In corporate environments, the collection and analysis of security logs isn’t just best practice. It’s often a compliance requirement. As with most business solutions, there are server and client components for log collection. The client software reads the security log generated by the operating system. The server ingests the logs sent by the clients. Additional…
March 2022 Mac lineup
If you’re considering a Mac purchase, always refer to the MacRumors Buyer’s Guide. Using historical release dates, it will tell you whether it’s a good time to buy a particular model. At this time, many Macs models are due for an update, labeled caution or don’t buy. I’ll provide my brief opinion on your purchasing…
We do enterprise tech!
One of the key differences between MacMaven Consulting and run-of-the-mill Mac tech support is that we regularly implement enterprise technologies. Here are some examples: Linux and Windows are used without hesitation. While macOS is fantastic for most of our clients’ needs, some applications and services are best run on other operating systems. Docker containers are…
Wireless iPhone charging
Judging by the offices and homes that I visit, wireless charging is used by a small fraction of iPhone owners. Qi charging pads have plummeted in price, so there’s no reason not to start using one if you have an iPhone 8 or newer. AT&T is currently offering a basic, but functional 10W charging pad…
Why is server work expensive?
It’s commonplace for IT service providers to charge more for work on servers than regular workstations. It’s not so common for vendors to explain why this is the case. Allow me to take the mystery out of servers. Server software is typically more complicated to configure than desktop software. It can involve countless options to…
Clicking on links can be a risk
The safest way to visit a website is to type the address of the website (e.g., apple.com) into your browser’s address bar. If it’s a site that you visit frequently, bookmark it. Here are two common ways that attacks are initiated: A deceitful email contains a link to a phishing web page. The email is…
They aren’t MAC computers
One of my pet peeves is when someone writes about MAC computers. Mac is not an acronym. It’s short for Macintosh.* So why do so many people write MAC? My best guess is that these folks are familiar with PCs, so they apply the capitalization to Macs too. MAC is a technical acronym that you…
QuickBooks Desktop and FIPS encryption
If you’re a DoD contractor, you might have tried to use the Windows “FIPS mode” with QuickBooks Desktop. Unfortunately, QuickBooks does not run when Microsoft’s FIPS-compliant encryption libraries are enabled. This creates a potential problem for contractors who need to be compliant with NIST 800-171 requirements. Data-at-rest doesn’t necessarily need to be encrypted (see 3.13.16),…
If you’re a Department of Defense contractor in New York City, MacMaven Consulting can help your company attain CMMC certification. For those companies using Macs and still searching for security expertise, here is some advice from the trenches: Hire a consultancy that has extensive experience in information security, ideally at large businesses. If a firm’s…
New 24-inch iMac
On April 20, Apple announced the completely redesigned 24-inch iMac, replacing the 21.5-inch models. Overall, it’s a very impressive machine. It has an incredibly thin design and offers high-end features, such as spacial audio and a 1080p FaceTime camera. There are two slightly disappointing deviations from my predictions. First, the new iMac still includes the…