{"id":48427,"date":"2015-12-01T08:32:36","date_gmt":"2015-12-01T16:32:36","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=48427"},"modified":"2016-01-20T13:27:47","modified_gmt":"2016-01-20T21:27:47","slug":"business-mac-security-threats","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/","title":{"rendered":"Are Macs Good Enough at Fighting Security Threats in the Workplace?"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-48430\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/11\/color-macbook-600x300.jpeg\" alt=\"Color Macbook\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/11\/color-macbook-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/11\/color-macbook-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/11\/color-macbook-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Windows fanboys might not like to admit it, but Apple computers are steadily growing their foothold on corporate networks \u2014 even so,\u00a0are IT bosses confident that Macs are doing a good enough job at fighting security threats?<\/p>\n<p>Privilege management firm,\u00a0Avecto,\u00a0<a title=\"Link to Avecto blog\" href=\"https:\/\/www.avecto.com\/news-and-events\/press-releases\/cios-confidence-in-mac-security-at-new-low\" target=\"_blank\" rel=\"nofollow\">says<\/a> that it interviewed 100 CIOs and over 1,000 employees, generating a snapshot of business attitudes towards Mac security, and its results may surprise you.<\/p>\n<p>First of all, the good news.<\/p>\n<p>According to the survey, Macs are well represented in the business space \u2014 with some 76% claiming that their firms use Macs. Of course, no-one is trying to claim that anything close to 76% are <em>only<\/em> using Apple computer hardware, but 36% do say that the number of Macs in their business have increased in the last year.<\/p>\n<p>Chances are that the <a title=\"Link to CNet article\" href=\"http:\/\/www.cnet.com\/news\/halo-still-in-effect-apple-sees-ipads-as-gateway-to-macs\/\" target=\"_blank\" rel=\"nofollow\">&#8220;halo effect&#8221;<\/a> continues to work well for Apple, with iPhones and iPads being many people&#8217;s first interaction with devices made in Cupertino, and encouraging an increasing number of users to try out Apple laptops and iMacs for corporate use too.<\/p>\n<p>However, 40% of those surveyed say that their confidence in Mac security has reduced \u2014 no doubt impacted by recent malware attacks such as <a href=\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/\" target=\"_blank\">Wirelurker<\/a>, revelations that <a href=\"https:\/\/www.intego.com\/mac-security-blog\/researcher-demonstrates-how-malware-can-bypass-os-xs-completely-broken-gatekeeper\/\" target=\"_blank\">Gatekeeper can be easily circumvented<\/a> and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/\" target=\"_blank\">bugs in AirDrop<\/a> that could be exploited to spread malware.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-48448\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/11\/more-secure.jpeg\" alt=\"Avecto infographic\" width=\"600\" height=\"540\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/11\/more-secure.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/11\/more-secure-150x135.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/11\/more-secure-300x270.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Nonetheless, as <em>Softpedia<\/em> <a title=\"Link to Softpedia\" href=\"http:\/\/news.softpedia.com\/news\/business-confidence-in-mac-security-has-decreased-over-the-past-year-496723.shtml\" target=\"_blank\" rel=\"nofollow\">reports<\/a>, 28% of those surveyed believe that Macs are &#8220;much safer&#8221; than Windows machines, compared to 18% who claim the opposite.<\/p>\n<p>Whatever the relative security merits of the rival platforms, there is no dispute these days that it&#8217;s just as important to protect Macs against Internet threats as Windows computers.<\/p>\n<p>Paul Kenyon, VP of Avecto, sums up the situation well:<\/p>\n<blockquote><p>&#8220;For too long there has been a false belief and a naivety that Macs are inherently securer than Windows PCs. But either way organizations must view them like any other device: an endpoint that can be exploited.&#8221;<\/p><\/blockquote>\n<p>There may be many times more malware written every day for Windows than Apple Macs, but that is no consolation if you are one of the poor souls unfortunate enough to be hit by an OS X Trojan horse.<\/p>\n<p>Personally, I wouldn&#8217;t attach a Mac computer to the Internet if it wasn&#8217;t running a <a href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">high quality anti-virus program<\/a>, and neither should you. Defend your important data with security software, keep your systems patched with the latest updates, and always think carefully about what programs you run and links you click on.<\/p>\n<p>Whether you are running Windows or Mac OS X, most attacks take advantage of human weakness in one way or another to crowbar their way onto your corporate network. Keep yourself clued up, and ensure that your staff are educated about the types of attacks that cybercriminals launch to break into a system.<\/p>\n<p>Through sharing knowledge about threats, and how to minimise risks, business leaders can hope to reduce the chances that their company\u00a0will be the next appearing in the newspaper headlines after a damaging hack.<\/p>\n<p><strong>Why not share your opinion on how well Macs are helping in the security fight? Leave a comment below.<\/strong><\/p>\n<p><span style=\"font-size: x-small;\">photo credit: <a title=\"MacBook Apple Computer UHD\" href=\"http:\/\/flickr.com\/people\/djandywdotcom\">DJANDYW.COM &amp; DJANDYW.TV AKA ANDREW WILLARD<\/a> via <a href=\"http:\/\/flickr.com\/photos\/djandywdotcom\/23311553815\">flickr photo<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-sa\/2.0\/\">(license)<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Windows fanboys might not like to admit it, but Apple computers are steadily growing their foothold on corporate networks &#8211; but are IT bosses confident that Macs are doing a good enough job at fighting security threats?<\/p>\n","protected":false},"author":34,"featured_media":48454,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[151,13],"tags":[2590,168],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Windows fanboys might not like to admit it, but Apple computers are steadily growing their foothold on corporate networks - but are IT bosses confident that Macs are doing a good enough job at fighting security threats?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are Macs Good Enough at Fighting Security Threats in the Workplace? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Windows fanboys might not like to admit it, but Apple computers are steadily growing their foothold on corporate networks - but are IT bosses confident that Macs are doing a good enough job at fighting security threats?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-01T16:32:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-01-20T21:27:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/11\/laptop-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/11\/laptop-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/11\/laptop-400x260.jpeg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/\",\"name\":\"Are Macs Good Enough at Fighting Security Threats in the Workplace? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/#primaryimage\"},\"datePublished\":\"2015-12-01T16:32:36+00:00\",\"dateModified\":\"2016-01-20T21:27:47+00:00\",\"description\":\"Windows fanboys might not like to admit it, but Apple computers are steadily growing their foothold on corporate networks - but are IT bosses confident that Macs are doing a good enough job at fighting security threats?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are Macs Good Enough at Fighting Security Threats in the Workplace?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Are Macs Good Enough at Fighting Security Threats in the Workplace?\",\"datePublished\":\"2015-12-01T16:32:36+00:00\",\"dateModified\":\"2016-01-20T21:27:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/#webpage\"},\"wordCount\":529,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/11\/laptop-400x260.jpeg\",\"keywords\":[\"Business\",\"OS X\"],\"articleSection\":[\"Recommended\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Windows fanboys might not like to admit it, but Apple computers are steadily growing their foothold on corporate networks - but are IT bosses confident that Macs are doing a good enough job at fighting security threats?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/","og_locale":"en_US","og_type":"article","og_title":"Are Macs Good Enough at Fighting Security Threats in the Workplace? - The Mac Security Blog","og_description":"Windows fanboys might not like to admit it, but Apple computers are steadily growing their foothold on corporate networks - but are IT bosses confident that Macs are doing a good enough job at fighting security threats?","og_url":"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-12-01T16:32:36+00:00","article_modified_time":"2016-01-20T21:27:47+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/11\/laptop-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/11\/laptop-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/11\/laptop-400x260.jpeg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/","name":"Are Macs Good Enough at Fighting Security Threats in the Workplace? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/#primaryimage"},"datePublished":"2015-12-01T16:32:36+00:00","dateModified":"2016-01-20T21:27:47+00:00","description":"Windows fanboys might not like to admit it, but Apple computers are steadily growing their foothold on corporate networks - but are IT bosses confident that Macs are doing a good enough job at fighting security threats?","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Are Macs Good Enough at Fighting Security Threats in the Workplace?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Are Macs Good Enough at Fighting Security Threats in the Workplace?","datePublished":"2015-12-01T16:32:36+00:00","dateModified":"2016-01-20T21:27:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/#webpage"},"wordCount":529,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/11\/laptop-400x260.jpeg","keywords":["Business","OS X"],"articleSection":["Recommended","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/11\/laptop-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-cB5","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/48427"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=48427"}],"version-history":[{"count":13,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/48427\/revisions"}],"predecessor-version":[{"id":48490,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/48427\/revisions\/48490"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/48454"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=48427"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=48427"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=48427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}