094 90 48200    Get SUPPORT

Aniar IT Services Blog

Are Macs Inherently More Secure than PCs?

Are Macs Inherently More Secure than PCs?

It has long been assumed that computer viruses are a Windows operating system exclusive, that Macs are immune from these issues. Let’s examine the validity of these assumptions, and how much you need to be invested in your technology’s protections.

Spoiler Alert: Macs Do, in Fact, Get Malware

Not to be juvenile about it, but duh. A computer produced by Apple can just as easily be infected by malware and ransomware, just as they can also experience any of the other problems that a PC user would. Hardware failure, slowing with age, crashes, data loss—these and so many other issues can be seen in a Mac.

So, where do we get the widespread opinion that Macs are somehow immune to the issues that Windows devices suffer from?

In short, advertising. Over the years, Apple has had some brilliant advertising campaigns behind it, from the classic “1984” ad that ran during Super Bowl XVIII to the brief clip of John Malkovich talking to Siri. One particular campaign, however, helped to really push the idea that Macs aren’t susceptible to computer viruses.

The “Hello, I’m a Mac” campaign starred John Hodgman as the beleaguered PC, constantly coming up short when compared to Justin Long’s Mac in a total of 66 spots. One of the most famous of these bits outlined how Macs didn’t have to worry about viruses—amongst many, many others over the four years that these ads ran.

In all fairness, these ads were truthful enough. Massive amounts of new viruses are created to attack the Windows system each year, many of them leaving Macs unimpacted. While in fairness, Macs do get viruses, there are far more variants out there that target PCs.

The question is, why?

There are Far More PCs Than Macs, for One

Back in 2018, there was only one Mac for every ten active PCs online. Therefore, if about 90 percent of computers run on Windows, it only makes sense that there would be more viruses focused on Windows.

PCs are the predominant choice for businesses and industries, schools and universities, and home users alike.

To be fair, there isn’t really anything inherently wrong with Macs. Apple’s laptops and desktops are very capable devices. The difference comes from third-party developers. Many business-oriented core applications just don’t have Mac versions, and Apple doesn’t have the low-tier hardware options that are available with the Windows platform. So, when your billing department and your video department have very different needs, there isn’t a reason for you to spend the amount that a high-end Mac costs when a mid-range PC would do the job.

At the end of the day, a Mac and a PC at the same price tier are going to be effectively the same. The big difference is your preference and what your business works best with. Of course, we also have to say that Macs can have some difficulty integrating with a network designed for the PC and the software that most businesses prefer to use.

Mac Users Aren’t Off the Hook

While the fewer number of viruses targeting them has made it seem as though a Mac is the more secure choice of computer, the environment is changing. Malwarebytes recently reported that Mac malware is outpacing PC malware for the first time. The report also states that, between 2018 and 2019, threats to Macs increased by 400 percent.

Of course, it should also go without saying that the type of computer one uses shouldn’t impact that person’s security awareness and hygiene. Macs and PCs alike need to have antivirus and other protections installed, secured by strong passwords by users who understand that risk has no brand loyalty.

At Aniar IT Services, we are very aware of the importance of your business’ security and can assist you in protecting your endpoints and educating your users. To learn more about what we can do, reach out to us by calling 094 90 48200.

Understanding the Benefits of Data Automation
Tip of the Week: Reviewing Some Remote Work Best P...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, August 08 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.aniar.ie/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Productivity Best Practices Cloud Privacy Network Security Innovation User Tips Hosted Solutions Email Workplace Tips Efficiency Internet IT Support Data Microsoft Google Hardware Software Hackers Business Data Backup Communication Small Business Managed IT Services Data Recovery Cybersecurity Smartphones VoIP Computer Tech Term Cloud Computing Malware Communications Mobile Devices Collaboration IT Services Windows 10 Phishing Mobile Device Backup Android Gadgets Users Smartphone Outsourced IT Network Business Continuity Artificial Intelligence Saving Money Browser Miscellaneous Windows Information Disaster Recovery Business Management Managed Service Facebook Internet of Things BDR Upgrade Server Spam Office 365 Chrome How To Quick Tips Social Media Automation Passwords Router Applications Data Storage Mobile Office Windows 7 Blockchain BYOD Paperless Office Holiday Word Apps Cybercrime Microsoft Office Computers Data Security Display Managed IT Encryption Human Resources Infrastructure History Networking Staff Mobile Device Management Bandwidth Data Breach Vulnerability Government Wi-Fi Operating System Remote Work Two-factor Authentication Data Protection Patch Management Save Money HIPAA Telephone System Ransomware Remote Monitoring Connectivity Settings Money Virtualization Employee/Employer Relationship Website CES Unsupported Software Cryptocurrency Telephony Training Fraud Software as a Service Scam Business Intelligence Update Content Management Keyboard Spam Blocking Botnet VPN Processor Password Managed IT services Bring Your Own Device Virtual Assistant Vendor Management IT Management Business Technology Redundancy Voice over Internet Protocol App Telephone Systems Hard Drive Health Social Engineering Augmented Reality Meetings Office Google Drive Avoiding Downtime Education Managed Services Provider Identity Theft Servers Comparison Audit Procurement Private Cloud IT Plan Vendor OneNote Help Desk Google Docs Compliance Digital Signage Law Enforcement Big Data Sports Machine Learning Access Control Managed Services Public Cloud Mobile Computing Default App Shopping Evernote Cleaning Trending Recycling Devices Cryptomining Biometric Security Information Technology HaaS Virtual Machine AI Google Search Virtual Private Network Computer Fan YouTube Mouse Windows Server 2008 Windows Server 2008 R2 OneDrive Authentication Data loss Covid-19 Cache Software Tips Policy Smart Office HBO IT Infrastructure Social Network Practices Safe Mode Security Cameras Hypervisor Remote Wireless eWaste Thought Leadership Remote Worker Database Telecommuting Manufacturing Computing Amazon Shortcuts Alert Save Time Remote Workers FENG Microchip Computer Care Copiers Cortana Skype Peripheral Wireless Internet Procedure Document Management Camera Outlook Investment Printing Charger Hosted Computing Smartwatch Going Green Legal Wiring Travel Virtual Reality Professional Services Amazon Web Services Accountants Enterprise Content Management Mobility Proactive IT Tools Work/Life Balance Managed IT Service Search Engine Development Password Manager Nanotechnology Start Menu Project Management Quick Tip USB Solid State Drive FinTech Printers Frequently Asked Questions Recovery ROI Personal Wireless Charging Inventory Saving Time 5G Criminal Twitter Windows 10s Firewall Cabling Fiber Optics Downtime Password Management Social Sync Multi-Factor Security Screen Mirroring MSP Net Neutrality Millennials Digital Signature Bing WiFi Messaging Business Mangement Smart Tech Employee Bitcoin The Internet of Things Regulations Electronic Medical Records Wire Physical Security Apple Entertainment Warranty Excel GDPR Digitize Hacker Google Apps Employer-Employee Relationship Supply Chain Management Addiction Unified Threat Management Cables Trend Micro Online Shopping Root Cause Analysis NIST Gmail Cast File Sharing ISP Value Workforce OLED Using Data Credit Cards PDF HVAC Flash SMS Specifications Batteries PCI DSS Data Management Printer Tip of the week Remote Computing IT Assessment Workers Hard Drives Customer Service Search Regulation Domains CrashOverride Emergency Windows 10 Company Culture Public Speaking Presentation Managed Service Provider Managing Stress Lithium-ion battery Hiring/Firing Wireless Technology Tech Support IBM Fun Personal Information Safety Productivity Marketing Budget Customer Relationship Management Financial Competition IP Address