Publisher's Synopsis
Chapter 1: Security 101
- Introduction
- What is it?
- Why is it important?
- When is it necessary?
- Who is responsible for it?
Chapter 2: Risky Business
- Risk
- Assessments
- Matrix
- Tolerance/Appetite
Chapter 3: (Return of) the Mac
- macOS
- Hardware
- Software- Distribution
- Frameworks (Security, Privacy, etc.)
Chapter 4: A World of Hurt
- Threat types
- Attack types
- Internal attacks
- External attacks
Chapter 6: The Mind of an Attacker
- Think like them
- Act like them
- Understand them
- Protect against them
Chapter 7: Hardware Solutions
- Startup
- Full-Disk Encryption
- Cable Lock
- Sensor Covers
- Accessories
- Licensed Cables
Chapter 8: Software Solutions
- Passwords
- Login
- User Account Types
- Multifactor Authentication
- FileVault
- System Preferences
- Screensaver
- Lock-screen
- Malware Protection
- Firewall
- VPN/ZTNA
- iCloud- App Stores
- Secure Memory- Transparency, Consent, and Control (TCC)
- Touch ID- Apple Software Update
- 3rd-party Patches- File Permissions
- Sharing Permissions- Extensions
- Backups- Remote Wipe
Chapter 9: Work Smarter, Not Harder
- Remote Controlling your fleet
- Mobile Device Management
- Device Configuration
- App Deployment
- Securing Devices
- Automating Workflows
- Zero Touch
Chapter 10: Make a Plan and Stick to It
- Standardize your environment
- &nb