	{"id":192,"date":"2008-07-16T08:47:56","date_gmt":"2008-07-16T07:47:56","guid":{"rendered":"http:\/\/blog.intego.com\/?p=192"},"modified":"2008-07-16T08:47:56","modified_gmt":"2008-07-16T07:47:56","slug":"macs-not-secure-enough-for-the-enterprise","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/","title":{"rendered":"Macs Not Secure Enough for the Enterprise?"},"content":{"rendered":"<p>Infoworld has <a href=\"http:\/\/www.infoworld.com\/article\/08\/07\/14\/29FE-mac-security_1.html\">published a long article<\/a> by Mac expert Glenn Fleishmann discussing the major security weaknesses of Mac OS X and why Macs are not secure enough for the Enterprise. Fleishmann doesn&#8217;t look for specific exploits or vulnerabilities, but rather at more global security issues in Mac OS X. These include the way Apple handles security updates (especially their unpredictability), the fact that third-party security flaws take too long to be patched, and Apple&#8217;s complacency about malware. Fleishmann&#8217;s points are all valid, and Apple will need to address these issues to fit better into the state of mind of corporate IT managers.<\/p>\n<p>However, John Martello, writing at <a href=\"http:\/\/www.macobserver.com\/editorial\/2008\/07\/15.1.shtml\">The Mac Observer<\/a>, questions these points, saying that &#8220;the six arguments actually amount to a collection of shibboleths.&#8221; <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Infoworld has published a long article by Mac expert Glenn Fleishmann discussing the major security weaknesses of Mac OS X and why Macs are not secure enough for the Enterprise. Fleishmann doesn&#8217;t look for specific exploits or vulnerabilities, but rather at more global security issues in Mac OS X. These include the way Apple handles [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Infoworld has published a long article by Mac expert Glenn Fleishmann discussing the major security weaknesses of Mac OS X and why Macs are not secure\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Macs Not Secure Enough for the Enterprise? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Infoworld has published a long article by Mac expert Glenn Fleishmann discussing the major security weaknesses of Mac OS X and why Macs are not secure\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2008-07-16T07:47:56+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/\",\"name\":\"Macs Not Secure Enough for the Enterprise? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2008-07-16T07:47:56+00:00\",\"dateModified\":\"2008-07-16T07:47:56+00:00\",\"description\":\"Infoworld has published a long article by Mac expert Glenn Fleishmann discussing the major security weaknesses of Mac OS X and why Macs are not secure\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Macs Not Secure Enough for the Enterprise?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Macs Not Secure Enough for the Enterprise?\",\"datePublished\":\"2008-07-16T07:47:56+00:00\",\"dateModified\":\"2008-07-16T07:47:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/#webpage\"},\"wordCount\":132,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Apple\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Infoworld has published a long article by Mac expert Glenn Fleishmann discussing the major security weaknesses of Mac OS X and why Macs are not secure","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/","og_locale":"en_US","og_type":"article","og_title":"Macs Not Secure Enough for the Enterprise? - The Mac Security Blog","og_description":"Infoworld has published a long article by Mac expert Glenn Fleishmann discussing the major security weaknesses of Mac OS X and why Macs are not secure","og_url":"https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/","og_site_name":"The Mac Security Blog","article_published_time":"2008-07-16T07:47:56+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/","name":"Macs Not Secure Enough for the Enterprise? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2008-07-16T07:47:56+00:00","dateModified":"2008-07-16T07:47:56+00:00","description":"Infoworld has published a long article by Mac expert Glenn Fleishmann discussing the major security weaknesses of Mac OS X and why Macs are not secure","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Macs Not Secure Enough for the Enterprise?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Macs Not Secure Enough for the Enterprise?","datePublished":"2008-07-16T07:47:56+00:00","dateModified":"2008-07-16T07:47:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/macs-not-secure-enough-for-the-enterprise\/#webpage"},"wordCount":132,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Apple","Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-36","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/192"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=192"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/192\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}