Security
Business Issues

Is Your Network "Mac Safe"?

Sanjeev Malhotra, Chief Information Security Officer
Sanjeev Malhotra, Chief Information Security Officer

Hacking isn’t something that only Governments and Enterprise businesses have to worry about – SMB business is a favourite target. Knights of Old – a transport firm based in Kettering is a great (sad) example. You can read their story here. 

Monitoring and enforcing rules around password strength and complexity is something every business should do – and something about which they have complete control. Other variables rather less so. Once upon a time organisations could “dictate”: 

  1. what device an employee used – a PC or laptop (mostly Windows based) that was procured, built and patched by their own IT department or service provider. 
  1. where the device is connected to the corporate network – mostly the office.  

No more. 

Employers' authority over what devices employees use got diminished by a number of factors: 

  1. The blurring of lines between work and home – the always on nature of many roles (parent/employee) 
  1. The amount of time we spend on devices – people really want to be able to exercise personal choice about their “life partner” 
  1. The challenge associated with recruiting and retaining great people – the flexibility to BYOD (bring your own device) has become an employment benefit 

Employers’ ability to dictate where devices got demolished by Covid – at which point employers needed employees to work from home – an arrangement that has (for better or worse) become normalised since. 

As a result, employees now access your network and business applications using a second hand Apple MAC that they purchased second hand off eBay, share with their family, use for their own private purposes and don’t maintain – over a Wi-Fi connection is secured by the default admin password. 

Those responsible for IT security and business continuity – IT Managers, Finance Directors, and CFO’s - need to make a plan – they need to deal with the world as they find it – not as it was, or they wish it to be. 

How Can TSG Help? 

TSG serves over 1,200 mid-market businesses in the UK. We have friendly approachable people on staff – experts who really know their stuff. Tell us more about your employee base and IT infrastructure – we’ll tell you how to best secure it. To get in touch – please complete the form below.  

To Secure Your Cyber Infrastructure Get in Touch

Related Articles

Blogs
Is Your Network "Mac Safe"?
Security | Business Issues
Is Your Network "Mac Safe"?
Blogs
Are You Practicing Safe WFH?
Security | Managed & Cloud
Are You Practicing Safe WFH?
Blogs
One of Your Sales Team Just Opened a Dodgy Email Attachment: Here's What Happens Next…
Security | Managed & Cloud
One of Your Sales Team Just Opened a Dodgy Email Attachment: Here's What Happens Next…
Blogs
From Hack to Cash. How Quick Will You Recover?  
Security
From Hack to Cash. How Quick Will You Recover?  
Blogs
Identify Cyber Security Gaps with Penetration Testing
Security
Identify Cyber Security Gaps with Penetration Testing