1 min read

Apple Releases iOS Best Practices Security Guide

Loredana BOTEZATU

June 01, 2012

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Apple Releases iOS Best Practices Security Guide

When it comes to tackling security aspects across their operating system range, Apple is known to reluctantly dismiss any insinuation. In this context, the release of “iOS Security Guide” – as it was humbly named, is a silent confirmation that the operating system alone is not enough to prevent or fight off attacks.

The document is an overview of security features implemented in iOS. It also includes a checklist of best practices businesses should take into account before deploying the devices in production.

The checklist mentions built-in support for mobile device management, configuration enforcement, file data protection and application signing, as well as more advanced security aspects such as defense against the brute-force guessing of passwords or device compromise at boot-up.

Businesses are encouraged to review their IT and security policies to ensure they are taking full advantage of the layers of security technology and features offered by the iOS platform,” the report states.

The 20-page document also hints that Apple may have the corporate environment as a main goal: a billion-dollar market that offers huge opportunities with the advent of mobile communications and “Bring-Your-Own-Device”.

Each component of the iOS security platform, from hardware to encryption to device access, provides organizations with the resources they need to build enterprise-grade security solutions. The sum of these parts gives iOS its industry-leading security features, without making the device difficult or cumbersome to use,” concludes the document.

All product and company names mentioned herein are for identification purposes only and are the property of, and may be trademarks of, their respective owners.

tags


Author



Right now

Top posts

What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read
Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

June 22, 2022

1 min read
Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

May 24, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Chinese criminals scam kids desperate to play games for more than three hours a week Chinese criminals scam kids desperate to play games for more than three hours a week
Graham CLULEY

August 12, 2022

2 min read
Sophisticated Smishing Attack on Twilio Leads to Employee Credential Leak and Data Breach Sophisticated Smishing Attack on Twilio Leads to Employee Credential Leak and Data Breach
Silviu STAHIE

August 09, 2022

1 min read
Attackers Hit German Chambers of Industry and Commerce; All Digital Services Down Attackers Hit German Chambers of Industry and Commerce; All Digital Services Down
Silviu STAHIE

August 05, 2022

1 min read