BNMC Blog

By accepting you will be accessing a service provided by a third-party external to https://www.bnmc.net/

Macs Are Not Immune to Cybersecurity Threats

Macs Are Not Immune to Cybersecurity Threats

It’s a common myth that Apple computers don’t get viruses. It’s not uncommon for a Mac user to chime in and say, “you should have gotten a Mac,” when a PC user mentions getting a virus or malware. 

Let’s unpack this myth, and talk a little about how, no matter what technology you have, you need to protect it.

Do Macs Get Viruses?

In short, the answer is yes, absolutely. Apple computers can get infected with malware like viruses and ransomware. Macs can also suffer from other typical PC problems, such as hardware failure, data loss, slowing down over time, crashes, and more. 

So where did this misinformation come from? Why do so many casual users tend to think that Macs don’t suffer from the same issues as the Windows PC?

Once place to start is Apple’s own (brilliant) advertising. You have to admit, Apple has had some very memorable advertisements over the years. In fact, one of my favorite ad campaigns may be one of the reasons that so many people think that Macs are immune to viruses. 

Check out the Mac. Vs PC commercial here.

These ads are cute and charming and feel honest enough to be true.

To Apple’s credit, no lies are being told in the ad. Swarms of new viruses are created for Windows PCs every year, and many of these viruses can’t infect Mac computers. Macs still get viruses, but there are definitely more variants out there for PC. Why is this?

PCs Vastly Outnumber Macs

In 2018, it was estimated that for every 10 active PCs on the Internet, there was only one Mac. If roughly 90% of the world runs on Microsoft Windows, it makes much more sense for hackers to develop viruses that would affect this broader target.

Most businesses use PCs. Most schools and universities use PCs. In fact, most industries tend to use PCs. Most home computing is done on PC as well. 

That isn’t to say that there is anything wrong with a Mac. Apple makes incredibly solid laptops, and extremely capable desktops. The problem lies with third-party developers. For many businesses, certain core applications don’t have Mac versions. On top of that, when compared to the PC market, Apple doesn’t have a low-end tier for hardware. Your billing department doesn’t need the same computer that your video editor would use, and there isn’t a reason to spend that kind of money on a high-end Mac when a mid-range PC will handle the workload just fine. There really isn’t anything that you can do on a $2000 MacBook that you can’t do on a $2000 Windows laptop - at that point it’s just about preference and what works for your business. On the flipside, there are some limitations to what you can do on that Mac; when it comes to easily connecting and using a business network that’s designed for PCs, and when it comes to the software mentioned above.

So, Mac Owners Do Need to Worry About Viruses?

Yes sir. Although historically, there haven’t been as many viruses targeting Macs over the years, and it’s always felt like Macs might have a slightly lower risk, that has been changing. According to a recent report by Malwarebytes, the amount of malware on Macs is actually outpacing PCs for the first time ever. It sounds like hackers are relying on the complacency of Mac users.

Malwarebytes goes on to report that there was a 400 percent increase in threats on Mac devices between 2018 and 2019. 

Mac users need to worry about the same threats, and practice the same security hygiene as any other computer user. Whether you have a Mac or PC, you need proper antivirus software, strong passwords, and common sense.

For your business, of course, you also need to protect all the endpoints on your network, prevent phishing attacks, and educate your end users. BNMC can help with this. Reach out to us by calling 978-482-2020 and ask how we can help secure your network.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, August 09 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Privacy User Tips Cloud Email Network Security Microsoft Hackers Hosted Solutions Efficiency Computer Business Software Malware Data Communication Google IT Services Small Business Workplace Tips Hardware IT Support Mobile Devices Cloud Computing Tech Term Internet Data Recovery Smartphone Managed IT Services Android Backup Ransomware Mobile Device Innovation Outsourced IT Users Information Phishing Upgrade Saving Money Windows Smartphones Facebook Data Backup Miscellaneous Disaster Recovery Server Cybersecurity Social Media Business Continuity communications Office 365 Network Microsoft Office Business Management Browser Windows 10 VoIP Managed IT Services Productivity Data Management Windows 10 Passwords Internet of Things Gadgets Word Vulnerability Remote Monitoring App Gmail Quick Tips Managed Service Provider Apps Artificial Intelligence Mobile Office Infrastructure Encryption Managed Service Chrome Remote Workers Information Technology Save Money Google Drive Employer-Employee Relationship Networking Virtual Reality Access Control Analytics VPN Website Remote Work Applications Government Router BYOD Company Culture IT Support Money Settings Tip of the week Avoiding Downtime Development Robot Antivirus Bandwidth Automation Content Filtering YouTube COVID-19 HIPAA BDR Risk Management Education Apple Storage IT Management Data Security Paperless Office Business Technology Office Tips Virtual Private Network Computers Hacker Data storage Unified Threat Management Big Data Conferencing Employee-Employer Relationship Display Spam Collaboration Firewall WiFi Maintenance Vendor Management Social OneNote Monitors LiFi Managed IT Service Document Management Data Breach Humor Customer Relationship Management Scam Chromebook Hosted Solution Best Practice Windows 7 IT Administration Social Network Wireless Solid State Drive Software as a Service Mouse Break Fix End of Support Search Going Green Training Mobile Security Remote Computing Hard Disk Drive SaaS Printing Server Management Wi-Fi Password Touchscreen Compliance Business Intelligence iOS Virtualization Laptop Managed IT Holiday Data loss How To The Internet of Things Tablet Telephone Systems Retail Alert Regulations desktop Managed Services Outlook Augmented Reality Computing Downtime MSP Operating System Two-factor Authentication Marketing Managing Stress Bring Your Own Device Tech Support Star Wars PowerPoint User Error Management Chatbots eWaste Laptops Budget Patch Management Spyware Typing Gamification Wearable Technology Network upgrade Uninterrupted Power Supply Mobility Batteries Specifications Nanotechnology Alerts USB File Sharing Co-Managed IT Current Events Heating/Cooling Multi-Factor Security Social Engineering Motherboard Cables Computer Care IBM Websites Fraud Cost Management Onboarding GDPR Time Management Printer Policy Twitter Halloween Identity Continuity Managed Services Provider Screen Reader Charging Identity Theft Slack Cryptocurrency Hard Disk Drives Smart Office Print Toner Myths Black Friday Messaging Google Docs Emergency Holidays Licensing Dongle IT solutions Content Huawei Servers Google Calendar Safety Wires Corporate Profile Dark Web Distribution Assessment Automobile Digital Signage Hacks Data Warehouse Network Management Procedure Scary Stories Solar G Suite Entertainment Vendor Smart Tech Monitoring Bitcoin Solid State Drives Network Congestion Running Cable Work Dell Shortcuts Google Wallet Mobile Management Cyber Monday WannaCry Business Growth Employee-Employer Relationships Payment Card Cooperation Service Level Agreement Cabling Streaming Processor Legislation Buisness Voice over Internet Protocol Microsoft Excel Logistics Hotspot Virtual Desktop Internet Exlporer Google Maps Troubleshooting Business Analysis SharePoint Writing PCI DSS Sports Legal Hybrid Cloud Connectivity Spying Windows 8 National Security Techology IT Technicians Optimization Unified Communications Security Cameras Drones Profiles Smart Technology Analysis Students Lenovo Dark Data Inventory Update Staff Leominster Human Error Memory Statistics Modem FinTech Mail Merge Blockchain Asset Management Language Value Mobile Device Management Virus Downloads Battery Deep Learning Scalability Politics IoT Digital Payment Updates VoIP Unified Threat Management Peripheral Mirgation Recycling Utility Computing Shortcut Distributed Denial of Service Digital Alt Codes Mixed Reality Firefox Superfish Customer Service Shadow IT Cybercrime K-12 Schools Meetings Disaster Device Reducing Cost Bluetooth Comparison Work/Life Balance Cookies Consulting Address Permissions Memes Health Private Cloud Computing Infrastructure Professional Services LED Threats Office Samsung Social Networking Migration Black Market CCTV Webcam Law Enforcement Electronic Medical Records Financial Notifications Physical Security Error Emoji Point of Sale Ben McDonald shares Upgrades Gadget Travel Crowdsourcing Personal Information Botnet Regulation Supercomputer CrashOverride Cortana 3D Printing Motion Sickness Staffing Machine Learning Administrator Processors Taxes IT Budget Web Server what was your? Unsupported Software GPS Computer Repair Relocation Printers IT Consultant Cameras Mobile Data Tracking Recovery How To Mobile Computing Cleaning

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3