Jamf Blog

Posts in the Security Category

June 30, 2023 by Jamf Threat Labs

Jamf protects against JokerSpy malware

Threat actors targeted a cryptocurrency exchange in Japan, installing back doors and deploying spyware. Read more about the method of attack and Jamf's defense of the threat.

June 21, 2023 by Jesus Vigo

Security 360 Highlights: Threat and attack convergence

Following the release of the Jamf Security 360: Annual Threat Trends Report 2023, where we highlight security threat trends, we utilize threat intelligence gathered by Jamf to inform security professionals about which threats from the previous year most critically affected the enterprise.

Threat trends reveal how growing threats and attacks, particularly converging the two, are leveling up the tools available to bad actors to more successfully compromise devices, users and data while leaving administrators’ work cut out for them when trying to defend against increasingly complex, novel threats.

June 15, 2023 by Haddayr Copley-Woods

Security solutions for education

Digital security is vital to keep students, teachers and devices safe. However, Jamf's security offerings differ depending on the combination of devices and operating systems your school uses. Learn about Jamf Safe Internet, Jamf Protect for education, and how Jamf Connect integrates with both of them to create the best cybersecurity for your own school or district.

June 6, 2023 by Mignon Wagner

What is the Jamf Trust app?

The Jamf Trust app — a part of your Jamf Protect, Jamf Connect or Jamf Safe Internet deployment — gives employees and end users access to the tools they need while keeping their devices secure.

May 30, 2023 by Jesus Vigo

Top security challenges and how to overcome them: Budgetary constraints + demonstrating ROI

Not all security challenges come in the form of threat actors that seek to directly (or indirectly) compromise devices, users and data. In fact, among the most challenging and downright frustrating concerns are those that stem from risks that are not addressed due to budgetary matters minimizing an organization's ability to effectively protect its resources. The inability to demonstrate the true value gleaned from security controls through traditional ROI protocols is just as difficult and similarly frustrating…but it doesn’t have to be.

May 26, 2023 by Jesus Vigo

Top security challenges and how to overcome them: Prepare for & address external threats

Cyber threats come from all sides. As bad actors continue to evolve their toolsets to more succinctly attack targets, organizations are faced with the challenges of preparing for threats while implementing mitigations to address them as quickly and efficiently as possible. One of the most critical are external threats originating from outside the organization – proving to be amongst the most common threat types and the most difficult to protect against – but not impossible to address with a holistic, comprehensive security strategy.

May 25, 2023 by Hannah Hamilton

5 things you need to know about BYOD security

Considering a BYOD program? In this blog, we’ll discuss a few ways BYOD affects your organization's security posture.

May 23, 2023 by Jesus Vigo

Security 360 Highlights: User privacy

Following the release of the Jamf Security 360: Annual Threat Trends Report 2023, where we highlight security threat trends, we utilize threat intelligence gathered by Jamf to inform security professionals about which threats from the previous year most critically affected the enterprise. Preserving user privacy is a growing threat that the data supports and is the focus of this blog series. Understanding its criticality to endpoint security and identifying which data types are at risk helps IT and Security teams know what to look for and how to mitigate risk best.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.