{"id":6094,"date":"2020-08-25T18:39:39","date_gmt":"2020-08-25T13:09:39","guid":{"rendered":"https:\/\/www.hexnode.com\/blogs\/?p=6094"},"modified":"2022-09-28T12:26:11","modified_gmt":"2022-09-28T06:56:11","slug":"endpoint-security-for-mac-trends-in-2020","status":"publish","type":"post","link":"https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/","title":{"rendered":"Endpoint security for Mac: Trends in 2020"},"content":{"rendered":"<p><span data-contrast=\"none\">The concern for endpoint security for Mac devices\u00a0<\/span><span data-contrast=\"none\">has<\/span><span data-contrast=\"none\">\u00a0often taken a backseat compared to Windows corporate devices. The higher security of Mac devices has been a given ever since the first MacBook was introduced in May 2006. However, while Macs do boast of a relatively secure environment<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">compar<\/span><span data-contrast=\"none\">ed<\/span><span data-contrast=\"none\">\u00a0to the<\/span><span data-contrast=\"none\">ir<\/span><span data-contrast=\"none\"> counterparts, they are not invincible against security threats. For Macs in corporate use, it is necessary to evolve the endpoint security in accordance with the latest trends.<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Common mistakes while achieving Endpoint Security for Mac<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<h3><span data-contrast=\"none\">Relying on end-users for securing their devices<\/span><\/h3>\n<p><span data-contrast=\"none\">Mac users are often pre-conceived as the more technical users. The task of securing their devices <\/span><span data-contrast=\"none\">i<\/span><span data-contrast=\"none\">s\u00a0<\/span><span data-contrast=\"none\">left to the end-user which can be a risky move. End users cannot be expected to be proactive about<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">device security at all times. Properly monitoring the devices and ensuring that the updates and configurations are properly enabled is the responsibility of the IT admin.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">Excessive restrictions on the devices <\/span><\/h3>\n<p><span data-contrast=\"none\">While it is inadvisable to give the user complete control over the device, it is also not recommended to tightly restrict the devices. Striking the right balance is important to maximize security while not compromising on user experience. <\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">Dependence on legacy applications for protection<\/span><\/h3>\n<p><span data-contrast=\"none\">macOS is constantly evolving and the tools responsible for securing the Macs need to keep up with the pace. For example, using <\/span><span data-contrast=\"none\">the\u00a0<\/span><span data-contrast=\"none\">Profile Manager tool to manage your Apple devices may work for a few devices but it would backfire in the long run when the business has a growing number of devices. Using a proper MDM solution that stays updated with the latest technology is the optimal option for managing a bulk number of devices.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Security Threats in 2020<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/07\/FileVault-keeps-your-data-secure.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/07\/FileVault-keeps-your-data-secure.jpg\" alt=\"Mac security\" width=\"682\" height=\"425\" \/><\/a><\/center><center><em>Endpoint security for Mac<\/em><\/center><span data-contrast=\"none\"><strong><br \/>\n1. Phishing:<\/strong> Phishing and credential attacks never go out of fashion in the battle for security. For macOS users, phishing attacks have gone up by 30-40% last year. These attacks could be aim<\/span><span data-contrast=\"none\">ed<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">at<\/span><span data-contrast=\"none\">\u00a0steal<\/span><span data-contrast=\"none\">ing<\/span><span data-contrast=\"none\">\u00a0the Apple ID of the user or install<\/span><span data-contrast=\"none\">ing<\/span><span data-contrast=\"none\"> adware on the Mac. Using 2-Factor authentication for access to the accounts can give a measure of security against phishing.\u00a0<\/span><span data-contrast=\"none\">Watch out for:<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"none\">Emails apparently from Apple support claiming to have detected problems in your Mac or claiming that your Apple account is locked with a \u201cRestore\u201d link. Such emails are often used for fooling the user into giving their Apple credentials.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Bank links in an email. Online bank accounts should be accessed only by manually typing in the URL or your own bookmarks.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Unauthorized dmg or\u00a0<\/span><span data-contrast=\"none\">pkg<\/span><span data-contrast=\"none\">\u00a0files. The apps should be installed either from the Mac App Store or a trusted developer. If the Mac is enrolled with\u00a0<\/span><span data-contrast=\"none\">Hexnode<\/span><span data-contrast=\"none\">, the admin can restrict the user to the App Store and remotely install the required applications for higher security<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\"><strong>2. Ransomware:<\/strong> While a Windows user has been well aware of the threat ransomware poses, Mac users have enjoyed a relatively calmer experience. However, with the advanced ransomware like <\/span><span data-contrast=\"none\">ThiefQuest<\/span><span data-contrast=\"none\">\u00a0surfacing especially for Macs, the admins can no longer be complacent towards the security threat. With\u00a0<\/span><span data-contrast=\"none\">Hexnode<\/span><span data-contrast=\"none\">, preventive measures such as setting up a VPN, configuring Firewall and blacklisting dangerous websites can be taken with ease.<\/span><\/p>\n<p><span data-contrast=\"none\"><strong>3. Insider Attacks:<\/strong> With all the corporate data migrating to <\/span><span data-contrast=\"none\">the\u00a0<\/span><span data-contrast=\"none\">cloud, conducting a security attack would not be easy. In such a case, it is possible that the attackers seek to get insider information by providing high compensation. To prevent insider attacks to an extent, the best method is to provide the minimum access possible. The user should have access only to those accounts that are essential for getting the work done. For instance, with\u00a0<\/span><span data-contrast=\"none\">Hexnode<\/span><span data-contrast=\"none\">, you can create user groups according to departments and assign different policies and configurations to each user group as required.<\/span><\/p>\n<p><span data-contrast=\"none\"><strong>4. Software attacks:<\/strong> No software is perfect. There is always the possibility of discovering a new security weakness in the existing version. The software and OS updates usually <\/span><span data-contrast=\"none\">patch<\/span><span data-contrast=\"none\">\u00a0the weak links in the security. The user may often skip the updates, which would leave the system vulnerable to attacks. Hence, it is recommended to enforce<\/span><span data-contrast=\"none\">\u00a0the<\/span><span data-contrast=\"none\">\u00a0OS updates for<\/span><span data-contrast=\"none\">\u00a0enterprise<\/span><span data-contrast=\"none\">\u00a0macOS devices<\/span><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Using an MDM for Endpoint Security<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">A <a href=\"https:\/\/www.hexnode.com\/blogs\/mobile-device-management-mdm\/?utm_source=hexnode_blog_endpoint_security_for_mac&#038;utm_medium=referral&#038;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener noreferrer\">Mobile Device Management solution<\/a> is a simple and excellent tool for increasing<\/span><span data-contrast=\"none\">\u00a0the<\/span><span data-contrast=\"none\">\u00a0endpoint security of the macOS devices.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><strong>FileVault Encryption<\/strong><\/h3>\n<p><a href=\"https:\/\/support.apple.com\/en-in\/HT204837\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">FileVault<\/span><\/a><span data-contrast=\"none\">\u00a0is Apple\u2019s full-disk encryption program. The disk content is\u00a0encrypted\u00a0and the users have to provide a passcode on booting the device to access the data and files. It highly increases device security as it actively prevents unauthorized users from accessing sensitive corporate data.\u00a0<\/span><span data-contrast=\"none\">Hexnode<\/span><span data-contrast=\"none\">\u00a0provides you with three methods for encrypting your macOS computers:<\/span><br \/>\n<span data-contrast=\"auto\"><strong>1. Personal Recovery Key:\u00a0<\/strong>These are the unique alphanumeric keys that are automatically generated at the time of encryption. The user\u00a0has to\u00a0note the key for future decryption of the encrypted disk.<\/span><br \/>\n<span data-contrast=\"auto\"><strong>2. Institutional Recovery Key:\u00a0<\/strong>These are used by institutions or organizations so that a common key is used to decrypt all their devices.<\/span><br \/>\n<span data-contrast=\"auto\"><strong>3. Institutional and Personal Recovery Key:\u00a0<\/strong>As the name suggests, both institutional and personal recovery keys are generated for the user. This is the most recommended method for device encryption. A major advantage is that even if the personal recovery key is lost, you would be able to decrypt the device using the institutional recovery key.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"auto\">Smart Card Authentication<\/span><\/h3>\n<p><span data-contrast=\"auto\">For devices running macOS 10.12.4 or higher,\u00a0<\/span><span data-contrast=\"auto\">the IT admins can remotely configure smart card authentication settings with\u00a0<\/span><span data-contrast=\"auto\">Hexnode<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-contrast=\"auto\">Authentication via smart cards improves the device security by leaps and bounds than a simple device password.\u00a0<\/span><span data-contrast=\"auto\">Hexnode<\/span><span data-contrast=\"auto\">\u00a0allows you to<\/span><span data-contrast=\"auto\">\u00a0enable user login via smart cards, enforce users to pair with a single smart card, verify the authenticity of the certificate, and much more.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">Managed software and OS updates<\/span><\/h3>\n<p><span data-contrast=\"none\">Enforcing OS updates for the business Macs is an effortless task with an MDM like <\/span><span data-contrast=\"none\">Hexnode<\/span><span data-contrast=\"none\">. The OS updates can be downloaded and scheduled to install at a later time or be installed directly after downloading.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">Network security<\/span><\/h3>\n<p><span data-contrast=\"none\">Using an MDM to set up the enterprise Wi-Fi would allow the users to connect without prompting for the password. A major benefit of setting up the Wi-Fi via MDM is the additional layer of security for the enterprise network achieved by preventing the knowledge of the network password for the user.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">Web Content Filtering<\/span><\/h3>\n<p><span data-contrast=\"none\">Majority of the security attacks are successful only because of irresponsible surfing of the internet at the endpoints. Using web content filtering, the admin can filter any websites or domains that pose a threat to<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">endpoint security. All the admin needs to do is log<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">in to the\u00a0<\/span><span data-contrast=\"none\">Hexnode<\/span><span data-contrast=\"none\">\u00a0Web portal and blacklist\/whitelist the Web URLs as required while configuring the policy assigned to the\u00a0<\/span><span data-contrast=\"none\">M<\/span><span data-contrast=\"none\">ac devices<\/span><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><center>    \t\t<!-- button style scb20be917a3efc78059cf9961ee4e54284 -->\r\n    \t\t<style>\r\n    \t\t\t.scb20be917a3efc78059cf9961ee4e54284, a.scb20be917a3efc78059cf9961ee4e54284{\r\n    \t\t\t\tcolor: #fff;\r\n    \t\t\t\tbackground-color: #00868B;\r\n    \t\t\t}\r\n    \t\t\t.scb20be917a3efc78059cf9961ee4e54284:hover, a.scb20be917a3efc78059cf9961ee4e54284:hover{\r\n    \t\t\t\t    \t\t\t\tbackground-color: #32b8bd;\r\n    \t\t\t}\r\n    \t\t<\/style>\r\n    \t\t<a href=\"https:\/\/www.hexnode.com\/uem\/platform\/macos-device-management\/?utm_source=hexnode_blog_endpoint_security_for_mac&utm_medium=referral&utm_campaign=button\" class=\"ht-shortcodes-button scb20be917a3efc78059cf9961ee4e54284  hn-cta__blogs--inline-button \" id=\"\" style=\"\" >\r\n    \t\tComplete solution for Mac Endpoint Security<\/a>\r\n    \t\t<\/center><\/p>\n<h2><b><span data-contrast=\"none\"><br \/>\nWhat does 2020 bring or Mac security?<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">The <a href=\"https:\/\/www.hexnode.com\/blogs\/apple-wwdc-2020-whats-new-with-apple-device-management\/?utm_source=hexnode_blog_endpoint_security_for_mac&#038;utm_medium=referral&#038;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener noreferrer\">Apple WWDC event<\/a> this year brought with it many wonderful features that would increase the endpoint security for Mac devices. We have discussed a few here:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">Lights Out Management for Mac Pro<\/span><\/h3>\n<p><center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/06\/Lights-Out-Management-for-Macbook-Pro.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/06\/Lights-Out-Management-for-Macbook-Pro.jpg\" alt=\"Lights out management\" width=\"682\" height=\"425\" \/><\/a><\/center><center><em>How does Lights Out management work?<\/em><\/center>&nbsp;<\/p>\n<p><span data-contrast=\"none\">The admins can remotely\u00a0<\/span><span data-contrast=\"none\">startup<\/span><span data-contrast=\"none\">, reboot, or shut<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">down one or more Macs even if they are unresponsive. The task is accomplished by sending a command from the MDM server to the MDM-enrolled controller on the Mac network. Lights Out Management requires macOS Big Sur, the\u00a0<\/span><span data-contrast=\"none\">Macbook<\/span><span data-contrast=\"none\"> Pros to be on the same subnet, and the Lights Out Management Payload to be installed. The remote control of the macOS devices given to the admins by LOM helps to secure the devices<\/span><\/p>\n<h3><span data-contrast=\"none\">Supervision for User Approved MDM<\/span><\/h3>\n<p><span data-contrast=\"none\">Earlier, only the macOS devices enrolled using\u00a0<\/span><span data-contrast=\"none\">the\u00a0<\/span><span data-contrast=\"none\">Apple Business Manager account could be supervised. The admins can now query, list, and delete local users, control Activation Lock Bypass, install supervised restrictions profile using MDM, or even schedule software updates in even user-enrolled Macs.\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">Bootstrap Tokens<\/span><\/h3>\n<p><span data-contrast=\"none\">Bootstrap tokens are encryption keys provided by the MDM server used to create admin accounts in the macOS devices without using a password for authentication. Instead of using complicated workflows for creating the admin account and user accounts, the bootstrap token enables users to get a secure token and boot a Mac that uses\u00a0<\/span><span data-contrast=\"none\">FileVault<\/span><span data-contrast=\"none\">. This is a coveted feature for network accounts. The admins can take advantage of authorized software updates and kernel extensions once this is implemented. Bootstrap tokens are supported on all the latest Macs with Apple T2 Security Chip.<\/span><\/p>\n<h3><span data-contrast=\"none\">Preventing accidental installations of downloaded profiles<\/span><\/h3>\n<p><span data-contrast=\"none\">For protection against\u00a0<\/span><span data-contrast=\"none\">the\u00a0<\/span><span data-contrast=\"none\">accidental installation of potentially harmful profiles, the downloaded profiles have to be manually installed by the user. To install the downloaded profile, the user has to go to the device System Preferences &gt; Profiles &gt; Downloaded Profiles and install the profile using the user password after previewing it.<\/span><\/p>\n<h3><span data-contrast=\"none\">Preventing silent profile installs from the command line<\/span><\/h3>\n<p><span data-contrast=\"none\">For enhanced security, complete silent installation of profile using the terminal would no longer be supported from macOS Big Sur. The profiles to be installed using the terminal would be treated as a downloaded profile. The user would have to go manually to the System Preferences and install the profile just like with a downloaded profile.<\/span><\/p>\n<h3><span data-contrast=\"none\">Format change for Serial Numbers<\/span><\/h3>\n<p><span data-contrast=\"none\">Serial numbers of the Mac devices serve not only as unique identifiers but also for automated device\u00a0<\/span><span data-contrast=\"none\">enrollment<\/span><span data-contrast=\"none\">. The existing 12-digit serial numbers contain bits of identifiable information such as where and when the device\u00a0<\/span><span data-contrast=\"none\">i<\/span><span data-contrast=\"none\">s built. To prevent malicious use of identifiable data, Apple will now use completely random 10-character serial numbers.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The year 2020 has been a golden year for Mac endpoint security. With the realization that Mac is not immune to security threats, measures have been taken to keep\u00a0<\/span><span data-contrast=\"none\">Mac\u00a0<\/span><span data-contrast=\"none\">devices still the best option when it comes to endpoint security. For\u00a0<\/span><span data-contrast=\"none\">business\u00a0<\/span><span data-contrast=\"none\">and\u00a0<\/span><span data-contrast=\"none\">individual\u00a0<\/span><span data-contrast=\"none\">users alike, Mac endpoint security was somewhat of a blind spot due to either lack of knowledge or the lack of proper tools. With <a href=\"https:\/\/www.hexnode.com\/blogs\/a-beginners-guide-to-mac-management\/?utm_source=hexnode_blog_endpoint_security_for_mac&#038;utm_medium=referral&#038;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener noreferrer\">Macs<\/a> steadily making its mark in the\u00a0<\/span><span data-contrast=\"none\">business<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">world, it is now time to focus on strengthening the endpoint security using an MDM solution that keeps evolving with updated features.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The concern for endpoint security for Mac devices\u00a0has\u00a0often taken a backseat compared to Windows corporate&#8230;<\/p>\n","protected":false},"author":24,"featured_media":6109,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2021],"tags":[5030],"class_list":["post-6094","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practices","tag-endpoint-security","tab_group-how-tos"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Endpoint security for Mac: Trends in 2020<\/title>\n<meta name=\"description\" content=\"Endpoint security for Mac used to be a milder concern as compared to Windows. With that no longer the case, check out the latest trends in 2020.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Endpoint security for Mac: Trends in 2020\" \/>\n<meta property=\"og:description\" content=\"Endpoint security for Mac used to be a milder concern as compared to Windows. With that no longer the case, check out the latest trends in 2020.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/\" \/>\n<meta property=\"og:site_name\" content=\"Hexnode Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-25T13:09:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-28T06:56:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/08\/Endpoint-security-for-Mac-Trends-in-2020.jpg?format=webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1340\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Emily Brown\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emily Brown\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/\",\"name\":\"Endpoint security for Mac: Trends in 2020\",\"isPartOf\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/08\/Endpoint-security-for-Mac-Trends-in-2020.jpg?format=webp\",\"datePublished\":\"2020-08-25T13:09:39+00:00\",\"dateModified\":\"2022-09-28T06:56:11+00:00\",\"author\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/315e8095e4e7138b7c2ac368b6a41c1d\"},\"description\":\"Endpoint security for Mac used to be a milder concern as compared to Windows. With that no longer the case, check out the latest trends in 2020.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/#primaryimage\",\"url\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/08\/Endpoint-security-for-Mac-Trends-in-2020.jpg?format=webp\",\"contentUrl\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/08\/Endpoint-security-for-Mac-Trends-in-2020.jpg?format=webp\",\"width\":1340,\"height\":720,\"caption\":\"Endpoint security for Mac Trends in 2020\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hexnode.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Endpoint security for Mac: Trends in 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#website\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/\",\"name\":\"Hexnode Blogs\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hexnode.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/315e8095e4e7138b7c2ac368b6a41c1d\",\"name\":\"Emily Brown\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d2eef116ae82476e6a416482dedf2276ed8be907f771b16c0858e020d524e507?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d2eef116ae82476e6a416482dedf2276ed8be907f771b16c0858e020d524e507?s=96&d=mm&r=g\",\"caption\":\"Emily Brown\"},\"description\":\"Reading is therapy and writing is healing...sincerely, a cool nerd.\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/author\/anaswara\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Endpoint security for Mac: Trends in 2020","description":"Endpoint security for Mac used to be a milder concern as compared to Windows. With that no longer the case, check out the latest trends in 2020.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/","og_locale":"en_US","og_type":"article","og_title":"Endpoint security for Mac: Trends in 2020","og_description":"Endpoint security for Mac used to be a milder concern as compared to Windows. With that no longer the case, check out the latest trends in 2020.","og_url":"https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/","og_site_name":"Hexnode Blogs","article_published_time":"2020-08-25T13:09:39+00:00","article_modified_time":"2022-09-28T06:56:11+00:00","og_image":[{"width":1340,"height":720,"url":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/08\/Endpoint-security-for-Mac-Trends-in-2020.jpg?format=webp","type":"image\/jpeg"}],"author":"Emily Brown","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Emily Brown","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/","url":"https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/","name":"Endpoint security for Mac: Trends in 2020","isPartOf":{"@id":"https:\/\/www.hexnode.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/#primaryimage"},"image":{"@id":"https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/08\/Endpoint-security-for-Mac-Trends-in-2020.jpg?format=webp","datePublished":"2020-08-25T13:09:39+00:00","dateModified":"2022-09-28T06:56:11+00:00","author":{"@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/315e8095e4e7138b7c2ac368b6a41c1d"},"description":"Endpoint security for Mac used to be a milder concern as compared to Windows. With that no longer the case, check out the latest trends in 2020.","breadcrumb":{"@id":"https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/#primaryimage","url":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/08\/Endpoint-security-for-Mac-Trends-in-2020.jpg?format=webp","contentUrl":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/08\/Endpoint-security-for-Mac-Trends-in-2020.jpg?format=webp","width":1340,"height":720,"caption":"Endpoint security for Mac Trends in 2020"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hexnode.com\/blogs\/endpoint-security-for-mac-trends-in-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hexnode.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Endpoint security for Mac: Trends in 2020"}]},{"@type":"WebSite","@id":"https:\/\/www.hexnode.com\/blogs\/#website","url":"https:\/\/www.hexnode.com\/blogs\/","name":"Hexnode Blogs","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hexnode.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/315e8095e4e7138b7c2ac368b6a41c1d","name":"Emily Brown","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d2eef116ae82476e6a416482dedf2276ed8be907f771b16c0858e020d524e507?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d2eef116ae82476e6a416482dedf2276ed8be907f771b16c0858e020d524e507?s=96&d=mm&r=g","caption":"Emily Brown"},"description":"Reading is therapy and writing is healing...sincerely, a cool nerd.","url":"https:\/\/www.hexnode.com\/blogs\/author\/anaswara\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/6094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/comments?post=6094"}],"version-history":[{"count":12,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/6094\/revisions"}],"predecessor-version":[{"id":22000,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/6094\/revisions\/22000"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/media\/6109"}],"wp:attachment":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/media?parent=6094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/categories?post=6094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/tags?post=6094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}