Industry Insights

Blog, Technology

How Much More Secure are Apple Mobile Devices?

by | Friday, April 16th, 2021

For a considerably long time—over 40 years—Apple has staked the claim that their devices are pretty much hack-proof, that most hackers wouldn’t even try breaking into their security measures. Law enforcement was so repeatedly rebuffed by the company as they sought workarounds to get into their devices, that these law enforcement agencies figured it out for themselves.

In doing so, they uncovered a few things that even the most ardent Apple fans may be surprised to hear.

What Has Been Discovered About Mobile Security

After having nagged Apple for years to share access to their OS, law enforcement finally figured it out in 2020, and in 2021, a position paper entitled Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions explored three questions:

  1. What security measures are currently in place to help deter unauthorized access to user data?
  2. How do modern devices allow unauthorized access? 
  3. How can mobile security be improved to prevent unauthorized access?

Researchers dug into both of today’s major platforms—Android and iOS alike—and discovered that neither of the two offered a superior security foundation when compared to the other.

While the researchers did “find a powerful and compelling set of security and privacy controls, backed and empowered by strong encryption” in the iOS platform, these tools simply weren’t being used with enough consistency to really deliver the security benefits they should have been. Android’s issues were derived from the fact that so many manufacturers have the capability to build devices that run Android and—since many of these devices would only communicate with Google HQ so often—updates were often slow to be implemented and some controls could be inconsistent.

Of course, the report included a few specific examples of the issues that were discovered:

Apple’s Security Issues

There is an argument to be made that an Apple user’s ability to securely store their data in iCloud is one of the best features of the platform. However, the researchers also uncovered that this data isn’t all that is taken in by Apple. Activating iCloud also sends a litany of other data to Apple… where other entities (like hackers and now law enforcement) can now access it.

With Apple’s security defenses less effective than they were once believed, this problem is made to be even bigger. Apparently, the researchers also have reason to believe that a tool like theirs has existed since 2018 that could allow attackers to guess user passcodes.

Android’s Security Issues

As for Android, its shortcomings were largely in its local data protection. Android has no solution that could be analogous to Apple’s Complete Protection encryption, leaving it more vulnerable as a result.

What Does This All Mean?

In so many words: neither is the perfect defense that either platform wants you to think it has.

You really shouldn’t ever assume that your data is safe to begin with. The onus falls to you and your organization to manage your data’s security. Fortunately, there are solutions available today to help, like mobile device management platforms and Bring Your Own Device policies that help ensure that your organization isn’t inviting in additional threats.

Compudata can help you put these tools and more in place. Give our team of experts a call at 1-855-405-8889 to get started.

A Glimpse Into What Compliance Looks Like for Businesses

It’s easy to see all the reasons why you should make data regulations and compliance a priority. After all, you want to ensure you don’t violate the trust and security of your customers, as well as the integrity of your operations. If you make even one mistake, it...

AI Search Isn’t There Yet

People do this all the time: if they don’t know an answer, they just make something up that sounds right. It turns out AI has the same bad habit. A Study Put AI Search to the Test, and It Did Not Go Well Researchers at the Tow Center for Digital Journalism (part of...

Remote Work Is Great, but There Are Some Pitfalls

Do you have employees working remotely? If you do, the real question is, are you doing everything you can to keep them productive and secure? Remote work is awesome, but it comes with its fair share of risks. Today, we get into how to competently confront them. Remote...

Hiring IT is Hard (Here’s How to Make It Easier)

Do you have someone on your staff who can handle most IT-related issues for your business? If not, we’re sure your organization feels it in more ways than one. The issues that come from not having IT help are only made more frustrating when it comes time to find IT...

Let’s Take the Lid Off of CAPTCHA

We've officially reached the point where humans have to prove they're, well, human just to access websites. One of the most common ways to do this? CAPTCHA. CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart. It might sound...

Automation Isn’t Always the Best Business Option

Automation makes sense from an operations standpoint, and people see this despite the many who advocate for scaling back to save jobs. For every task that can be completed, however, less than half can be automated. When you consider all the tasks that a human might be...

More Reading from Industry Insights:

AI Search Isn’t There Yet

People do this all the time: if they don’t know an answer, they just make something up that sounds right. It turns out AI has the same bad habit. A Study Put AI Search to the Test, and It Did Not Go Well Researchers at the Tow Center for Digital Journalism (part of...

Hiring IT is Hard (Here’s How to Make It Easier)

Do you have someone on your staff who can handle most IT-related issues for your business? If not, we’re sure your organization feels it in more ways than one. The issues that come from not having IT help are only made more frustrating when it comes time to find IT...