Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around Deerfield Beach. Computer Services, Tech Support, IT Solutions and more!

Are Apple Computers Really More Secure?

Are Apple Computers Really More Secure?

For the better part of four decades, Apple has bragged that not only are their devices more secure than PCs, hackers don’t bother building threats specifically for their operating systems because their security is so superior. For this reason, Apple has routinely refused advances from law enforcement to share workarounds so that police can get into phones. Apple’s rationale for this constant refusal is that it would undermine their ability to keep the most secure personal computing devices, secure. Federal law enforcement officials went ahead and developed their own workaround and the findings may surprise many Apple aficionados. Let’s take a look:

The Discovery

After years of trying to go through Apple to gain access, they finally worked it out in 2020. In 2021, cryptographers published Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions, which is a position paper that looked to answer three questions:

  1. What security measures are currently in place to help deter unauthorized access to user data?
  2. How do modern devices allow unauthorized access? 
  3. How can mobile security be improved to prevent unauthorized access?

Researchers analyzed both the newest Android and iOS platforms and found that neither of them had security preparations that functioned any better than the other. Any person with the right equipment, and the inclination, can in fact, access the OS on either device. This may come as a shock to those people who have been lauding Apple’s devices to be impenetrable.  

Before you trash your iPhone, the researchers did “find a powerful and compelling set of security and privacy controls, backed and empowered by strong encryption” in iOS, but the tools presented were not used frequently enough to ensure security is maintained.

Android’s issues were exacerbated, in comparison to Apple’s, due to the vast amount of manufacturers that make Android-run products. They found that many devices lacked communications between Google, resulting in slowly implemented updates and inconsistencies in some devices’ security and privacy controls. 

These are just the hardware and software vulnerabilities. In the rest of the report, the researchers detailed the specific vulnerabilities for each platform. 

Apple-Specific Weaknesses

One of iPhone’s best features is that it allows users to securely store data to iCloud. According to the researchers of this report, that isn’t all the data Apple takes possession of. When initiated, iCloud takes control of a lot of other data that is sent to Apple, where it is accessible by all different types of entities, hackers and law enforcement included. 

This problem is exacerbated as the defenses put forth by Apple are less effective than initially thought. Analysis of this relationship led researchers to suppose that a tool that has been around since 2018 allows attackers to bypass integrated protections to guess user passcodes.

Android-Specific Weaknesses

On the other hand, researchers found Android had some serious issues with its local data protection. An example of this can be found in Android’s lack of an equivalent to Apple’s Complete Protection encryption, which leaves Android more open to breach. This is why the FBI can effectively access data from either platform without help from developers.

So What’s the End Result?

Ultimately, both mobile OSs are much more open to data breaches than either manufacturer is willing to admit. It’s never a good practice to assume your data is safe; especially with the default data protection developers have in place. It just goes to show that there is no such thing as impenetrable security, and it is on the users (or the organization) to actively accept these results and do what they need to do to secure their data more effectively. 

To do this, you will need to manage these devices with a mobile device management platform and have your employees sign onto a Bring Your Own Device policy. This way your organization is covered in ways that individual devices and mobile platforms simply can’t. 

If you would like more information about Bring Your Own Device, mobile device management, or any other platform that helps keep your organization’s data secure, give the IT experts at Direct Technology Group a call at 954-739-4700.

Tip of the Week: Keeping Tabs on Your Chrome Brows...
Technology That Is Helping Improve Society
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 03 March 2021

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Efficiency Productivity Google Hackers Network Security Data Microsoft Malware Workplace Tips Software Communication User Tips Innovation Business Smartphones Hardware Miscellaneous Email Backup IT Support Hosted Solutions Internet Mobile Devices Android Small Business Collaboration communications Computer Users Smartphone Mobile Device Ransomware Network VoIP Business Management Cybersecurity Social Media Productivity Windows Upgrade Managed IT Services Outsourced IT Windows 10 Passwords Browser Holiday Managed Service IT Services Tech Term Gadgets Microsoft Office Save Money Business Continuity Windows 10 Remote Employer-Employee Relationship Covid-19 Apps Automation Bandwidth Cloud Computing Facebook Data Backup Quick Tips Office Phishing Internet of Things Disaster Recovery Managed IT Services Data Recovery Marketing Chrome Saving Money Server Health Gmail Wi-Fi IT Support Information Mobile Device Management Wireless Networking Apple Applications Office 365 Analytics Router Alert Password Access Control Mobility Remote Computing Settings Retail Computers Managed Service Provider Cybercrime Patch Management Business Intelligence Government VPN WiFi App Hacking Data Breach Virtualization Office Tips Website Operating System Going Green Twitter Laptop Physical Security Data Management Blockchain Law Enforcement BDR BYOD Application Remote Monitoring iPhone Remote Work Recovery Battery Excel Managed IT Service Social Engineering Bring Your Own Device Environment Maintenance Printer Employee-Employer Relationship Lithium-ion battery Humor Mobile Computing Compliance Google Drive Spam Safety Mobile Office Workers Telephone Systems Net Neutrality Biometrics Conferencing Paperless Office Entertainment Voice over Internet Protocol Information Technology Politics History Mouse Word Value Big Data Artificial Intelligence VoIP Virus End of Support Search Vulnerability Training Remote Monitoring and Management Hosted Solution eWaste Cortana RAM Telephony Education User Error Best Practice Virtual Reality Processor Printer Server Shortcut Company Culture Tablet Healthcare Managing Stress HIPAA G Suite Hybrid Cloud Data Security Remote Workers Employees Telephone System Human Resources Wireless Charging Cost Management Dark Web Sports Cleaning Meetings Medical IT DDoS Robot Connectivity IT solutions Hard Drives Tip of the week Tech Support Free Resource Content Filtering Batteries Customer Relationship Management Virtual Assistant Scam YouTube Shadow IT Images 101 Risk Management Data Protection Smart Technology Customer Service Internet Exlporer How To Vendor Tech Terms Fax Server Files Payment Cards Streaming Media The Internet of Things Data storage SharePoint Social Network Two-factor Authentication PowerPoint Encryption Windows 7 Current Events Business Technology Unified Communications Hacker Internet exploMicrosoft Scams Notifications Computer Repair Inventory Time Management Innovations Spyware Antivirus Travel Techology Best Available Reputation National Security Cameras Authentication Fleet Management Machine Learning Printers Internet Explorer Google Maps Science Advertising Project Management Security Cameras IT Service Mobile Security Chrome OS Tip of the Week/Security Analysis HP Live Streaming HaaS Spotify Customer Updates Authorization Multi-Factor Authentication Telecommute Threat Sales e-waste Microsoft Teams Voice over IP Windows 8 Multi-Factor Security Private Cloud Insurance Wearables Mobile Reviews Unified Threat Management Document Management Personal Information WhatsApp Flexibility WIndows 7 Knowledge Cabling Wearable Technology Troubleshooting Holidays Data loss Social Printing eCommerce Botnet Public Cloud Windows Media Player Touchpad Electronic Health Records Gig Economy People Digital SaaS Bloatware News Legal Comparison Copy Display Running Cable Update Virtual Private Network Staff Paper Online Shopping Managed IT Uninterrupted Power Supply Gifts Reporting Edge Entrepreneur Specifications Windows XP Paste Relocation Benchmarks Outlook Co-Managed IT Websites Social Networking Ink Cables Tablets PDF E-Commerce Phone System Solid State Drive Customer relationships Video Games User Recycling Profitability Memes Dongle Management Lead Generation Payment Hiring/Firing Black Market Hard Disk Drive GDPR File Management IT budget disposal Remote Support Webcam Remote Control Distributed Denial of Service Eliminating Downtime IT Downloads Remote Working Budget Memory instant Messaging Staffing Video Storage Managed Services Provider IT Management Worker Alerts User Tip Spam Blocking Bluetooth Bitcoin Wireless Internet Hosted Desktop Technology Tips Trends Vulnerabilities Amazon WannaCry NarrowBand Downtime OneNote Broadband Error Programming File Sharing Work/Life Balance A.I. Telecommuting Avoiding Downtime Email Management USB Help Desk Firewall Backup and Disaster Recovery Cryptocurrency PCI DSS Plug-In Hard Drive Automobile Wireless Technology Windows Server 2008 R2 internet consultant Touchscreen Network Attached Storage Database User Security Movies Millennials Threats Certification Profiles SSD Regulations Compliance Proactive IT Processors Analyitcs Licensing Chromecast Gadget Consultant Monitor Taskbar Computer Accessories Microsoft Office 365 Distribution Server Management Access Tactics

Mobile? Grab this Article!

QR-Code dieser Seite