Free Republic
Browse · Search
General/Chat
Topics · Post Article

The headline is completely misleading. . . every Apple device is completely natively capable of what the article claims is missing from the devices. . . and the organization that published the "survey" is in the business of selling THIRD PARTY replacements of what the Apple devices are completely capable of doing without their products. All this shows is the failure of company IT departments to require harder passwords on devices that access their networks.

Apple passwords can be up to 256 characters and use any of the 223 characters accessible from the keyboard. The only limitation Apple imposes is that no password can have more than two consecutive identical characters.

The claim in the headline that "Most Apple devices lack proper security for the enterprise" is totally specious FUD as the devices DO have the proper security, it's just not being used, which makes the headline, and only the headline, suitable for this current FUD SEASON. . . it applies to all Bring Your Own Device which the company's IT department does not properly check out before allowing it to connect to the network.

1 posted on 08/24/2015 5:05:14 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies ]


To: ~Kim4VRWC's~; 1234; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; Aliska; altair; ...
An article in CIO Magazine whose headline is completely misleading. . . making it an anti-Apple FUD article claiming that "Most Apple devices devices lack proper security for the enterprise" when that it completely false. . . based on a survey compiled by a company selling 3rd party software to add such security to Macs, when the devices already have industrial strength security built in . . . if it's used. — PING!


Apple Enterprise FUD article
Ping!

If you want on or off the Mac Ping List, Freepmail me.

2 posted on 08/24/2015 5:14:19 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: All

It's FUD. . . and really blatantly bad FUD at that. . .

3 posted on 08/24/2015 5:16:29 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

The article is kind of meaningless without comparing it to non-Apple devices in the same workplaces. Android devices are not exactly known for being locked down. I have been in organizations where Linux/Unix root passwords were both common knowledge and easy to guess. None of tehse have to do with the device.

For the enterprise, it would be nice if Apple could have separate identities, logins if you will, for work and personal on iOS. That problem is far from unique to Apple. Windows 10 on Surface may not have that problem, but it brings its own mature and broad set of malware as well.


6 posted on 08/24/2015 5:27:49 PM PDT by Dr. Sivana (There is no salvation in politics)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

CIO Magazine should do better in properly vetting its articles. This appears to be more of an advertisement wrapped up as editorial content.


7 posted on 08/24/2015 5:30:58 PM PDT by SES1066 (Quality, Speed or Economical - Any 2 of 3 except in government - 1 at best but never #3!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker
The headline is completely misleading. . . every Apple device is completely natively capable of what the article claims is missing from the devices. . . and the organization that published the "survey" is in the business of selling THIRD PARTY replacements of what the Apple devices are completely capable of doing without their products. All this shows is the failure of company IT departments to require harder passwords on devices that access their networks.

Are they failing to require it, or failing to enforce it? It's one thing to publish a policy statement specifying a password complexity requirement. Being able to enforce it is something else altogether.

8 posted on 08/24/2015 5:31:00 PM PDT by tacticalogic
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

so, then use Windows Phone? Or Android?

Both of the alternate platforms are riddled with holes, compared to iOS.

This article is useless.


10 posted on 08/24/2015 5:31:34 PM PDT by BereanBrain
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

What!! “abc123” isn’t a good password??

Geeze, now you tell me. I guess I shouldn’t have used it when I signed up at Ashley Madison. Oops, I didn’t say that.


11 posted on 08/24/2015 5:39:56 PM PDT by KosmicKitty (Liberals claim to want to hear other views, but then are shocked to discover there are other views)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker
a new survey commissioned by Centrify, a company that sells enterprise security and management software for Apple products.

A crummy ad masquerading as a news article; like so much of today's "news".

12 posted on 08/24/2015 5:50:04 PM PDT by Flick Lives (One should not attend even the end of the world without a good breakfast. -- Heinlein)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

biometrics propaganda... you would not believe how desperately the government and many creepily intrusive large companies (e.g. Google, FB) want your biometric data

NEVER DO BIOMETRICS if you can help it. For God’s sake, don’t offer your fingerprints to a company that can resell them on the open market.


15 posted on 08/24/2015 6:16:19 PM PDT by Nep Nep
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

Haven’t heard fear, uncertainty and doubt since Dell.

I concur with your statement. A typical strong password has a minimum seven characters and is alphanumeric. Special characters in SSO environments can be problematic with in house apps.

I prefer phrases with strong requirements.


20 posted on 08/24/2015 7:30:26 PM PDT by LoneStar42 (Lurker since '94. Now monthly donor.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: SES1066; Dr. Sivana; LoneStar42; umgud; smokingfrog; Nep Nep; Flick Lives; KosmicKitty; ...
Validation from Six Colors:

Apple’s “lack” of enterprise security is anything but

This rather terrible CIO story’s headline is “Most Apple devices lack proper security for the enterprise” and its even more “damning” sub-headline is:

Apple’s Macs, iPhones and iPads are common in the modern workplace, but relatively few of these devices comply with standard security requirements, according to a new survey.

But the article itself paints a different picture:

More than half, or 51 percent, of all the users’ Apple devices were secured by single-word passwords or numerical PINs, and 58 percent of those devices had no software or policies to enforce the use of stronger passwords. The survey also found that 56 percent of Apple device users shared their passwords with others, and only 17 percent had company-supplied password managers.

In addition, only 28 percent of respondents’ Apple devices had company-provided device management solutions, and 35 percent of the people work for companies that enforce data encryption on Apple devices. Almost 60 percent of the Macs represented in the survey were used to access confidential company information, and 65 percent of those systems were used to access sensitive or regulated customer information, according to the survey.

So, it’s not that Apple devices don’t comply with the security features, it’s that those companies’ IT department don’t enforce the offered security properly or at all. Which is a bit like calling a car unsafe because you choose not to use the brakes.

Apple used to get a lot of flack for not being business-oriented, but it’s pretty hard to argue that they’re not a major player in enterprise these days, especially given the deal Apple struck with IBM last year.

So it’s always wise to ask yourself: where, exactly, do these stories come from?

Nearly half of all U.S. employees use at least one Apple device at work, but most of those gadgets lack common security protocols required by many enterprises, according to a new survey commissioned by Centrify, a company that sells enterprise security and management software for Apple products. [emphasis added]

Shocker.

It is nice when other pundits come to the same conclusions you do. . .

22 posted on 08/24/2015 10:42:03 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker
Not misleading but simply a puff piece for Microsoft's policy settings. For a decade or more our corporate admins could set passowrd policy in a setting in Windows security policy. In fact there are dozens of relevant settings. E.g. Enforce password history, Maximum password age, Minimum password age, Minimum password length, Password must meet complexity requirements, and Store passwords using reversible encryption.

For that last one it says "Do not use this setting unless you use a program that requires it." In contrast Unix and MacOS store passwords in the most secure way possible: a salted one-way hash. As someone pointed out on stackexchange it would take 2000 years to crack an eight character password. All the other policies are feel-good window dressing with almost no practical security value. Real security comes from a simple and public implementation of secure storage (salted multiple-iteration hashes) and comparison (timeout and try-limited). There's no reason to enforce a length or complexity requirement other than very trivial ones (e.g. a small length requirement and blacklist).

25 posted on 08/25/2015 8:59:51 AM PDT by palmer (Net "neutrality" = Obama turning the internet into FlixNet)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson