{"id":3686,"date":"2021-10-29T03:56:00","date_gmt":"2021-10-29T03:56:00","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=3686"},"modified":"2026-01-25T07:57:11","modified_gmt":"2026-01-25T07:57:11","slug":"its-time-to-take-macos-security-seriously","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/its-time-to-take-macos-security-seriously","title":{"rendered":"It&#8217;s Time to Take macOS Security Seriously"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">The Numbers Don\u2019t Quite Add Up<\/h2>\n\n\n\n<p>For a long time, Microsoft Windows has won the operating system popularity contest by a fairly wide margin.<\/p>\n\n\n\n<p>According to&nbsp;<a href=\"https:\/\/statcounter.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Statcounter<\/a>, Bill Gate\u2019s OS is comfortably the top dog with a current market share of almost&nbsp;<a href=\"https:\/\/gs.statcounter.com\/os-market-share\/desktop\/worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">75.4% worldwide as of October this year<\/a>.<\/p>\n\n\n\n<p>MacOS comes in as second favorite, with a share of just under 16%.<\/p>\n\n\n\n<p>You would think, looking at these percentages, that security solutions like&nbsp;<a href=\"\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\">ours<\/a>&nbsp;would be protecting the corresponding numbers of devices running each of these operating systems.<\/p>\n\n\n\n<p>But you\u2019d be wrong.<\/p>\n\n\n\n<p>The actual stats indicate a skewed number of Windows to macOS machines that are covered by Admin By Request\u2018s endpoint security software, meaning there are more unprotected macOS devices than there are Windows.<\/p>\n\n\n\n<p>So why are Apples struggling to get the protection they need?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The MacOS Malware Myth<\/h2>\n\n\n\n<p>It stems from the myth that Apple Macintosh devices \u201cdon\u2019t get viruses\u201d \u2013 which is exactly that: a myth.<\/p>\n\n\n\n<p>Apple Macs do get infected with malware, but this occurrence has historically occurred to a much lesser degree on macOS than on the Windows operating system.<\/p>\n\n\n\n<p>Here are some explanations behind Mac\u2019s reputation of being immune to malware:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The sheer number of Windows devices<\/strong><\/li>\n<\/ul>\n\n\n\n<p>We know the numbers: there are about four times the number of devices running Microsoft Windows worldwide than there are those running macOS.<\/p>\n\n\n\n<p>1. More numbers mean a larger target.&nbsp;It makes sense for attackers to go for the larger audience: Windows. A larger target audience means more damage can be done; within large companies are thousands of Windows end-user devices, meaning viruses have the potential to propagate further; more money can be made in the case of ransomware when larger, more profitable organizations are targeted.<\/p>\n\n\n\n<p>2. Familiarity with the target OS.&nbsp;Malware isn\u2019t one size fits all: it has to be designed to fit an operating system. Because the Windows platform is more commonly used worldwide, attackers are more likely to be familiar with the Windows operating system and therefore, more skilled in creating malware that is tailored specifically towards this OS.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Macs are perceived as being harder to crack<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Thanks to clever marketing strategies and\u2026 a little bit of truth.<\/p>\n\n\n\n<p>1. Apple has always highlighted built-in security as a key feature of the Mac operating system, which, in the early days, may have given some truth to the \u201cMacs don\u2019t get malware\u201d myth. However, with the rise of increasingly complex malware and targeted, hand-launched attacks, built-in OS security alone is not enough to keep up.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/MacSecurity.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>2. In classic Apple style, what users and applications can do on the macOS operating system is more restricted compared to the freedom and customization afforded on Windows. For that reason, attacks aimed at Mac devices usually have to&nbsp;<a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/enterprise-windows-threats-drop-as-mac-attacks-rise-report\" target=\"_blank\" rel=\"noreferrer noopener\">rely more heavily on social engineering<\/a>, making macOS a more difficult target \u2013 but still a target, nonetheless.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Can I Order a Big Mac and Files Please?<\/h2>\n\n\n\n<p>There is no denying that Mac attacks \u2013 once a rare thing \u2013 are becoming increasingly common, with high-profile attacks debunking the malwareless-Mac myth once and for all:<\/p>\n\n\n\n<p><strong>2016 \u2013 KeRanger Ransomware Trojan<\/strong><\/p>\n\n\n\n<p>2016 saw ransomware target macOS in the form of OSX.KeRanger, from an infected&nbsp;<a href=\"https:\/\/transmissionbt.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Transmission<\/a>&nbsp;(a BitTorrent client) installer.&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/keranger-the-first-apple-ransomware-discovered-in-hacked-installer-for-transmission\/\" target=\"_blank\" rel=\"noreferrer noopener\">BleepingComputer reported<\/a>&nbsp;on the infection: executed remotely three days after being installed on the user\u2019s computer, it would then encrypt files and demand payment of 1 bitcoin for decryption. The malicious installer was able to infect 7000 Mac devices, as it was signed with a legitimate Mac certificate, meaning it could bypass Apple&#8217;s built-in security \u2013 told you so!<\/p>\n\n\n\n<p><strong>2018 \/ 2019 \/ 2020 \u2013 Trojan-family Shlayer<\/strong><\/p>\n\n\n\n<p>Under the guise of the Adobe Flash Player installer \u2013 a tried and tested favorite \u2013 OSX.Shlayer was the biggest threat to macOS users from 2018 to 2019, and has made a return to the macOS scene in 2020. Researchers at&nbsp;<a href=\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/\" target=\"_blank\" rel=\"noreferrer noopener\">Intego did a breakdown<\/a>&nbsp;on the malware, which, once installed on a Mac device, begins downloading adware and PUPs (potentially unwanted programs) and promoting fake search engines to the user.<\/p>\n\n\n\n<p><strong>2020 \u2013 ThiefQuest File-Stealer<\/strong><\/p>\n\n\n\n<p>In July last year,&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/thiefquest-ransomware-is-a-file-stealing-mac-wiper-in-disguise\/\" target=\"_blank\" rel=\"noreferrer noopener\">BleepingComputer analyzed file-stealing and data-destroying malware<\/a>&nbsp;disguised as ransomware, ThiefQuest. Downloaded from mainstream torrent sites in the form of pirated apps, the packages of compressed installer files appear to be legitimate to the user but contain malicious software and launch scripts, along with legitimate installers. Like most ransomware, files are encrypted upon launch, with no way for victims to contact the attackers after paying the ransom, or for attackers to identify who has paid \u2013 prompting the belief that ThiefQuest is stealing data under the guise of ransomware.<\/p>\n\n\n\n<p><strong>2021 \u2013 XLoader<\/strong><\/p>\n\n\n\n<p>For the bargain price of $49 USD, you can now get yourself a Mac MaaS (\u201cMalware-as-a-Service\u201d) tool from the Dark Web, which, according to&nbsp;<a href=\"https:\/\/www.computerworld.com\/article\/3626431\/scary-malware-as-a-service-mac-attack-discovered.html\" target=\"_blank\" rel=\"noreferrer noopener\">Computer World<\/a>, can harvest user logins from browsers, collect screenshots, log key strokes, and download and deploy malware on the victim machine. Named XLoader, the Apple security threat is derived from the data-stealing trojan, Formbook \u2013 currently the&nbsp;<a href=\"https:\/\/any.run\/malware-trends\/\" target=\"_blank\" rel=\"noreferrer noopener\">sixth-most active malware family of all time<\/a>.<\/p>\n\n\n\n<p><strong>2021 \u2013 CVE-2021-30869 in macOS Catalina<\/strong><\/p>\n\n\n\n<p>In September this year, Erye Hernandez of Google Threat Analysis Group discovered an&nbsp;<a href=\"https:\/\/support.apple.com\/en-us\/HT212825\" target=\"_blank\" rel=\"noreferrer noopener\">exploitable vulnerability<\/a>&nbsp;on Mac\u2019s Catalina OS, allowing malicious applications to execute arbitrary code with kernel privileges and take full control of the system.<\/p>\n\n\n\n<p>Threats like ThiefQuest and XLoader are only going to surge as macOS gains more of a market share while the Windows share decreases; Check Point Software head of research, Yaniv Balmas, agrees: \u201cWhile there might be a gap between Windows and MacOS malware, the gap is slowly closing over time. The truth is that MacOS malware is becoming bigger and more dangerous.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Mac Attacks are On the Rise<\/h2>\n\n\n\n<p>Malwarebytes Labs confirmed this in their&nbsp;<a href=\"https:\/\/resources.malwarebytes.com\/files\/2020\/02\/2020_State-of-Malware-Report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">2020 State of Malware Report<\/a>: in 2019, for the first time, macOS threats outpaced Window:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/macThreats-01(2).png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/MacWindowsThreatGraph-01(1).png\" alt=\"\"\/><\/figure>\n\n\n\n<p><em>Figure 1: Graph taken from Malwarebytes Labs 2020 State of Malware Threats Report showing Detections per endpoint 2018-2019.<\/em><\/p>\n\n\n\n<p>This was an all-time high for Mac attacks, attributed to the following in the report:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The failure of Mac security systems to address the huge amount of Adware and PUPs to the same extent that they do malware; a significant problem, as Adware and PUPs made up the majority of the top 10 list of threats to macOS in 2019 in the Malwarebytes Report.<\/li>\n\n\n\n<li>The user interface. Apple Macs, along with other apple products such as the iPhone, iPad, Apple TV and Apple Watch, are known for their easy-to-use graphical user interface and minimalistic product design. For this reason, it is far more likely for the not-so-tech-savvy staff to work with Apple Macs in the workforce. Users with a lower level of technical skill could potentially appear much more attractive to attackers, who may perceive them as easy targets \u2013 particularly when we know Mac attacks rely heavily on social engineering to achieve infection.<\/li>\n<\/ul>\n\n\n\n<p>And although Mac attacks decreased considerably in 2021 (down 38%), that\u2019s no reason to get complacent; as we know, the trend in market shares shows macOS\u2019s increasing popularity over time, which is undoubtedly going to make it more and more of an appealing target to hackers in the future:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/StatCounter-os_combined-ww-monthly-200901-202109.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><em>Figure 2: Graph provided by StatCounter showing Desktop Operating System Market Shares Worldwide from 2009 \u2013 October 2021.<\/em><\/p>\n\n\n\n<p>The maths is simple: a bigger target = more data, damage, and potential financial gains.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Preventing Attacks on Macs: Control, Monitor, Audit<\/h2>\n\n\n\n<p>So, what can you do about it?<\/p>\n\n\n\n<p>An all-encompassing solution is to deploy Privileged Access Management (PAM) software on all of your Mac endpoints, to control, monitor, and audit what your Apple users are doing on their devices.<\/p>\n\n\n\n<p>Admin By Request is an endpoint PAM solution that covers the fundamentals:<\/p>\n\n\n\n<p><strong>1. Controls what users have access to.<\/strong><\/p>\n\n\n\n<p>The solution\u00a0<a href=\"\/en\/blogs\/revoke-no-big-deal-no-big-squeal\" target=\"_blank\" rel=\"noreferrer noopener\">revokes admin rights<\/a>\u00a0so that your end users only have the bare minimum privileges they need in order to do their job. When users do need to do a task that requires elevated privileges, Just-in-Time elevation (JIT) gives them the ability to self-initiate a temporary elevated session \u2013 with all file downloads scanned by over 30 anti-malware engines. Controlling user privileges and downloads makes it much harder for users to unknowingly install malware onto the OS\u00a0\u2013 even with the constantly evolving social engineering tactics.<\/p>\n\n\n\n<p><strong>2. Monitors requests for elevated privileges.<\/strong><\/p>\n\n\n\n<p>The biggest Mac attacks and exploits require privilege escalation to install malware and&nbsp;take control of the OS. With Admin By Request, requests for elevated access \u2013&nbsp;along with user details and a valid&nbsp;reason \u2013&nbsp;are sent in real time to the Admin By Request User Portal, keeping you in the loop of what your users are up to at all times, and why. Elevated privileges can\u2019t be obtained without a request, which in turn can be viewed, approved, or denied, with all data from approved requests logged in the Auditlog \u2013 more on this below.<\/p>\n\n\n\n<p><strong>3. Audits elevated activity.<\/strong><\/p>\n\n\n\n<p>All elevated session data is logged and displayed in the Admin By Request Auditlog, including details of installed or uninstalled software, and programs executed with&nbsp;elevated&nbsp;privileges. This means potential security breaches&nbsp;and attempts to deploy malware and&nbsp;infiltrate the wider network are much more likely to be detected early on and prevented.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Don&#8217;t Let your&nbsp;Apples Fall Too Far from the Tree<\/h2>\n\n\n\n<p>But the real apple-teaser here is that Admin By Request is a cross-platform PAM solution: it offers a version for macOS as well as Windows, with no AD sync required.<\/p>\n\n\n\n<p>Just to reiterate how sweet of a deal this is, here\u2019s a real-life example:<\/p>\n\n\n\n<p><em><strong>Scenario:<\/strong>&nbsp;You have an organization with 30,000 Windows devices and a grand total of 7 Apple Macs. You want comprehensive cyber security, and in fact, you\u2019re required to cover ALL endpoints in order to be compliant.<\/em><\/p>\n\n\n\n<p><em><strong>Solution:<\/strong>&nbsp;You can get all of your endpoints \u2013 Windows or macOS \u2013 fully covered and compliant using Admin By Request as a single, easy-to-deploy PAM solution.<\/em><\/p>\n\n\n\n<p>More on that&nbsp;<a href=\"https:\/\/www.adminbyrequest.com\/Blogs\/Admin-By-Request-makes-TeamViewer-A-Team-Do-er\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">In a Macshell:<\/h2>\n\n\n\n<p>So if you\u2019re really serious about taking macOS security seriously \u2013 or you simply have a few Apples in your organization that don\u2019t want to be left out \u2013 this is your solution to protect all your endpoints before Macs become even more of a target.<\/p>\n\n\n\n<p>Admin By Request offers a free plan for up to 25 endpoints to help you make the move towards a more secure and managed macOS environment \u2013 give it a go&nbsp;<a href=\"\/en\/freeplandownload\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>&nbsp;and get ahead of the next Mac attack.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Despite contrary belief, security is a big problem for the modern Mac operating system. Admin By Request\u2019s cross-platform solution can help you address this problem and get your Apples under control.<\/p>\n","protected":false},"author":2,"featured_media":7761,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[130,73,106,75,74,82,104,105,79,115,84],"ppma_author":[10],"class_list":["post-3686","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-antimalware","tag-apple","tag-features","tag-mac","tag-macos","tag-malware","tag-operating-system","tag-os","tag-ransomware","tag-security","tag-virus","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.6.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Despite contrary belief, security is a big problem for the modern Mac operating system. Admin By Request\u2019s cross-platform solution can help you address this problem and get your Apples under control.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"antimalware,apple,features,mac,macos,malware,operating system,os,ransomware,security,virus\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/its-time-to-take-macos-security-seriously\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.6.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"It\u2019s Time to Take macOS Security Seriously \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"Despite contrary belief, security is a big problem for the modern Mac operating system. Admin By Request\u2019s cross-platform solution can help you address this problem and get your Apples under control.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/its-time-to-take-macos-security-seriously\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2021-10-29T03:56:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-25T07:57:11+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"It\u2019s Time to Take macOS Security Seriously \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Despite contrary belief, security is a big problem for the modern Mac operating system. Admin By Request\u2019s cross-platform solution can help you address this problem and get your Apples under control.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/its-time-to-take-macos-security-seriously#blogposting\",\"name\":\"It\\u2019s Time to Take macOS Security Seriously \\u00bb Admin By Request\",\"headline\":\"It&#8217;s Time to Take macOS Security Seriously\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/9.png\",\"width\":1500,\"height\":996,\"caption\":\"Bottom of a Mac with Magic Keyboard.\"},\"datePublished\":\"2021-10-29T03:56:00+00:00\",\"dateModified\":\"2026-01-25T07:57:11+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/its-time-to-take-macos-security-seriously#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/its-time-to-take-macos-security-seriously#webpage\"},\"articleSection\":\"Blogs, Antimalware, Apple, Features, Mac, macOS, Malware, Operating System, OS, Ransomware, Security, Virus, Steve Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/its-time-to-take-macos-security-seriously#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/its-time-to-take-macos-security-seriously#listItem\",\"name\":\"It&#8217;s Time to Take macOS Security Seriously\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/its-time-to-take-macos-security-seriously#listItem\",\"position\":3,\"name\":\"It&#8217;s Time to Take macOS Security Seriously\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/its-time-to-take-macos-security-seriously\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/its-time-to-take-macos-security-seriously\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/its-time-to-take-macos-security-seriously#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/its-time-to-take-macos-security-seriously\",\"name\":\"It\\u2019s Time to Take macOS Security Seriously \\u00bb Admin By Request\",\"description\":\"Despite contrary belief, security is a big problem for the modern Mac operating system. Admin By Request\\u2019s cross-platform solution can help you address this problem and get your Apples under control.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/its-time-to-take-macos-security-seriously#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/9.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/its-time-to-take-macos-security-seriously\\\/#mainImage\",\"width\":1500,\"height\":996,\"caption\":\"Bottom of a Mac with Magic Keyboard.\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/its-time-to-take-macos-security-seriously#mainImage\"},\"datePublished\":\"2021-10-29T03:56:00+00:00\",\"dateModified\":\"2026-01-25T07:57:11+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>It\u2019s Time to Take macOS Security Seriously \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"It\u2019s Time to Take macOS Security Seriously \u00bb Admin By Request","description":"Despite contrary belief, security is a big problem for the modern Mac operating system. Admin By Request\u2019s cross-platform solution can help you address this problem and get your Apples under control.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/its-time-to-take-macos-security-seriously","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"antimalware,apple,features,mac,macos,malware,operating system,os,ransomware,security,virus","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/its-time-to-take-macos-security-seriously#blogposting","name":"It\u2019s Time to Take macOS Security Seriously \u00bb Admin By Request","headline":"It&#8217;s Time to Take macOS Security Seriously","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2021\/10\/9.png","width":1500,"height":996,"caption":"Bottom of a Mac with Magic Keyboard."},"datePublished":"2021-10-29T03:56:00+00:00","dateModified":"2026-01-25T07:57:11+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/its-time-to-take-macos-security-seriously#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/its-time-to-take-macos-security-seriously#webpage"},"articleSection":"Blogs, Antimalware, Apple, Features, Mac, macOS, Malware, Operating System, OS, Ransomware, Security, Virus, Steve Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/its-time-to-take-macos-security-seriously#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/its-time-to-take-macos-security-seriously#listItem","name":"It&#8217;s Time to Take macOS Security Seriously"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/its-time-to-take-macos-security-seriously#listItem","position":3,"name":"It&#8217;s Time to Take macOS Security Seriously","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/its-time-to-take-macos-security-seriously\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/its-time-to-take-macos-security-seriously\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/its-time-to-take-macos-security-seriously#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/its-time-to-take-macos-security-seriously","name":"It\u2019s Time to Take macOS Security Seriously \u00bb Admin By Request","description":"Despite contrary belief, security is a big problem for the modern Mac operating system. Admin By Request\u2019s cross-platform solution can help you address this problem and get your Apples under control.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/its-time-to-take-macos-security-seriously#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2021\/10\/9.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/its-time-to-take-macos-security-seriously\/#mainImage","width":1500,"height":996,"caption":"Bottom of a Mac with Magic Keyboard."},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/its-time-to-take-macos-security-seriously#mainImage"},"datePublished":"2021-10-29T03:56:00+00:00","dateModified":"2026-01-25T07:57:11+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"It\u2019s Time to Take macOS Security Seriously \u00bb Admin By Request","og:description":"Despite contrary belief, security is a big problem for the modern Mac operating system. Admin By Request\u2019s cross-platform solution can help you address this problem and get your Apples under control.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/its-time-to-take-macos-security-seriously","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2021-10-29T03:56:00+00:00","article:modified_time":"2026-01-25T07:57:11+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"It\u2019s Time to Take macOS Security Seriously \u00bb Admin By Request","twitter:description":"Despite contrary belief, security is a big problem for the modern Mac operating system. Admin By Request\u2019s cross-platform solution can help you address this problem and get your Apples under control.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"3686","title":"#post_title #separator_sa #site_title","description":"#post_excerpt","keywords":null,"keyphrases":null,"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":null,"og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":null,"robots_max_videopreview":null,"robots_max_imagepreview":"large","priority":null,"frequency":null,"local_seo":null,"seo_analyzer_scan_date":"2026-01-25 08:05:24","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":null,"created":"2023-05-22 21:57:47","updated":"2026-01-25 08:05:24"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tIt\u2019s Time to Take macOS Security Seriously\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"It&#8217;s Time to Take macOS Security Seriously","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/its-time-to-take-macos-security-seriously"}],"authors":[{"term_id":10,"user_id":0,"is_guest":1,"slug":"steve-dodson","display_name":"Steve Dodson","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/SteveHeadshotSquareABR.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/SteveHeadshotSquareABR.png"},"author_category":"","user_url":"","last_name":"Dodson","first_name":"Steve","job_title":"","description":"Steve provides research, analysis, insight and commentary on topical issues and events. He lives in New Zealand and has been working at FastTrack Software for 12 years as a cyber security analyst and technical writer."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=3686"}],"version-history":[{"count":2,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3686\/revisions"}],"predecessor-version":[{"id":11205,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3686\/revisions\/11205"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/7761"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=3686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=3686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=3686"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=3686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}