News Feature | November 3, 2014

Apple iOS 8 Boosts Security, Presents New Challenges To IT Solutions Providers

By Rick Delgado, contributing writer

Apple iOS 8 Boosts Security, Presents New Challenges To IT Solutions Providers

In response to security issues, Apple has made moves to tighten security with iOS 8, but the new operating system also presents some new challenges.

New Security Features of iOS 8

Apple's iOS 8 is certainly a move in the right direction when it comes to protecting information shared wirelessly between devices. Some of the new computer security features include constant VPN (virtual private network) for Wi-Fi connectivity, more complex passwords and passcodes, and improved functionality of Touch ID biometric authentication, which allows users to access program information using a fingerprint reader. With iOS 8, Apple lets other developers use the technology to keep programs safe.

IT Challenges With iOS 8

Along with these many updates to improve privacy and safety have come some new challenges, as Information Week’s Dark Reading reports, for companies and their IT teams.

  • Touch ID. While the ability to use fingerprint data to protect information in different apps helps keep individual's data secure, it presents a challenge for IT folks. That’s because the use of Touch ID might interfere with other authentication requirements needed by company software or managed apps. Touch ID can be disabled on devices, but disabling it might interfere with other personal apps that require it, such as Apple’s new Apple Pay system.
  • Anti-Tracking. In the new iOS 8, Apple has created an anti-tracking feature that assigns a random MAC address so that owners of a Wi-Fi address can't track the people using it. While this might be great for individual privacy, it could be a great big challenge for enterprise IT people because many systems now use fixed MAC addresses to control network access.
  • Document Sharing. Apple has made it easier than ever with iOS 8 to share documents across apps and devices. This sharing is done with new functions like Handoff and Airdrop. However, while this might make it easier for employees to share work seamlessly between their own or colleagues’ devices and thus improve productivity and convenience, it also increases the chance that data could be intercepted by unwanted parties or moved by users who are not authorized. IT teams will need to figure out a way to protect data that is transferred using iOS 8’s new document and workflow sharing features.
  • Cross-App Sharing. Before iOS 8, most devices functioned as their own entities — keeping, storing, but not sharing, data. However, with iOS 8, Apple has created the ability for apps to use extensions to function within other apps and a central place for data storage so that apps can store and access data from other apps. This creates a whole new set of weak points where data may be intercepted when it is transferred or stored. Computerworld offers some advice that IT solutions providers could benefit from — look at ways those extensions and functions might allow data to be accessed in an unauthorized app or transferred somewhere it should not be in order to create customized security solutions for customers.

Apple’s new iOS 8 definitely has some fascinating new features meant to address the concerns raised in recent months. Some of those security features, however, could end up causing some headaches for IT solutions providers. Those that prepare most readily to handle these new challenges will be able to make a smooth transition and fully enjoy the benefits Apple’s new operating system offers. They’ll also be able to respond more quickly to any new security concerns that pop up.