Jamf Blog

Posts in the Healthcare Category

July 18, 2023 by Jesus Vigo

G2 Summer 2023 Report

The phrase “lightning never strikes the same place twice” is a commonly held belief that holds little grounding in science. In fact, lightning can and does strike the same place multiple times and nowhere is that as evident as Jamf solutions once again scoring top marks in G2’s Summer 2023 report.

June 23, 2023 by Adam Mahmud

WWDC 2023 Takeaways: The impact on health and wellness

While WWDC brings a number of exciting announcements for developers and users alike, impactful innovations in Apple’s longstanding mission to improve health and wellness were also visibly on display.

June 21, 2023 by Jesus Vigo

Security 360 Highlights: Threat and attack convergence

Following the release of the Jamf Security 360: Annual Threat Trends Report 2023, where we highlight security threat trends, we utilize threat intelligence gathered by Jamf to inform security professionals about which threats from the previous year most critically affected the enterprise.

Threat trends reveal how growing threats and attacks, particularly converging the two, are leveling up the tools available to bad actors to more successfully compromise devices, users and data while leaving administrators’ work cut out for them when trying to defend against increasingly complex, novel threats.

June 7, 2023 by Michael Devins

5 enhancements from WWDC to help Apple win the enterprise and change the future of work

Apple’s Worldwide Developer Conference (WWDC) shows how Apple is leveraging its five major platforms to advance Apple's adoption in the enterprise. Here are the ways Apple is pushing each platform forward to continue winning in the workplace.

June 6, 2023 by Jesus Vigo

Apple WWDC’23: Day one recap

An overview of the new operating systems, features and mind-blowing technology that was announced on day one of Apple’s World Wide Developers Conference (WWDC) 2023.

May 26, 2023 by Jesus Vigo

Top security challenges and how to overcome them: Prepare for & address external threats

Cyber threats come from all sides. As bad actors continue to evolve their toolsets to more succinctly attack targets, organizations are faced with the challenges of preparing for threats while implementing mitigations to address them as quickly and efficiently as possible. One of the most critical are external threats originating from outside the organization – proving to be amongst the most common threat types and the most difficult to protect against – but not impossible to address with a holistic, comprehensive security strategy.

May 23, 2023 by Jesus Vigo

Security 360 Highlights: User privacy

Following the release of the Jamf Security 360: Annual Threat Trends Report 2023, where we highlight security threat trends, we utilize threat intelligence gathered by Jamf to inform security professionals about which threats from the previous year most critically affected the enterprise. Preserving user privacy is a growing threat that the data supports and is the focus of this blog series. Understanding its criticality to endpoint security and identifying which data types are at risk helps IT and Security teams know what to look for and how to mitigate risk best.

May 16, 2023 by Jesus Vigo

Security 360 highlights: Phishing and social engineering

Following the release of the Jamf Security 360: Annual Threat Trends Report 2023 where we highlight security threat trends, we utilize threat intelligence gathered by Jamf to inform security professionals which threats from the previous year most critically affected the enterprise. The data in this blog series helps inform IT and Security teams of the continued reliance on social engineering attacks by threat actors. Also, by identifying various attack types, like phishing and how they are leveraged, users can be better informed on how to spot these attacks and know how to prevent them from compromising devices, user credentials and sensitive data.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.