Cover Your Back Against Mac Attacks by Jody Ma Kissling

As Mac users struggle with recently-reported security concerns, enterprises that have a bring-your-own-device (BYOD) policy should also bolster their defenses. So far, the Flashback trojan has reportedly infected around 650,000 Macs around the world, catching off guard Mac users who are used to a relatively safe computing environment.

With most malware outbreaks historically only targeting Windows machines, Apple has been criticized over the past few years for the slow pace at which it releases critical security patches. As the market share for Macs continues to increase, end users, corporations and Apple itself must all be prepared for a subsequent rise in attacks targeting Apple’s Mac OS X.

In today’s fast-paced computing era where convenience, mobility and IT consumerization reign, it is becoming increasingly difficult for IT administrators to keep track of and properly secure all of the devices – including laptops – that enter the corporate environment. Employees are increasingly expecting to work with whichever device they prefer – even if that device is their personal Mac. Often times, they will access the corporate network using their device of choice, and will even circumvent security policies in order to do so.

So how can administrators prevent malware like the Flashback trojan from spreading across their corporate networks without being able to control which devices users bring to the office? And without being able to dictate what types of security measures users install on their own devices?

The only viable solution to this BYOD challenge is NetFlow. Already inherent in routers and switches, NetFlow can provide in-depth insight into every activity happening across the network. Through flow-based monitoring, organizations can obtain a comprehensive, cost-effective view into each and every device accessing the corporate network – without having to install software on the devices or deploy expensive probes.  

By collecting valuable intelligence on users’ personal devices – including device type, user identity, security posture, which resources the device is accessing, where the device is physically located, etc. – Lancope’s StealthWatch flow-based monitoring solution can effectively ensure that personal devices are not downloading confidential, restricted data or spreading malware to other assets. This way, organizations can maintain network security and integrity in spite of the latest malware outbreak – no matter which platform it is targeting.  

Click here for more information on how flow-based monitoring can boost BYOD security.

Image by wwarby

Comments (0)

Post a Comment

Join the conversation. Post a comment using the form below.

*For security, enter the word you see below

Notify me of follow-up comments?