Jamf Blog

Posts in the Higher Education Category

May 23, 2023 by Jesus Vigo

Security 360 Highlights: User privacy

Following the release of the Jamf Security 360: Annual Threat Trends Report 2023, where we highlight security threat trends, we utilize threat intelligence gathered by Jamf to inform security professionals about which threats from the previous year most critically affected the enterprise. Preserving user privacy is a growing threat that the data supports and is the focus of this blog series. Understanding its criticality to endpoint security and identifying which data types are at risk helps IT and Security teams know what to look for and how to mitigate risk best.

May 16, 2023 by Jesus Vigo

Security 360 highlights: Phishing and social engineering

Following the release of the Jamf Security 360: Annual Threat Trends Report 2023 where we highlight security threat trends, we utilize threat intelligence gathered by Jamf to inform security professionals which threats from the previous year most critically affected the enterprise. The data in this blog series helps inform IT and Security teams of the continued reliance on social engineering attacks by threat actors. Also, by identifying various attack types, like phishing and how they are leveraged, users can be better informed on how to spot these attacks and know how to prevent them from compromising devices, user credentials and sensitive data.

April 18, 2023 by Jesus Vigo

How to use Apple Business Manager to manage App licenses

Learn how to manage the entire application lifecycle with Apple Business Manager. From purchase to licensing to deployment across your infrastructure. Discover app assignments and how Apple and Jamf flexibly allow users and MacAdmins to have all the software they need to remain productive available and up-to-date.

April 11, 2023 by Jesus Vigo

Detecting Insider Threats

Media reports of external attacks that lead to data breaches are a common occurrence these days. But just as devastating to an organization are internal attacks, stemming from insider threats that often go unnoticed until it's too late. Learn about these types of threats, how to spot the signs and what solutions are available to detect and protect against them.

March 31, 2023 by Jesus Vigo

Top security challenges and how to overcome them: Compliance regulations

Discover the top challenges affecting IT and Security teams when it comes to successfully handling regulatory compliance, including assessing risks to endpoints and processes, implementing frameworks to best harden devices and overcoming the challenges of maintaining cyber security compliance by securely sharing telemetry data and developing automated workflows.

March 15, 2023 by Jesus Vigo

macOS security: the ultimate guide

In this series of articles, Jamf uncovers the seedy underbelly of Mac and iOS-based security threats in an effort to provide clear guidance on how to best protect your desktop and mobile device endpoints through a combination of information and best practices regarding Apple security basics for users new to the platform all the way to those that are tasked with shoring up the security of data and protecting end-user privacy.

March 13, 2023 by Ivna O'Neill

NIS2 Directive: What does it mean to senior managers and their cybersecurity strategy?

In this concluding blog of the series that analyzes the changes to the Network and Information Security regulations by the European Union, we focus on what the changes mean to top-level executives and the factors to consider when building cybersecurity strategies going forward.

March 10, 2023 by Jesus Vigo

Everything you want to know about integrating Student Information Systems + Apple

Managing sensitive student data shouldn’t be an exercise in reinventing the wheel or a security incident waiting to happen. With Student Information Systems, educational organizations can centrally and securely manage and update this data while connecting with Apple School Manager to extend functionality to automate essential education management processes.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.