EVERYONE NEEDS SECURITY
(EVEN APPLE DEVICES)

Because online threats exist, it's in everyone's best interest to minimize risk — with a security plan.
 

 

DO YOU HAVE AN INFORMATION SECURITY TEAM?


NO

No worries, we have a small business security program
built for you. Contact us to get started.


SMALL BUSINESS
Apple Security

At Forget Computers, we work with many large organizations who do an excellent job of reducing their risk of security attacks. We also work with many small businesses who need to do better. Small businesses don't have the benefit of working with an information security team, and nearly all security protection programs don't take into account the reduced needs and capabilities of small businesses.

Knowing how important security is to all of us, Forget Computers set out to bridge the gap between Enterprise-grade security programs and the needs of small businesses. In that effort, we have selected Wimzkl as our security partner to provide a suite of security solutions focused on the needs of small businesses using Apple technology.

 
 

Special Benefits for Forget Computers Clients
Forget Computers and Wimzkl work closely on this security solution, offering our clients receive special benefits that save time and money.

  1. We know our client's infrastructure. This makes it easier than a typical small business for us to hand-off accurate technical information to Wimzkl.
  2. We use Enterprise-grade Security tools to manage Apple devices. This makes it easier for us to implement the results of Wimzkl's Resiliency Diagnostic.

YES

Great! Our automated tools can enhance your endpoint device management policies. Contact us to get started.


ENTERPRISE
Apple Security

At Forget Computers we deliver automated activation, enforcement and auditing of Security & Privacy features on Apple devices. If you're concerned about these subjects in your organization, please contact us for assistance.

Does your organization provide these basic Security & Privacy features on macOS and iOS?

  • Automated patching of applications and macOS.
  • AntiVirus installation and definition updates.
  • Malware detection and removal.
  • OS X Firewall activation.
  • Password required after sleep or screen saver activation. 
  • Password required at Login (Automatic login, disabled).
  • Custom lock message.
  • FileVault Encryption turned on … with decryption key stored securely!
  • Rootkit Hunter deployment.
  • Alerts to Admin account changes.
  • Standardized Admin Account creation.
  • Password requirements and scheduled changes.
  • Software restrictions.
  • Managed Gatekeeper policies.
  • Certificates installations.
  • Alerts to SSH attempts.

Need to secure even more?
Check out our Robot Cloud Security Standard powered by Jamf Pro. See also Jamf's Security Control Objectives Checklist for additional examples of what we can implement in your office.

Need to meet regulatory requirements?
HIPAA, SOX, PCI and FISMA are just a few areas where we can help your Apple devices — and your business — remain secure and compliant.


 
 

A FEW EXAMPLES

You have tens or hundreds of mobile Macs in the field and all users are running with Admin account credentials. Robot Cloud can automate the process of turning Admin Accounts into Standard Accounts to protect users and company data from security compromises.

You have tens or hundreds of mobile Macs in the field and no directory service. Robot Cloud can enforce password changes on a scheduled basis, meet your password requirements and update the Keychain so users, IT security and your customers are happy.

You have tens or hundreds of mobile Macs in the field and they are all walking around with unencrypted data. Robot Cloud can enable FileVault to encrypt the hard drive and store the decryption key in case you need it in the future.

SECURITY SERVICES

In addition to the automated security tools built-in to Robot Cloud, Forget Computers has partnered with Wimzkl to provide …

  • Complete Security Audits for Mac based organizations.

  • Yearly Security Reviews (following a Security Audit).

  • Ongoing reviews of Master Service Agreements (MSAs) as they relate to security.

  • Bring Your Own Device (BYOD) security solutions.

  • Network Security, including penetration testing.

  • Security Policies to guide your office into the future!