{"id":120,"date":"2008-03-28T09:47:49","date_gmt":"2008-03-28T08:47:49","guid":{"rendered":"http:\/\/blog.intego.com\/2008\/03\/28\/processor-magazine-examines-mac-security-issues-for-businesses\/"},"modified":"2008-03-28T09:47:49","modified_gmt":"2008-03-28T08:47:49","slug":"processor-magazine-examines-mac-security-issues-for-businesses","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/","title":{"rendered":"Processor Magazine Examines Mac Security Issues for Businesses"},"content":{"rendered":"<p>An <a href=\"http:\/\/www.processor.com\/editorial\/article.asp?article=articles\/P3013\/32p13\/32p13.asp&#038;guid\">article in Processor Magazine<\/a> takes a close look at the risks of using Macs in enterprise environments, and how to protect them against viruses and malware. Mentioning Intego&#8217;s software, the article looks at the need to protect not only Macs, but also Windows computers on a corporate network that may be infected by Macs passing on dangerous files unwittingly. <\/p>\n<p>The article says, &#8220;According to research firm Gartner, Macs made up 8.1% of PC market share for the third quarter last year, something that seemed unthinkable only five years ago. However, increased market share, along with Apple\u2019s switch to Intel, has brought something less palatable with it, and that something is malware.&#8221; <\/p>\n<p>As we know, that market share is growing, and more and more businesses that were previously Windows-only are adding Macs to their stables of computers, and need to have full protection from viruses, malware and hackers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An article in Processor Magazine takes a close look at the risks of using Macs in enterprise environments, and how to protect them against viruses and malware. Mentioning Intego&#8217;s software, the article looks at the need to protect not only Macs, but also Windows computers on a corporate network that may be infected by Macs [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"An article in Processor Magazine takes a close look at the risks of using Macs in enterprise environments, and how to protect them against viruses and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Processor Magazine Examines Mac Security Issues for Businesses - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"An article in Processor Magazine takes a close look at the risks of using Macs in enterprise environments, and how to protect them against viruses and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2008-03-28T08:47:49+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/\",\"name\":\"Processor Magazine Examines Mac Security Issues for Businesses - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2008-03-28T08:47:49+00:00\",\"dateModified\":\"2008-03-28T08:47:49+00:00\",\"description\":\"An article in Processor Magazine takes a close look at the risks of using Macs in enterprise environments, and how to protect them against viruses and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Processor Magazine Examines Mac Security Issues for Businesses\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Processor Magazine Examines Mac Security Issues for Businesses\",\"datePublished\":\"2008-03-28T08:47:49+00:00\",\"dateModified\":\"2008-03-28T08:47:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/#webpage\"},\"wordCount\":156,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"An article in Processor Magazine takes a close look at the risks of using Macs in enterprise environments, and how to protect them against viruses and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/","og_locale":"en_US","og_type":"article","og_title":"Processor Magazine Examines Mac Security Issues for Businesses - The Mac Security Blog","og_description":"An article in Processor Magazine takes a close look at the risks of using Macs in enterprise environments, and how to protect them against viruses and","og_url":"https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/","og_site_name":"The Mac Security Blog","article_published_time":"2008-03-28T08:47:49+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/","name":"Processor Magazine Examines Mac Security Issues for Businesses - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2008-03-28T08:47:49+00:00","dateModified":"2008-03-28T08:47:49+00:00","description":"An article in Processor Magazine takes a close look at the risks of using Macs in enterprise environments, and how to protect them against viruses and","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Processor Magazine Examines Mac Security Issues for Businesses"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Processor Magazine Examines Mac Security Issues for Businesses","datePublished":"2008-03-28T08:47:49+00:00","dateModified":"2008-03-28T08:47:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/processor-magazine-examines-mac-security-issues-for-businesses\/#webpage"},"wordCount":156,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1W","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/120"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/120\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}