How Much More Secure are Apple Mobile Devices?

How Much More Secure are Apple Mobile Devices?

For a considerably long time—over 40 years—Apple has staked the claim that their devices are pretty much hack-proof, that most hackers wouldn’t even try breaking into their security measures. Law enforcement was so repeatedly rebuffed by the company as they sought workarounds to get into their devices, that these law enforcement agencies figured it out for themselves.

In doing so, they uncovered a few things that even the most ardent Apple fans may be surprised to hear.

What Has Been Discovered About Mobile Security

After having nagged Apple for years to share access to their OS, law enforcement finally figured it out in 2020, and in 2021, a position paper entitled Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions explored three questions:

  1. What security measures are currently in place to help deter unauthorized access to user data?
  2. How do modern devices allow unauthorized access? 
  3. How can mobile security be improved to prevent unauthorized access?

Researchers dug into both of today’s major platforms—Android and iOS alike—and discovered that neither of the two offered a superior security foundation when compared to the other.

While the researchers did “find a powerful and compelling set of security and privacy controls, backed and empowered by strong encryption” in the iOS platform, these tools simply weren’t being used with enough consistency to really deliver the security benefits they should have been. Android’s issues were derived from the fact that so many manufacturers have the capability to build devices that run Android and—since many of these devices would only communicate with Google HQ so often—updates were often slow to be implemented and some controls could be inconsistent.

Of course, the report included a few specific examples of the issues that were discovered:

Apple’s Security Issues

There is an argument to be made that an Apple user’s ability to securely store their data in iCloud is one of the best features of the platform. However, the researchers also uncovered that this data isn’t all that is taken in by Apple. Activating iCloud also sends a litany of other data to Apple… where other entities (like hackers and now law enforcement) can now access it.

With Apple’s security defenses less effective than they were once believed, this problem is made to be even bigger. Apparently, the researchers also have reason to believe that a tool like theirs has existed since 2018 that could allow attackers to guess user passcodes.

Android’s Security Issues

As for Android, its shortcomings were largely in its local data protection. Android has no solution that could be analogous to Apple’s Complete Protection encryption, leaving it more vulnerable as a result.

What Does This All Mean?

In so many words: neither is the perfect defense that either platform wants you to think it has.

You really shouldn’t ever assume that your data is safe to begin with. The onus falls to you and your organization to manage your data’s security. Fortunately, there are solutions available today to help, like mobile device management platforms and Bring Your Own Device policies that help ensure that your organization isn’t inviting in additional threats.

BNMC can help you put these tools and more in place. Give our team of experts a call at 978-482-2020 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, May 10 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Productivity Business Computing User Tips Cloud Email Privacy Software Network Security Hackers Workplace Tips Efficiency Microsoft Business Data Google Computer Hardware Hosted Solutions Malware IT Services Communication Internet Mobile Devices Mobile Device IT Support Smartphone Small Business Phishing Android Users Cloud Computing Innovation Data Recovery Tech Term Ransomware Backup Managed IT Services Cybersecurity Windows Smartphones Saving Money Information Outsourced IT Quick Tips VoIP Upgrade Miscellaneous communications Network Disaster Recovery Passwords Facebook Microsoft Office Social Media Browser Windows 10 Data Backup Business Management Office 365 Server Collaboration Business Continuity COVID-19 Internet of Things Managed IT Services Managed Service Productivity Apps Gadgets Remote Work Windows 10 Data Management Remote Monitoring Analytics Word Gmail Artificial Intelligence Mobile Office App Save Money Information Technology Infrastructure Vulnerability Chrome Managed Service Provider Government Router Money Conferencing Spam WiFi Encryption Remote Workers Settings Networking VPN Access Control Data Security Applications Holiday BYOD Employer-Employee Relationship Display Website Company Culture IT Support Paperless Office Tip of the week Google Drive Virtual Reality HIPAA Maintenance BDR Apple Firewall Education Wi-Fi IT Management Storage Business Technology Document Management Computers Virtualization YouTube Virtual Private Network Compliance Wireless Risk Management Hacker Data storage Office Tips Computing Employee-Employer Relationship Operating System Robot Managed Services Avoiding Downtime Social Antivirus Big Data Automation Development End of Support Unified Threat Management Content Filtering Bandwidth Search desktop Windows 7 Marketing Cryptocurrency Remote Computing Software as a Service Going Green SaaS Images 101 Mobile Security Vendor Printing Server Management Password Touchscreen Alert Managed IT Solid State Drive Business Intelligence Retail iOS How To Identity Theft Remote Tablet Blockchain Training Hard Disk Drive Regulations Vendor Management Outlook Monitors Augmented Reality MSP Bring Your Own Device Laptop Chromebook Two-factor Authentication Managed IT Service Managing Stress LiFi The Internet of Things Budget Hosted Solution Customer Relationship Management Scam Humor Administration Data loss OneNote Best Practice IT Downtime Break Fix Data Breach Cybercrime Mouse Social Network Telephone Systems Free Resource Black Friday Identity Continuity Digital Payment Employees Co-Managed IT Fraud Cost Management Disaster Managed Services Provider Smart Office IT solutions Emergency Banking Digital Onboarding GDPR Screen Reader Charging Google Docs Network Congestion Servers Google Calendar Meetings Holidays Hacks Dark Web Procedure Slack Hard Disk Drives Wires Network Management Distribution Print Toner Myths Licensing Dongle Cyber Monday Messaging Solar Google Wallet Gig Economy Content Huawei Assessment Bitcoin Writing Payment Card Uninterrupted Power Supply Entertainment Work Reviews Spyware Digital Signage Data Warehouse Smart Tech Business Growth Halloween Legislation Microsoft Excel Computer Care PCI DSS IBM Monitoring Solid State Drives Voice over Internet Protocol Legal Dark Data Update SharePoint File Sharing Logistics 2FA Shortcuts Mobile Management Cooperation Service Level Agreement Smart Technology Employee-Employer Relationships Unified Communications Drones Techology FBI Streaming Processor Hotspot Internet Exlporer Windows 8 Inventory Hybrid Cloud IT Technicians Optimization Politics Lenovo Troubleshooting Business Analysis Connectivity Scary Stories Statistics Leominster Mobile Device Management Work/Life Balance Mail Merge Battery Corporate Profile Spying National Security Modem FinTech Deep Learning Running Cable Customer Service Downloads Asset Management Security Cameras Profiles Staff Office Samsung Shortcut Distributed Denial of Service G Suite Peripheral Analysis Students Health Private Cloud VoIP Unified Threat Management Automobile K-12 Education Human Error Memory Language Value Buisness Bluetooth Comparison Shadow IT Dell Scalability Mirgation Recycling Virtual Desktop Tech Support Firefox Superfish user treats Virus IoT Alt Codes Sports K-12 Schools Address Permissions Files WannaCry Updates Cookies Memes Cabling Utility Computing Social Engineering Patch Management Management Mixed Reality Social Networking User Error Google Maps Instant Messaging Device Reducing Cost Computing Infrastructure Professional Services Specifications Gamification Migration Consulting Chatbots eWaste Websites Shopping LED Threats Star Wars Typing Twitter Wearable Technology Network upgrade Current Events RMM PowerPoint Nanotechnology Heating/Cooling Multi-Factor Security Laptops Safety Policy Motherboard Cables Time Management Printer Mobility Batteries Alerts USB Cameras Personal Information Botnet Financial 3D Printing Tracking Cortana Cleaning CCTV Machine Learning Processors Webcam Unsupported Software Regulation Computer Repair Relocation Error Point of Sale Ben McDonald shares Mobile Data How To Recovery Travel Supercomputer CrashOverride Printers Black Market Mobile Computing Law Enforcement Staffing Motion Sickness Notifications Taxes Electronic Medical Records Administrator Web Server what was your? Physical Security IT Budget Upgrades Gadget GPS Emoji Crowdsourcing IT Consultant

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3