Lessons Learned from the Latest Apple Security Vulnerability

March 14, 2014

Tim Davis
Systems Senior

Whether it is an iPhone, an iPad, or a Macbook, chances are you or someone in your family owns an Apple device.  With security flaws and breaches capturing the headlines these days, you’ve probably also heard of the latest security vulnerability affecting the Apple Safari browser and you might be wondering what can be done to protect your device from this type of attack.  If you have not done so already, the first step is to download and install the update that Apple released to fix this vulnerability, but once you have taken this step, what to do next?

Practice Proper Patch Management

Patches are updates to the operating system that manufacturers issue to fix bugs, add new features, or fix vulnerabilities.  You should make a habit of checking for patches on a regular basis for all your devices whether they are computers, cell phones, or tablets.  New vulnerabilities are discovered every day and most manufacturers are diligent in releasing patches to the operating systems to eliminate these issues.  However, if you are still running an older version of the operating system you may be left exposed.  Remember, attackers will go after the “low hanging fruit.”

Know Your Internet Connection

Be cautious when joining public internet connections in restaurants, coffee shops, airports, and hotels.  While public sites work great for catching up on news, gossip, or the latest internet meme, they can be dangerous for secure sites that require usernames and passwords.  If you have a wireless router at home, you named it at the time of set up.  In the same manner, attackers can set up a wireless router in these public places and give it the same name as the legitimate router.  It is very hard if not impossible to determine the real from the fake.

Stay Secure at Home

Home is the best place to conduct financial and other secure transactions over the web.  As an additional step, many security experts recommend having a dedicated computer that is used solely for these types of transactions and is patched regularly (see the first point above).  When possible, connect this computer with a cable directly from the router instead of using the wireless connection.

By following these tips, your chances of a security breach happening decreases significantly.Working in the Systems department at PKM, security is one our top priorities when providing services to our clients.We provide assistance on helping our clients financial information remain secure, so it’s important for us to keep up with the latest in security and information technology