Category: Work

  • Understanding Phishing and Malware: A Simple Guide

    Understanding Phishing and Malware: A Simple Guide

    In today’s digital world, staying safe online can feel overwhelming, especially if technology isn’t your forte. You don’t need to be a computer expert to protect yourself from cyber threats. This guide is written specifically for everyday people who want to understand the most common dangers lurking on the internet without getting lost in technical…

  • Understanding Jamf Trusted Access: Your Digital Security Guard

    Understanding Jamf Trusted Access: Your Digital Security Guard

    If you’ve ever traveled through an airport, you know the drill: show your ID, scan your boarding pass, walk through security, and only then do you get to your gate. Nobody just wanders onto a plane. There’s a system in place to make sure only the right people get access to the right places. Jamf…

  • Platform SSO Revisited: The Future of Enterprise Mac Authentication

    Platform SSO Revisited: The Future of Enterprise Mac Authentication

    All credits for the information in this recap that I made, go to Joel Rennich, who presented this topic at MacSysAdmin 2025 in Sweden. This recap is based on his presentation during this event. Why this recap? Because it’s currently a much-discussed topic in the Macadmins space. Platform SSO continues to evolve as Apple’s vision…

  • October: Cybersecurity Awareness Month. Why It Matters to You and Me

    October: Cybersecurity Awareness Month. Why It Matters to You and Me

    We are entering autumn and It’s also Cybersecurity Awareness Month (CSAM), a time when tech enthusiasts, professionals, and everyday users like you and me come together to sharpen our digital defenses. For those of us in EMEIA (Europe, Middle East, India, and Africa), and indeed around the world, this month is a reminder that cybersecurity…

  • CIS Level 1 vs Level 2: Complete Guide to Choosing the Right Security Framework

    CIS Level 1 vs Level 2: Complete Guide to Choosing the Right Security Framework

    With cyber threats reaching unprecedented levels and data breaches affecting millions of organizations worldwide, implementing robust security frameworks has never been more critical. The Center for Internet Security (CIS) provides two distinct benchmark levels to help organizations protect their IT infrastructure; but which one is right for your business? This blog is a follow-up to…

  • Securing Your Apple Fleet: Why CIS Benchmarks Are Essential for Modern Organizations

    Securing Your Apple Fleet: Why CIS Benchmarks Are Essential for Modern Organizations

    In today’s rapidly evolving cybersecurity landscape, organizations need robust, proven security frameworks to protect their digital assets. For companies managing Apple device fleets, the Center for Internet Security (CIS) Benchmarks provides a comprehensive roadmap to enhance security posture while maintaining operational efficiency. What Are CIS Benchmarks? The CIS Benchmarks® are prescriptive configuration recommendations for more…

  • Navigating NIS2 Compliance for Apple Devices

    Navigating NIS2 Compliance for Apple Devices

    The cybersecurity landscape in the European Union has evolved significantly with the introduction of Network and Information Systems 2 (NIS2). As organizations scramble to meet compliance requirements that became mandatory in October 2024, those managing Apple device fleets need targeted strategies to ensure their Mac and iOS ecosystems align with these critical regulations. Understanding NIS2:…

  • Combining Apple’s PSSO and Jamf Connect for Secure Mac Management

    Combining Apple’s PSSO and Jamf Connect for Secure Mac Management

    A comprehensive guide to seamless, secure Mac authentication in 2025 and beyond September 19, 2025: Hear from a Jamf Customer Success Manager discussing Platform Single Sign-On, including how it impacts authentication workflows and how Jamf customers can get started today (new Jamf blog): https://www.jamf.com/blog/macos-26-platform-sso-simplified-setup/ September 18, 2025; Disclaimer: with the release of macOS Tahoe 26.0…

  • Strengthening macOS Security: The Power of Jamf Protect and SIEM Integration

    Strengthening macOS Security: The Power of Jamf Protect and SIEM Integration

    In today’s complex threat landscape, organizations managing Apple devices need more than standalone security tools, they need integrated solutions that provide comprehensive visibility and rapid response capabilities. The integration of Jamf Protect with Security Information and Event Management (SIEM) platforms represents a significant advancement in macOS security monitoring and incident response. While I previously explored…

  • Elevating macOS Security: Understanding Jamf Protect Analytics and SOAR Integration

    Elevating macOS Security: Understanding Jamf Protect Analytics and SOAR Integration

    In today’s rapidly evolving threat landscape, organizations managing Apple devices need sophisticated security solutions that go beyond basic endpoint protection. Jamf Protect Analytics, combined with powerful SOAR (Security Orchestration, Automation, and Response) capabilities through Jamf Pro integration, offers enterprise-grade security orchestration specifically designed for macOS environments. What is Jamf Protect Analytics? An analytic is a…