ready for new users. Learn more about how Apple’s Return to Service Command helps IT achieve this quickly and easily.

November 1, 2023 by Jesus Vigo

What platforms does Jamf support?

Threats don't sleep. They also don't discriminate against device types or target just one platform. So, why should your enterprise security strategy be any different?

Pro Tip: it shouldn't.

Bad actors are hoping you don't know this, but Jamf does. That's why in this blog, we discuss why it's critical for security solutions to support multiple platforms in order to be truly holistic and offer comprehensive protections against existing and evolving threats that target your fleet - not just one type of device on a single platform.

October 26, 2023 by Adam Mahmud

iOS 17 and iPadOS 17 for frontline workers

iOS 17 and iPadOS 17 offer new features that make work easier for frontline workers. Read this blog to find out how Declarative Device Management and Return to Service keep devices up to date and ready for action.

October 18, 2023 by Jesus Vigo

What is a Whaling phishing attack and how to prevent it

Threats impacting your cybersecurity defenses continue to grow and evolve from one type of form to another. Advanced Persistent Threats (APT) and converged threat types were already difficult to detect, and now existing threats, like Whaling, are getting supercharged by AI to become more efficient and scalable. In this blog, we delve into Whaling Phishing attacks:

  • What Whaling attacks are?
  • How do they impact cybersecurity?
  • Provide examples of real-world attacks
  • Breakdown the anatomy of a Whaling attack
  • and discuss the different ways to prevent them
October 17, 2023 by Jesus Vigo

Assessing Security Needs: Enhancing Your Organization’s Overall Security Posture

Understanding the security needs of an organization is only one component of maintaining a strong security posture. Knowing the risks that are unique to your organization and assessing them accurately are critical to the overall security posture as well.

In this paper, learn:

  • What risk is and how telemetry data collected provides visibility into device health and overall security posture
  • Why assessing risk must be performed at a regular cadence, iteratively as part of the security stack
  • How this data aids your organization in not only determining its security needs but also how to use it to protect against current and future risks
  • Why integrating risk data with endpoint security solutions helps organizations maintain a strong security posture while meeting compliance goals
October 12, 2023 by Jesus Vigo

macOS Security Basics series: The One Where Your Data Wasn’t Encrypted with FileVault

Encrypting your data may seem like a foreign concept to some users. It may be the stuff of thriller-type novels and spy yarns. But the reality is that encrypting data is a fundamental security control that is built into every version of macOS (and iOS/iPadOS for that matter) that serves a singular purpose: keeping unauthorized users from accessing your personal, corporate and privacy data whenever your computer is not in use. As a matter of fact, the benefits combined with a dead simple setup make it a “no-brainer” for business and personal users alike, leaving users to wonder why they didn’t enable it sooner.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.