Blog Post

iOS Vulnerability

Feb 17, 2021
Barely a week goes by without yet another vulnerability being found in one type of device or another. This week’s ‘winner’ is Apple’s iOS family which powers iPhones, iPads, Apple TVs, and Apple Watches, with three separate vulnerabilities being found. While only limited technical details of the three are available, they are all being actively used to break into systems showing yet again the need to keep systems protected and secure against threats. 

As updates have been released to ‘patch’ the issue, it’s important to review your devices to make sure they’re up to date with the latest versions (see here for more details: https://www.cert.govt.nz/it-specialists/advisories/vulnerability-in-apple-ios-reportedly-being-actively-exploited/). 

But how should an organisation respond in general to these types of threats? The first step is acknowledging that you can’t be 100% protected, and instead that you need to have systems in place that can tolerate a certain amount of risk or failure. For instance, if a device is attacked, or a user account is breached, have you put yourself in a place where you can limit the impact and recover from an incident?  

Alongside this first strategy, you also need to consider how you can limit breaches in the first place. Due to the complex nature of IT and the consistent development and release cycles that are in place it’s almost like living in a house under an acid rain cloud – while you’re always going to get holes in the roof, you still want there to be as few holes as possible. For that reason we strongly recommend a managed device approach which will allow you to keep your devices up to date, or at least know when they’re out of date. 

If you’d like to know more about how you can better manage all of the devices across your organisation then get in touch as we’re always here to help. 
Share by: