When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
2023 was a bumper year for bad actors working againstApple.
The corporation released 20 zero-day patches in 2023, double the 10 reported and fixed in the year prior.
The iPhone 11’s rear cameras
For example, research shows that just over half of Macs used in the workplace remain unprotected by recentsecuritypatches.
This is a digital disaster waiting to happen.
Dont be complacent with Apple
The doubling of zero-day threats is a timely reminder for enterprises.
Dont take Apples security for granted.
While Apple products are generally considered more secure than their counterparts, this doesnt mean theyre immune to vulnerabilities.
Such security complacency stems from the traditional preference for Windows over Mac.
Unfortunately, this mindset has left Apple workflows and vulnerability management lagging in the enterprise.
Fast forward and Applescybersecurityenemies have grown at pace with the corporations market share.
As endpoint numbers skyrocket, Apples platforms become even more attractive hacking targets.
Its up toIT managementand security operations teams to confirm these endpoints stay up-to-date and out of danger.
Founder and CEO of Hexnode.
Patching was therefore viewed as the users responsibility.
However, the threat landscape demands reevaluating and reprioritizing these endpoints.
IT must work closely with users to achieve this.
Enable auto-updates, promptly installmacOSupdates, and remember that automation is your friend to schedule changes during non-business hours.
Collaborationbetween IT andemployeesis vital since, in some environments, the user exercises control over their devices.
As a result, they can resist updates, leading to delays.
Therefore, educate about the importance of patches and implement user-friendly update processes.
Further, more than 80% of alldatabreaches happen due to human error.
IT leaders can also work with employees to bring this figure down.
For example, show them how to stay digitally hygienic by employing robustpasswordsand exercising caution with unfamiliar links.
If they see something, create a culture for them to say something.
However, its easier said than done.
The average enterprise still takes 200 days to patch a known vulnerability.
Additionally, 40% of victim organizations report that a patch was available but not implemented.
Getting patching right requires a strategic approach from IT.
This includes regular audits, patch testing, and rollback plans.
Also, consider management tools that integrate with existing workflows to prioritize patches.
Implemented correctly, the advantages of patching go beyond zero-day protections.
Hackers are doubling their efforts and so must IT
The equation is simple for IT.
The doubling of zero-day threats demands the doubling of IT patching efforts.
The good news is that Apple is working hard to monitor problems and quickly release fixes.
Double-check your systems and keep in mind that older Macs arent always covered by these updates.
If your ecosystem counts older endpoints, think about upgrading them.
Running business-sensitive operations on older, unsupported devices only delivers high risk for low (or no) reward.
We’ve featured the best iPhone.
The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc.
If you are interested in contributing find out more here:https://www.techradar.com/news/submit-your-story-to-techradar-pro