EVERYONE NEEDS SECURITY
(EVEN APPLE DEVICES)
Because online threats exist, it's in everyone's best interest to minimize risk — with a security plan.
DO YOU HAVE AN INFORMATION SECURITY TEAM?
No worries, we have a small business security program
built for you. Contact us to get started.
At Forget Computers, we work with many large organizations who do an excellent job of reducing their risk of security attacks. We also work with many small businesses who need to do better. Small businesses don't have the benefit of working with an information security team, and nearly all security protection programs don't take into account the reduced needs and capabilities of small businesses.
Knowing how important security is to all of us, Forget Computers set out to bridge the gap between Enterprise-grade security programs and the needs of small businesses. In that effort, we have selected Wimzkl as our security partner to provide a suite of security solutions focused on the needs of small businesses using Apple technology.
Special Benefits for Forget Computers Clients
Forget Computers and Wimzkl work closely on this security solution, offering our clients receive special benefits that save time and money.
- We know our client's infrastructure. This makes it easier than a typical small business for us to hand-off accurate technical information to Wimzkl.
- We use Enterprise-grade Security tools to manage Apple devices. This makes it easier for us to implement the results of Wimzkl's Cyber Resilience Playbook.
Great! Our automated tools can enhance your endpoint device management policies. Contact us to get started.
At Forget Computers we deliver automated activation, enforcement and auditing of Security & Privacy features on Apple devices. If you're concerned about these subjects in your organization, please contact us for assistance.
Does your organization provide these basic Security & Privacy features on macOS and iOS?
- Automated patching of applications and macOS.
- AntiVirus installation and definition updates.
- Malware detection and removal.
- OS X Firewall activation.
- Password required after sleep or screen saver activation.
- Password required at Login (Automatic login, disabled).
- Custom lock message.
- FileVault Encryption turned on … with decryption key stored securely!
- Rootkit Hunter deployment.
- Alerts to Admin account changes.
- Standardized Admin Account creation.
- Password requirements and scheduled changes.
- Software restrictions.
- Managed Gatekeeper policies.
- Certificates installations.
- Alerts to SSH attempts.
Need to secure even more?
Check out our Robot Cloud Security Standard powered by Jamf Pro. See also Jamf's Security Control Objectives Checklist for additional examples of what we can implement in your office.
LISTEN TO THE Podcast
Cybersecurity for Small Business
Click the SoundCloud link to join Ben Greiner and Chad Calease as they discuss cyber security and how small businesses are "low-hanging fruit" to cyber criminals looking to access more valuable targets. This scenario is why larger clients are demanding better awareness training and information security practices from their smaller, third-party service providers. This preparedness is becoming a differentiator as smaller agencies compete to retain current clients and win new ones
A FEW EXAMPLES
You have tens or hundreds of mobile Macs in the field and all users are running with Admin account credentials. Robot Cloud can automate the process of turning Admin Accounts into Standard Accounts to protect users and company data from security compromises.
You have tens or hundreds of mobile Macs in the field and no directory service. Robot Cloud can enforce password changes on a scheduled basis, meet your password requirements and update the Keychain so users, IT security and your customers are happy.
You have tens or hundreds of mobile Macs in the field and they are all walking around with unencrypted data. Robot Cloud can enable FileVault to encrypt the hard drive and store the decryption key in case you need it in the future.
ARTICLES & WEBSITES
Complete Security Audits for Mac based organizations.
Yearly Security Reviews (following a Security Audit).
Ongoing reviews of Master Service Agreements (MSAs) as they relate to security.
Bring Your Own Device (BYOD) security solutions.
Network Security, including penetration testing.
Security Policies to guide your office into the future!