094 90 48200    Get SUPPORT

Aniar IT Services Blog

Are Macs Inherently More Secure than PCs?

Are Macs Inherently More Secure than PCs?

It has long been assumed that computer viruses are a Windows operating system exclusive, that Macs are immune from these issues. Let’s examine the validity of these assumptions, and how much you need to be invested in your technology’s protections.

Spoiler Alert: Macs Do, in Fact, Get Malware

Not to be juvenile about it, but duh. A computer produced by Apple can just as easily be infected by malware and ransomware, just as they can also experience any of the other problems that a PC user would. Hardware failure, slowing with age, crashes, data loss—these and so many other issues can be seen in a Mac.

So, where do we get the widespread opinion that Macs are somehow immune to the issues that Windows devices suffer from?

In short, advertising. Over the years, Apple has had some brilliant advertising campaigns behind it, from the classic “1984” ad that ran during Super Bowl XVIII to the brief clip of John Malkovich talking to Siri. One particular campaign, however, helped to really push the idea that Macs aren’t susceptible to computer viruses.

The “Hello, I’m a Mac” campaign starred John Hodgman as the beleaguered PC, constantly coming up short when compared to Justin Long’s Mac in a total of 66 spots. One of the most famous of these bits outlined how Macs didn’t have to worry about viruses—amongst many, many others over the four years that these ads ran.

In all fairness, these ads were truthful enough. Massive amounts of new viruses are created to attack the Windows system each year, many of them leaving Macs unimpacted. While in fairness, Macs do get viruses, there are far more variants out there that target PCs.

The question is, why?

There are Far More PCs Than Macs, for One

Back in 2018, there was only one Mac for every ten active PCs online. Therefore, if about 90 percent of computers run on Windows, it only makes sense that there would be more viruses focused on Windows.

PCs are the predominant choice for businesses and industries, schools and universities, and home users alike.

To be fair, there isn’t really anything inherently wrong with Macs. Apple’s laptops and desktops are very capable devices. The difference comes from third-party developers. Many business-oriented core applications just don’t have Mac versions, and Apple doesn’t have the low-tier hardware options that are available with the Windows platform. So, when your billing department and your video department have very different needs, there isn’t a reason for you to spend the amount that a high-end Mac costs when a mid-range PC would do the job.

At the end of the day, a Mac and a PC at the same price tier are going to be effectively the same. The big difference is your preference and what your business works best with. Of course, we also have to say that Macs can have some difficulty integrating with a network designed for the PC and the software that most businesses prefer to use.

Mac Users Aren’t Off the Hook

While the fewer number of viruses targeting them has made it seem as though a Mac is the more secure choice of computer, the environment is changing. Malwarebytes recently reported that Mac malware is outpacing PC malware for the first time. The report also states that, between 2018 and 2019, threats to Macs increased by 400 percent.

Of course, it should also go without saying that the type of computer one uses shouldn’t impact that person’s security awareness and hygiene. Macs and PCs alike need to have antivirus and other protections installed, secured by strong passwords by users who understand that risk has no brand loyalty.

At Aniar IT Services, we are very aware of the importance of your business’ security and can assist you in protecting your endpoints and educating your users. To learn more about what we can do, reach out to us by calling 094 90 48200.

Understanding the Benefits of Data Automation
Tip of the Week: Reviewing Some Remote Work Best P...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, January 16 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.aniar.ie/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Productivity Best Practices Business Computing Cloud Email Efficiency Privacy Network Security User Tips Google Workplace Tips Internet Hosted Solutions IT Support Data Software Innovation Microsoft Communication Mobile Device Hackers Collaboration Users Hardware VoIP Small Business Smartphones Business Data Backup IT Services Managed IT Services Phishing Data Recovery Cybersecurity Android Computer Tech Term Smartphone Network Communications Windows 10 Cloud Computing Mobile Devices Gadgets Managed Service Malware Backup Windows Outsourced IT Business Continuity Browser Miscellaneous Internet of Things Saving Money Artificial Intelligence BDR Quick Tips Information Disaster Recovery Business Management Facebook Upgrade Spam Server Passwords Holiday Save Money Office 365 Social Media Chrome Covid-19 Microsoft Office BYOD Router Automation Wi-Fi How To Networking Apps Windows 7 Government Operating System Paperless Office Patch Management Applications Encryption Word Mobile Office Cybercrime Computers Data Security Blockchain Data Storage Remote Managed IT Data Protection HIPAA Data Breach Vulnerability Remote Work Connectivity Telephone System Human Resources Vendor Infrastructure Ransomware Remote Monitoring Settings Mobile Device Management Staff Virtualization Display Bandwidth Money History Two-factor Authentication Scam Business Intelligence Update Augmented Reality Processor Spam Blocking Vendor Management Botnet Identity Theft Virtual Assistant Bring Your Own Device Business Technology Hard Drive Managed IT services IT Management Office App Redundancy Voice over Internet Protocol Health Sports Education Managed Services Provider Telephone Systems Meetings Big Data Access Control Net Neutrality CES Website Servers Social Engineering Conferencing Google Drive Procurement Avoiding Downtime Fraud Audit WiFi Content Management Help Desk Keyboard Comparison Private Cloud IT Plan Employee/Employer Relationship Managed Services OneNote Wireless Machine Learning VPN Compliance Digital Signage Google Docs Cryptocurrency Password Unsupported Software Training Software as a Service Law Enforcement Telephony Hypervisor Computer Fan Smart Office Manufacturing Computing HaaS Data loss Safe Mode Security Cameras Password Manager Nanotechnology Sales Software Tips Remote Worker Database USB Remote Workers Windows Server 2008 Shortcuts Wireless Charging Inventory Copiers Criminal Twitter Peripheral HBO 5G Microchip Investment Printing FinTech Save Time Going Green Telecommuting FENG Document Management Camera Digital Signature Virtual Reality Professional Services Cortana Alert Smartwatch Business Mangement Smart Tech SharePoint Hacker Wiring Electronic Medical Records Wire Managed IT Service Computer Care The Internet of Things Enterprise Content Management Mobility Google Apps Development Addiction Project Management Quick Tip Outlook Search Engine Online Shopping ROI Personal Skype Apple Proactive IT Saving Time Travel Printers Credit Cards PDF Cabling Fiber Optics Gmail Tools Work/Life Balance Solid State Drive End of Support Firewall Data Management Password Management Social Workers Messaging MSP Bitcoin Regulations Frequently Asked Questions Recovery Downtime Bing Evernote Cleaning GDPR Digitize Start Menu Windows 10s Devices Supply Chain Management Entertainment Warranty Cables Trend Micro Sync Multi-Factor Security Screen Mirroring Employee Recycling Millennials Physical Security Unified Threat Management OLED Using Data Employer-Employee Relationship NIST Authentication SMS File Sharing ISP Cache Batteries PCI DSS Excel Root Cause Analysis HVAC Practices Remote Computing IT Assessment RMM eWaste Thought Leadership Printer Amazon Default App Shopping Policy Cast AI Value Workforce Mobile Computing Biometric Security Information Technology Flash Virtual Machine Employees Cryptomining Wireless Internet Virtual Private Network Tip of the week Charger Hosted Computing Windows Server 2008 R2 OneDrive Specifications Public Cloud Legal YouTube Mouse Amazon Web Services Accountants IT Infrastructure Social Network Trending Procedure Google Search Lithium-ion battery CrashOverride Wireless Technology Company Culture Tech Support Safety IBM Emergency Marketing Productivity Managed Service Provider Managing Stress Budget Competition Customer Relationship Management IP Address Hiring/Firing Personal Information Fun Customer Service Financial Domains Windows 10 Hard Drives Public Speaking Search Presentation Regulation