Understanding Security Frameworks: Guide for IT Security Professionals

Education

Author: August 9, 2023 by Jesus Vigo

Source: https://www.jamf.com/blog/security-frameworks-guide-for-infosec-pros/

The modern threat landscape is different today from what it looked like five years ago, ten years before that and twenty years prior. Cybersecurity, much like the technology that it seeks to protect is ever-evolving. Combined with the needs unique to your organization, as well as applicable compliance requirements, IT and Security teams have their work cut out for them when mitigating risks to the infrastructure while also maintaining a balance between data security and user privacy.

Thankfully, just like Maverick had Goose in Top Gun, organizations can leverage Security Frameworks to strengthen their security posture by:

  • streamlining procedures
  • minimizing risks
  • achieving compliance
  • enforcing best practices via policies

What is a Security Framework?

Webb cites Secureframe when answering the question above, “A security framework defines policies and procedures for establishing and maintaining security controls.”

Put simply: security frameworks act as a detailed guide that aids organizations in building and maintaining their security plan. Not unlike how blueprints help contractors build a home to specifications.

Importance of security frameworks in today’s digital landscape

As mentioned previously, security is constantly changing and the needs, tools, strategies, practices and procedures to continue protecting devices, users and data within your organization need to adapt to these changes or risk being susceptible to threat actors, including potential data breaches and the dire consequences that come with it.

The role of a security framework in an organization is an easy one to explain: security frameworks provide a systematic approach to securing your organization against myriad risk factors by determining which policies, procedures and controls should be implemented – including how they should be configured – to provide the greatest level of protection across the enterprise.

Webb also goes into greater detail explaining how security frameworks fall into several categories and that within each category there exist several different ones, each providing a specific level of protection to match the unique needs of your organization. Furthermore, while some frameworks may provide more generalized protections against threats, other frameworks are designed to specifically address the needs of specific industries, for example, HIPAA for healthcare or FINRA for financial institutions.

Why are Security Frameworks important?

Security frameworks play a significant role in mitigating cyber threats by making the path to implementing security controls, policies and procedures easier. It eliminates the “guesswork” by answering commonly asked questions, such as:

  • Which tools should we use?
  • Why should we use these tools?
  • What configurations should we use?
  • How can these tools be used to achieve compliance?

Cybersecurity poses a difficult challenge for many an organization. The fact that security is a path, not a destination, does nothing to lessen the challenge of keeping endpoints safeguarded nor organizations compliant. But frameworks greatly reduce the burden placed on organizations by making determinations as to what to prioritize their focus on by establishing a system of sorts that IT and Security teams can utilize throughout the entire endpoint lifecycle.

For example, let’s consider a financial institution that provides investment services to its clients. Because the finance sector is the highest-regulated industry, the importance of adhering to security frameworks for businesses that identify as financial centers cannot be underscored. As part of the regulatory requirements, governance over communications, including the cipher strengths used in communication platforms, what devices are restricted, which platforms can be used and by whom make up a small yet critical part of complying with financial regulations.

In the example scenario above, an employee utilizing their personal mobile device to communicate protected financial transaction data over an unsecured app can trigger an investigation into business processes, possibly resulting in steep fines of millions of dollars. While this may sound like perpetuating fear, uncertainty and doubt (FUD), the “imaginary scenario” above was actually the result of an industry-wide investigation last September, resulting in 16 fintech firms being fined $1.1 billion for failure to comply with federal securities laws in the U.S. This event is just one of the many case studies that exemplify the criticality for organizations to choose the right security framework and adhere to it to maintain business continuity without compromising endpoint security and privacy or be impacted by productivity.

Choosing the right security framework for your organization

Before an organization can begin working on adhering to security frameworks, it must first select one. More to the point, it must first select the right one. When choosing a security framework, some important factors to consider are:

  • Improving operational efficiency
  • Industry requirements for compliance
  • Mitigating security risks
  • Organization size may require more than one framework
  • System and data sensitivity needs

The process of implementing a security framework is not one that should be taken lightly. That said, the benefits of choosing the right framework(s) are multifold. From hardened security configurations to convergence between management, identity and security to form a holistic, comprehensive solution that is purpose-built for your supported ecosystem – all working together to protect against the latest security threats while enforcing compliance through standardized procedures, policies and practices.

Want to understand how security frameworks can help your organization?


What are the security risks of AI?

Education

Author: August 3, 2023 by Jesus Vigo

Source: https://www.jamf.com/blog/security-risks-of-ai/

What is AI?

Artificial Intelligence, or AI for short, refers to the intelligence of software and computers to resolve problems and make decisions by leveraging the advanced data processing prowess made possible by computing devices. AI functions are not unlike human intelligence, only at levels that go far beyond human capabilities.

How does AI benefit businesses?

The promise of AI to revolutionize business functions is vast and nearly infinite. While the extent of what’s capable is not known, some of the possibilities that are available at the onset are helping industries, like supply chain, healthcare and finance sectors – among many others – from developing processes for getting products from point to point seamlessly to processing volumes of health data to identify patterns and anomalies in diagnosis and provide better treatment to more intelligently detect fraud and block fraudulent transactions to keep financial assets safe…and that’s just the tip of the iceberg.

Some examples of AI

AI acts as an umbrella term that includes variations of the technology, each providing a benefit to business and society et al. Examples of the different types of AI technology are:

Machine Learning (ML): Machines are able to discover their own algorithms, or models by being fed data to ‘learn’ about the problem they are trying to solve. The more data points they learn from the greater the potential of the results. Initially, the learning process may require human labelers to identify correct results, as time goes on the human element will be less necessary as more accurate results are produced.

Large Language Model (LLM): Based on deep learning, which is a broader subset of ML, LLMs are pre-trained and rely on neural networks made up of tens of millions of parameters that process large volumes of data in parallel. Whether operating in self-supervised or semi-supervised learning modes, their aim is to not only obtain knowledge but embody contextual facets of knowledge, such as syntax, semantics, and ontology pertaining to humans, such as the way we think and communicate.

Generative AI: A technology that is capable of generating media, such as text and images, in response to prompts by learning the structures of input training data. By receiving input data from users and applying ML techniques by processing the data via neural networks, the resulting media is generated by AI and can be used in multiple applications, such as creating inspired works of art, developing code used in software design or writing documentation, likes articles and reports, complete with cited text – and so much more.

Security risks associated with AI

For all the talk of benefits to organizations around the globe, AI poses an equal and significant risk to each industry. And while cybersecurity risks are nothing new per se, the impact that AI currently has on risk and how that will evolve as AI continues to push into businesses in novel ways certainly is.

This is not just a belief held by a few or the plot of a blockbuster film detailing how AI’s rise will lead to the demise of humanity. In fact, the general consensus among the majority of cybersecurity professionals is that not only will AI be weaponized to a scale and speed that is far beyond what we understand and know today, but in a twist of irony, AI-enabled defenses will be necessary for organizations “to fight these advanced attacks with advanced tactics that detect, interpret, and respond to the threat before it has a chance to make an impact.”

And what exactly are the AI-based risks that organizations are facing to keep resources safe?

Thanks to OWASP and their Top 10 for Large Language Model Applications project for 2023, a comprehensive report dedicated “to educate developers, designers, architects, managers, and organizations about the potential security risks when deploying and managing Large Language Models (LLMs).” The listing includes:

  • the most critical vulnerabilities impacting AI
    • highlighting their potential impact
    • ease of exploitation
    • prevalence in real-world applications

LLM01: Prompt injection

For those familiar with SQL Injection attacks, prompt injection vulnerabilities in AI are a similar attack type. Inputs are crafted in a way to manipulate the model to cause unintended actions. Direct injections are capable of overwriting system responses while indirect injection attacks seek to manipulate inputs received from external sources.

And just like SQL injection attacks, security strategies to mitigate this vulnerability involve the implementation of both input validation and data sanitization practices for user-provided data. Additionally, formatting output encoding helps to filter responses while further reducing the vulnerability of prompt manipulation.

LLM02: Insecure output handling

Attackers often employ fuzzing tactics to determine how to best attack software. By examining the output responses to specially crafted input, critical information may be exposed that provides threat actors a clue as to vulnerabilities that can be exploited to compromise systems. When LLM output is not scrutinized, exposure to the underlying system can occur through Server-side Request Forgery (SSRF) vulnerabilities. To minimize this and further exploits that could allow effective bypassing of access controls and unauthorized access to sensitive data, a combination of input validation and sanitization is necessary to mitigate threats initiated by malicious requests. Additionally, frequent review of auditing data is recommended to ensure that resources remain protected from AI.

LLM03: Training data poisoning

If training data is the lifeblood of AI’s deep learning process, then it stands to reason that AI-generated output is only as good as its input. This precept is especially significant when considering that vulnerabilities may be introduced that could easily compromise data security, integrity and efficacy. This is why it’s so important for organizations to ensure that training data is obtained from trusted sources and that its integrity is verified to ensure that training data has not been poisoned or tampered with, nor that bias has been introduced that could impact the ethical behaviors of AI systems.

LLM04: Model denial of service (DoS)

Not unlike DoS attacks on networks, LLMs represent a valuable target for threat actors. The resource-heavy operations, when attacked, can lead to service interruptions and increased costs which are only further complicated by the reliance on AI-based tools for everything from business operations to cybersecurity. When coupled with the level of variance that comes from user inputs, the number of variables only grows exponentially. Despite having their work cut out for them, security pros should implement resource caps in order to limit excessive requests that would otherwise deplete resources. When paired with continuously monitoring resource utilization and strict input limits, administrators can take a proactive approach to prevent resource exhaustion while still providing users access to AI tooling.

LLM05: Supply Chain

2022 was a year that saw not one but several high-profile supply chain breaches. So impactful were these breaches in fact that guidance from analysts for 2023 foretold that supply chain attacks would continue to grow and proliferate as threat actors continued to set their sights on this large, opportunity-rich target. According to OWASP, “supply-chain vulnerabilities in LLM can affect the entire application lifecycle” – including everything from libraries, containerized instances, images and packages. This extends to cloud service providers that may be hosting models and/or providing services that interface with your LLM, like plugins (but more about them later as they have their own dedicated vulnerabilities that we touch upon). Protecting your AI models from supply chain threats requires a layered approach to your security plan. For starters, thoroughly vetting partners is tantamount to setting up a solid foundation. Performing regular auditing of sources is a key part of the solution to ensure security remains a priority. Implementing model and code signing best practices work best when paired with only working with trusted sources. Of course, active monitoring is a must to detect any vulnerabilities, out-of-scope components being used when they shouldn’t be or even to spot anomalies that could pose a risk to your LLMs security. Lastly, a current inventory of components that are being used in conjunction with Machine Learning Operations (MLOps) to ensure that models are deployed and managed reliably, efficiently and securely.

LLM06: Sensitive information disclosure

Another familiar cybersecurity concern that poses an exponentially unknown risk factor to data security is data leakage. While this too is nothing new to the security industry, the ramifications of AI-based risk cannot be quantified. Information shared with AI technology can (and has) inadvertently revealed confidential data in responses to users, such as it did in three recent issues of leaking proprietary data belonging to Samsung. ML applications particularly learn from all input data and as it builds its database, can and will rely on this data to resolve a query, leading to possible unauthorized data access, compliance and/or privacy violations and of course, possibly lead to a data breach. Hence why it’s critical for users to know and understand the potential consequences of their actions by implementing user training to establish awareness of what should not be shared with AI and whyit shouldn’t be shared. Additionally, organizations are well served by aligning user training to organizational policies to further support secure business practices.

LLM07: Insecure plugin design

Touched upon as part of the supply chain vulnerabilities, plugins and their design pose a critical risk to the data accessed and generated by AI due to the sheer nature of how plugins are designed to operate. In many cases, LLMs rely on plugins or APIs to work directly with input data and output data generated by AI models. Insecurely designed plugins may be prone to malicious requests that may result in but are not limited to data leakage, exposure of underlying systems or remote code execution. They may also lead to poisoning results, which will cause the model to generate output that has been compromised or provides sensitive system information that may be used to further an attacker’s aim. As a general precaution, it is advised that all input data be treated as unsafe and therefore, input validation (including parameterized input requirements) is recommended alongside explicit access controls to limit the risk of security issues. Additionally, plugins should be tested thoroughly to validate code and should adhere to best practices for developing secure code at each phase of the development pipeline.

LLM08: Excessive agency

The view and to some extent the marketing of AI, heralds thoughts of a personalized assistant that is always available to perform the “heavy lifting” for us, not unlike the JARVIS protocol used by Tony Stark/Iron Man to handle everything from curating playlists to performing scientific calculations on the fly when identifying an unknown element. And while AI certainly has been tapped to perform autonomous feats, like self-driving cars, the agency granted to the model (direct) or the automated actions that result from the data AI has processed and are executed by plugins or tools (indirect) all share a common trait: they are occurring without human input or authorization. This alone poses one of the more frightening concerns as LLMs or the plugins that rely on their data may perform functions that are not necessary or even intended to perform simply due to the agency or “permissions” given to them – even if the intended operation is one that humans wouldn’t want to be performed. Or as a core tenant of the European Union’s draft of the AI Act, “AI systems should be overseen by people, rather than by automation, to prevent harmful outcomes.”

How does one go about mitigating this risk type? Implementing a risk-based approach. Similar to a Zero Trust model, “LLMs should not be trusted to self-police or self-restrict.” To achieve this, look toward limiting access to plugins and tools to only the functions required. Also, avoid open-ended functions or any functions that are simply unnecessary to harden the attack surface (latter) while strengthening access controls to only interact with the data or perform the actions that are necessary to complete its process (former).

LLM09: Overreliance

If excessive agency is a frightening vulnerability, then overreliance is akin to it but from a more worrisome perspective. Let us explain. Many users have taken quite well to generative AI models, like ChatGPT, among others, to create content like writing articles, capturing captivating imagery or mashing up video content that is hyper-realistic, and yet all of it is completely produced by AI. While on the outset, the ability to generate media content is a capital feat in and of itself, as with many tools, the intent of the user is what drives whether it is used to build or to destroy. This may seem like overdramatization, but the risk posed by users relying on AI content as gospel truth could have disastrous consequences. Take for example the misinformation being generated in a technical paper due to a hallucination by the AI and how that could lead to any number of issues affecting major industries, such as healthcare and IT/IS. Or how relatively easy it is to produce audio recordings of individuals saying anything with only a few seconds’ worth of soundbites needed to digitally recreate their voice. Now how about taking that recording and broadcasting it online? Depending on the content of the words, it could be enough to ruin someone’s public reputation or instead, the “faked”recording could be used as part of a crime.

Simply put: we just don’t know how deep that rabbit hole goes in relation to the untold consequences of over-relying on AI. But there are tactics that can help aid discernment between what’s real and what’s generated by LLMs. Let’s begin with fact-checking output with trusted external sources as an additional layer of validation to determine the accuracy and validity of generated content. Similar to plugin development, establishing and adhering to secure coding practices helps to minimize the risk of introducing vulnerabilities into the development environment. In addition to the validation mechanisms and cross-verification of information, clearly and concisely communicating risks, known issues and limitations associated with using AI and AI-generated content is table stakes to ethical and transparency efforts between content creators and content users – not unlike FCC laws that govern truth-in-advertising.

LLM10: Model theft

This vulnerability is among the most straightforward, referring to the unauthorized access and exfiltration of data, in this case, the LLM itself by threat actors. It’s not unlike the data exfiltration threats in cybersecurity seen for years prior to AI where sensitive, private and confidential data is targeted and removed from devices or networks with the express purpose of leaking the information, stealing proprietary details or as part of espionage campaigns. AI model theft, like any piece of confidential data that is stolen, can range in severity from both an economic and a business continuity standpoint. The loss may present a loss of revenue or competitive advantage to unauthorized usage of the model up to and including using it as part of an adversarial attack against the organization the model was stolen from. The key is to secure your LLM using layered security strategies including strong access controls, limiting access to network resources through network segmentation and secure sandboxing, active monitoring of resources, as well as regularly performing audits of logs and activities tied to your LLM. Incident response alerted and deployed upon alerts of suspicious behaviors and to mitigate the detection of anomalous behaviors. In addition to access controls, quick mitigation of other vulnerabilities known to affect LLMs (such as those represented within this article) can help to reduce the risk of malicious actors pivoting or moving laterally from another threat to compromise your model.

Other AI-based security risks

Inadequate sandboxing

Sandboxing data is an excellent way to segment sensitive processes from the rest of a system. Doing so allows data to be effectively processed while it runs securely isolated from the underlying system, including being inaccessible by external threats or exposed to risks outside the sandbox environment. Because of AI’s relative nascency, a number of issues are at the heart of designing a universally accepted or regulated sandbox. However, organizations that wish to take advantage of AI technology today would benefit from sandboxing AI models, tools and systems to promote experimentation with products and services in a secure and ethical manner that minimizes risk while addressing challenges, such as lack of formal safeguards, unforeseen consequences or lack of fidelity across solutions.

AI misalignment

The term AI alignment refers to “research aims to steer AI systems towards humans’ intended goals, preferences, or ethical principles”, according to Wikipedia. If despite its competency, an AI system cannot advance the intended goals, then it is considered to be misaligned and its lack of alignment could lead to undesired behaviors, including actions and malfunctions that could further cause harm to businesses and worse still, impact human life. Consider for a moment an AI system used to generate code for a web service. While the aim of the developer is to create complex, secure code that will result in a service that can be used to simplify computer-related tasks, AI can also be subverted to generate powerful malicious code that may pose a threat to the web service mentioned previously or any web service for that matter. Hence why it’s critical to maintain a finger on the digital pulse of AI by identifying what works and refining what doesn’t to help make models safer to use. A key role in the alignment process is human oversight. Not just checking a box off when AI gets something right or wrong, but taking a more pragmatic and scientifically-based approach by documenting problems, performing continuous training, reviewing feedback, conducting evaluations of systems and doing so in a transparent fashion are just some of the key techniques to achieving better alignment.

Key takeaways:

  • Develop input validation and output sanitization practices to reduce sensitive data leaks and prompt injection vulnerabilities
  • Thoroughly vet supply chain partners to ensure compliance with security and ethical practices
  • Ensure that training sets maintain data integrity and have not been tampered with or compromised by working only with trusted sources
  • Audit all systems that are used for AI
  • Impose limitations on data sharing, especially private and confidential information
  • Implement data security and access controls according to industry best practices
  • Harden hardware and software with up-to-date patches, vulnerability management and next-generation security tools (including AI/ML-based tooling)
  • Provide adversarial training to respond to AI-based threats and improve the resiliency of models
  • Integrate regular training so staff understand how to detect and avoid risks stemming from AI-generated threats
  • Develop an incident response team for security issues detected and optimized for handling AI-related risks

Protect all your Apple devices with Jamf!


Education customers have their say about Jamf

Education

Author: August 1, 2023 by Ivna O’Neil

Source: https://www.jamf.com/blog/improving-education-with-jamf-technology/

Education is at the heart of Jamf’s mission.

Earlier this year, Jamf was at Bett 2023, the world’s leading education technology show. Over the course of three days, we welcomed educators and IT professionals to our dedicated area to chat about how our solutions are empowering more than 42 million students globally.

Customers in different stages from many places

Among the visitors to our stand at Bett were customers in different stages of their digital classroom transformation with Apple and Jamf. We talked to them about how Jamf is helping their schools create the ideal technological environment to safeguard students, facilitate deployment of Apple devices and keep data protected.

Managing and configuring student iPads with Jamf School

For the Arthur Terry Learning Partnership, an education trust, Jamf has been an essential part of their deployment. With 20 schools to oversee, they are halfway through the first phase of implementing Jamf School.

“We are extremely happy with the quality of the product and the support and guidance from Jamf,” said Richard Anderton, Head of Digital Strategy at the trust.

Stéphane Thomassin, from Collège Saint-Joseph, explained how their journey with Jamf has developed since its inception four years ago. By attending a three-day training, staff at the school learned how to maximize Jamf’s MDM capabilities to manage and configure students’ tablets.

Expanding with Jamf Parent and Jamf Safe Internet

“As for today, we mainly have challenges to ensure security and manage the iPads at home,” said Thomassin.

To continue building on their success with Jamf, Collège Saint-Joseph began to test the Jamf Parent app and Jamf Safe Internet. “I’m pretty confident we will deploy them soon because the results and feedback are positive for iPad management at home by the parents,” said Thomassin.

Transforming iPads into fully-fledged learning and teaching tools with apps

Other customers were eager to share how they are moving from pure device management to solutions capable of simplifying teacher workload and making full use of Apple devices. By using apps such as Jamf Teacher, Jamf Student and Jamf Parent, schools can transform iPads into fully-fledged learning tools.

Damian Parker, Head of Faculty of Art Design & Technology at St Cyres School, was keen to discover the possibilities, so decided to get a Jamf certification. He learned so much getting the certification that it transformed his lesson planning and classroom management.

“I didn’t realize I could pre-plan my lessons and get all the apps in line for my day,” said Parker. “Now what I’m finding is when students arrive my lesson is ready: I press start and as soon as they open their iPads – bang! They’re straight into the apps I want them to use, no fuss, no wasting time and I’m just ready to teach as soon as they come in.”

Keeping students focused

Customers agreed that student focus was greatly improved after implementation of the apps. According to Matt Warne from RGS Worcester, a previous MDM tool could not deal with common issues like students messaging during class or spending time on games. Jamf has enabled the school to eradicate these problems, which allows their technology vision to come to life.

Learn more about Jamf’s education offerings.


The digital classroom

Education

Author: July 28, 2023 by Mat Pullen

Source: https://www.jamf.com/blog/the-digital-classroom/

In schools around the globe, the traditional classroom is evolving to take advantage of the new digital tools available to meet the needs of today’s tech-savvy students.

Read on to learn more about how digital technology in the classroom enhances the learning experience, encourages student engagement and empowers educators.

What is a digital classroom?

The digital classroom incorporates electronic devices and software into the learning environment.

Key elements of a digital classroom include:

  • Devices: provide computers, laptops, tablets or smartphones to access digital resources, participate in interactive activities and complete assignments.
  • Internet connectivity: allow online access to materials, collaboration and virtual interaction.
  • Educational software and apps: create digital lessons, activities and assessments.
  • Digital content: make educational materials available digitally.
  • Collaboration and communication tools: enable seamless communications and interactions with online platforms and applications.

These tools can expand the potential for collaboration, extend access to resources and enable continued work outside of the physical classroom space.

Typical uses of digital tools in the classroom include teachers creating and sharing lessons via iPads, students completing assignments on shared or one-to-one devices and off-site access of resources and communication via internet connection.

Benefits of a digital classroom

The digital classroom transforms the learning experience for students by offering:

  • Enhanced engagement and interactivity
  • Personalized learning tailored for individual needs and abilities
  • Expansive access to digital resources and self-directed learning
  • Time and location flexibility, enabling students to learn at their own pace
  • Opportunities for global collaboration and exposure to diverse perspectives
  • Real-time feedback and assessment

To learn more about how this works in practice, read about how Apple and Jamf empowered students in Taiwan with world-class digital classrooms.

Challenges of a digital classroom

The digital classroom offers many advantages for students but there can be obstacles to successful implementation.

Common concerns include:

  • Technology access – limited or inconsistent access to devices and the internet
  • Digital literacy – varying levels of how much users understand digital tools
  • Privacy concerns – how to keep students safe online

While the importance of providing equivalent technology for every user is crucial for reaching every learner’s potential, effective teacher training is also important.

One of the advantages of using Apple devices such as iPads is the abundance of free training offered for educators: part of the initial device purchase investment includes free training from Apple Education Community, Jamf Educator and Apple Professional Learning.

And no less important: because this technology provides access to internet exploration, it requires a plan to keep students safe online. Jamf Teacher enhances the standard approach to content filtering by offering classroom-level controls, including providing specific web links to encourage exploration in a safe environment of specifically-allowed sites.

Digital classroom tools

Technology that is effectively used in modern classrooms includes:

Apple devices and software

Apple empowers student and educator success with powerful, intuitive tools that encourage creativity: including iPad, Mac and Apple TV devices.

As Apple devices have a lower long-term cost of ownership with higher resale value when compared with others, schools around the world are offering iPads to students.

When both teachers and students use the same devices, it supports good classroom management and a shared understanding of the device’s potential.

Google Classroom

Google Classroom is an all-in-one tool enabling educators and students to engage together in lessons and coursework. Google Classroom can be learned in minutes; it helps educators manage their instruction and grade more efficiently. It features seamless integrations with other Google Workspace for Education tools like Drive, Calendar and Meet as well as popular third-party EdTech tools. Google Classroom gives educators streamlined ways to create enriching student experiences that make each lesson more personal.

Jamf School

Behind every effective technology deployment is a system that makes management and security work.

Jamf School is a mobile device management (MDM) system for efficient classroom management enabling:

  • Set up and organization of classes
  • Connection with other teachers
  • Communication with students
  • Configuration for specific or shared users
  • Assignment of specific apps as well as content to devices

Jamf School enables teachers to set up specific content for the correct classes at the right times, which makes it possible to offer age- and subject-appropriate content when and where it is needed. The end result: teachers can focus on using the devices, not how to set them up.

Jamf Safe Internet

Jamf Safe Internet provides educators piece of mind for students working online. When students search online, educators can trust that learners are protected from accessing inappropriate content. Filtering tools are simple to set up, with options for predefined settings including not only gaming, gambling and adult search but also additional customization for needs based on the age or stage of the learner.

Jamf Safe Internet also goes beyond content filtering and into threat prevention. It protects users and networks from the risks of phishing attacks, malware and ransomware – dangers that can cause issues with wider implications for institutions beyond the classroom.

The role of teachers in a digital classroom

In the “traditional classroom,” a teacher’s role has been to provide content for learners and to help them understand context and application.

But in the digital classroom, technology gives educators an opportunity to become more of a guide— to encourage independent thought and discovery that can lead to a deeper understanding of what the content means for each individual learner.

Technology also offers opportunities to express an understanding of the content in new ways, from video to audio or other imagery. As educators use technology to encourage self-directed learning, students are empowered to take more responsibility for their learning.

Beyond the traditional classroom, technology also provides opportunities to offer new learning spaces, meeting students’ individual needs for where and when they learn best.

It’s essential for educators to have access to classroom management tools to empower students to use devices in and outside of the classroom.

By using the combination of Apple Classroom and Jamf Teacher, educators are empowered to provide simple and quick access to the resources that allow this type of learning while also monitoring student progress and support from a distance.

Training and support for educators

For classrooms to successfully evolve to a digital model, schools should also plan how to support and train their educators.

Teachers may need to not only learn new skills such as tech proficiency and online moderation but also how technology provides new ways to share content, assess understanding and promote new thinking.

The future of digital classrooms

The pandemic taught us that learning doesn’t have to be restricted by space and time. As the “traditional classroom” continues to evolve with increased investment in education technology, what can we expect future learning to look like?

We are seeing new schools that further blur the line between education and work. These innovators don’t simply replicate workplaces but also use technology in ways that enhance collaboration beyond borders. Learners can engage with experts from around the world and showcase learning that meets industry needs. In many cases, they can even inspire new thinking in the world around them.

When students receive the right tools, they can be real change-makers in the years to come.

Make the most of the digital revolution with Jamf

Jamf helps schools deliver a secure, active learning environment to everyone with iPad, Mac and Apple TV devices.

Manage and secure Apple in education with a free trial of Jamf School.


On-device content filtering boosts web filters for schools.

Education

Author: July 28, 2023 by Haddayr Copley-Woods

Source: https://www.jamf.com/blog/filter-content-for-apple-devices-at-school/

What is on-device content filtering?

On-device content filtering is a network-filtering framework provided by Apple. Jamf uses this framework to further protect schools and districts by enforcing web protection directly on devices. Adding this feature to existing security measures can both strengthen web filters for schools and also ensure greater privacy for students.

How on-device content filtering enhances web filters for schools

Here’s how it works: using Apple’s NEFilterProvider and encrypted DoH, Jamf Safe Internet inspects all incoming traffic on an individual iPad in a restrictive sandbox. Before releasing data anywhere else, it strips sensitive data, such as URL query parameters. Because the inspection happens on the device, unsafe data traffic never even gets close to your school’s network, and bad actors attempting to get at students’ private information are stopped before they can start.

Why do schools need on-device content filtering?

Don’t existing content filtering programs offer enough protection? Yes and no. Adding traditional content filtering methods to your existing security measures is an excellent start. Adding on-device content filtering in addition provides another layer of security and extra privacy protections by stopping both inbound threats and unsafe outbound activity.

Guard against phishing, social engineering and credential theft

Phishing is a truly troubling way of manipulating students into responding to notifications they believe are from their schools. Messages look as if they come from school or other educational sites, so students (and even teachers and parents) think nothing of entering credentials or identifying information.

The sandbox allows Jamf Safe Internet to perform behavioral analysis that blocks phishing and links to malicious sites before the student ever sees the misleading message.

Students who want to sidestep the system

It’s only natural to test limits, right? Some might even say that testing limits is part of the job of growing up. That’s why parents and schools must take extra steps to assure student safety.

On-device content filtering thwarts students who deliberately attempt to bypass domain-based rules by using IP addresses rather than URLs to blocked sites. They can’t get in, and that’s that.

What are the benefits of on-device content filtering for schools?

  1. Increased internet safety. On-device content filtering enables educators and parents to create a safer online environment for students by protecting them from age-inappropriate content.
  2. Better focus. With filtering on iPads, educators can ensure that students primarily access educational resources and materials. This promotes a focused learning environment and encourages students to stay engaged with educational materials.
  3. Policy compliance. On-device content filtering allows administrators to enforce acceptable-use policies directly on the iPad, ensuring students adhere to the guidelines.
  4. Cyber threat protection. On-device content filtering helps safeguard students’ devices and personal information by blocking cyber threats such as malware, phishing attacks, or websites with malicious intent.
  5. Customization. On-device content filtering offers the flexibility to customize filtering settings based on the age group or specific needs of students, ensuring appropriate content access for each group.

With on-device content filtering, schools can:

  • Block access to known malicious sites and filter out suspicious content
  • Block access to inappropriate, harmful or non-educational content such as: explicit material, violent or gambling websites, social media platforms or gaming sites
  • Create different levels of content filtering to match the requirements of different grade levels and ages

How can my school get on-device content filtering?

Jamf’s on-device content filtering is a part of Jamf Safe Internet. It’s currently available for supervised iOS and iPadOS 16+ devices whether 1-on-1 or shared.

Already a Jamf Safe Internet customer? On-device content filtering will automatically be part of the configuration profile to support devices that are iPadOS 16 or later. Using Smart Groups or device groups, Mac Admins can also create separate profiles for older devices.

Jamf is planning macOS support for on-device content filtering later this year.

On-device content filtering: safe, focused learning

On-device content filtering on iPads supports a safer and more focused learning experience for students. It helps ensure that educational resources are accessible while mitigating the risks associated with inappropriate content or cyber threats.

Does on-device content filtering sound right for your school?


G2 Summer 2023 Report

Education

Author: July 18, 2023 by Jesus Vigo

Source: https://www.jamf.com/blog/g2-jamf-reviews-2023/

It brings us immense pride and appreciation to announce that we have received the highest accolades in the Summer 2023 Report, a publication by G2, the prominent tech marketplace and peer-to-peer review platform.

G2 scores products and vendors based on authenticated community reviews, aggregated online and social network data points, and algorithmic calculations of satisfaction and real-time market presence. You can find a detailed explanation of the report scoring methodology here.

Jamf continues to be ranked a leader with our mobile device management (MDM) solutions, Jamf Pro and Jamf Now, along with the authentication and identity management solution Jamf Connect. Endpoint management solution Jamf Protect continues to be a high performer, with Jamf School also making its debut on the MDM list.

Highlights from the G2 Summer 2023 Report

Jamf product solutions scored well in G2’s Summer 2023 report, with first-place rankings in 30 categories plus other high marks for Jamf Pro, Jamf Now, Jamf Protect, Jamf Connect and Jamf School.

Jamf Pro

Continues to reign as a Leader and #1 in 29 categories. Products in the Leader quadrant are rated highly by G2 users and have substantial Market Presence scores.

Highlights included:

Jamf Connect

Ranks in 16 categories overall while serving as a Leader in 3 grid reports.

Jamf Now

Ranked in 16 categories overall, and designated as a Leader in 2 grid reports.

Jamf Protect

Ranked in 9 categories while also making the cut as a Leader in 2 grid reports.

Jamf School

Making its first appearance in the G2 Summer 2023 report, ranking in 5 categories.

Don’t take our word for it…

Read what customers have to say about our solutions in G2’s profile of Jamf and how we’ve empowered them to not just meet their compliance goals but how Jamf solutions have and continue to “help organizations succeed with Apple” through holistic, comprehensive security of their Apple fleet – while maintaining user privacy.

You’ve heard from the rest, now it’s time to try the best!

Get started with the free trial and let Jamf help your organization succeed with Apple too.


Teaching with technology is more than web access

Education

Author: July 17, 2023 by Hannah Hamilton

Source: https://www.jamf.com/blog/transformative-learning-apple-technology/

Technology has always informed the way we learn in school: think radio, filmstrips, overhead projectors, VHS tapes, graphing calculators and beyond. Now with the internet and mobile devices, the avenues for learning have only multiplied. For better or for worse, students are no longer limited to what their teacher curates. They have access to the countless apps, webpages and other resources the internet has to offer.

Of course, this is true outside of school too — some of us can thank the typing classes we took in school for being able to quickly and efficiently, say, write a blog post. Similarly, current students will take the skills they learn from technology in the classroom and apply it to their adult lives.

The World Government Summit and McKinsey & Company released The Skills Revolution and the Future of Learning and Earning report in 2023.

It lists these three skills as the most important for the future:

  • Technological skills: advanced IT skills, programming and basic digital skills
  • Social and emotional skills: leadership and managing others, for example
  • Higher-level cognitive skills: creativity, complex information processing and critical thinking

So how do we use technology in a way that helps students develop these skills? While there’s almost certainly no single right way to approach this, this blog will dive into why we think Apple and Jamf are excellently suited for this pursuit.

Choosing classroom devices

Technology can help put students on the same playing field to develop the skills they need to succeed in the future.

When selecting appropriate tech for the classroom, there are a few things to consider:

  • How can we give all students the tools they need to learn despite their differences?
  • How can we encourage active collaboration?
  • How can we give students the freedom to explore online without putting them in danger?
  • How can we engage students and foster creative learning?

Addressing these factors will rely on device capabilities and compatibility as well as privacy and security. Devices need to be easy to use and accessible for a variety of learners, offer a number of collaborative and engaging apps and features, and have multiple ways to protect the privacy of the user and security of the device.

Why Apple is a good fit for schools

Apple started in education and maintains a unique position in the industry. Apple offers:

  • Exclusively built first-party operating systems and hardware
  • Industry-leading accessibility features
  • A privacy- and security-first approach

Apple exclusively develops both its hardware and software, so when you use Apple products, you know you’re getting the optimized experience. When equipping a classroom with all Apple devices, you eliminate both software and hardware cross-platform incompatibilities, making collaboration with peers more reliable. This enables teachers to go beyond browser-based applications and deliver a classroom experience that uses all the Apple platform has to offer.

When you give students the same devices, you’re giving them the same base-level experience while giving them the opportunity to tailor it to their specific needs and learning abilities. Apple offers a number of leading accessibility features built into the OS — not as an afterthought. Features like Guided Access, Speak Selection, VoiceOver, AssistiveTouch, Closed Captions and Eye-Tracking Support for iPad help students with cognitive, learning or physical disabilities by making the learning experience more accessible — with the goal of equalizing the playing field for a variety of learners. Students of various abilities have a better chance at developing the technological, social and emotional, and higher-level cognitive skills they need to succeed once they leave the classroom.

Related reading: Apple for students, teachers and parents with disabilities

Beyond the user interface, Apple builds its devices with security and privacy in mind — especially important in schools where young people’s safety and well-being are at stake. Students, teachers and parents can rest assured that their information is kept safe and their data isn’t being harvested.

How Jamf can help

Jamf expands on Apple’s capabilities by offering:

Jamf School

Jamf School is our Apple mobile device management (MDM) platform tailored for education. It helps with device deployment, classroom management, app provisioning and more. This helps IT keep track of and deploy devices while giving teachers a simple way to take control of their classrooms.

Jamf Teacher, Jamf Student and Jamf Parent

The Jamf Teacher app enables teachers to prepare and share lessons, manage student access, send messages, safelist apps, create an attention screen and start an ad-hoc classroom session. This makes it easier for teachers to meet students where they’re at in their learning journey and keep students focused.

The Jamf Student app encourages student participation- allowing them to send a message to their teacher or to “raise their hand” if they need help. Students still have the freedom to set up and manage their own iPads to make it their own within the constraints set by administrators.

Learning doesn’t stop once students go home. The Jamf Parent app gives parents the power to limit apps and device functionality on their students’ devices, helping them keep focused when at home.

Jamf Safe Internet

A part of developing technological, social and emotional, and higher-level cognitive skills is creative learning — allowing students to imaginatively and curiously explore. Instead of locking down devices to a minimum feature set, Jamf Safe Internet lets students safely explore the world wide web. By putting up guardrails, students can browse without accessing (whether deliberately or not) inappropriate or dangerous sites. Schools can block categories or specific sites that are inappropriate, unproductive or high bandwidth: keeping students safe and focused.

Related reading: Jamf Safe Internet protects everywhere that students learn

Key takeaways

  • Students need to develop technological, social and emotional, and higher-level cognitive skills for future success.
  • Creative learning and technology can help develop these skills.
  • Apple offers an unparalleled, unified, accessible experience in the classroom.
  • The Jamf platform enhances Apple in the classroom by simplifying workflows and protecting students.

Take advantage of technology in schools with Jamf School.


Jamf School or Jamf Pro: which is right for you?

Education

Author: July 10, 2023 by Haddayr Copley-Woods

Source: https://www.jamf.com/blog/jamf-school-or-jamf-pro-which-is-right-for-you/

Jamf, the standard for Apple device management and security, knows education. We know educators. And we know that not all schools or educators have the same needs.

That’s why we offer two ways for schools to manage their Apple devices: Jamf School and Jamf Pro.

Some schools or districts need a simple, intuitive web-based interface that simplifies device management: deploying, conducting inventory and securing Apple devices.

Some IT departments manage multiple schools and districts or a very large or complex grouping of devices and need more robust and in-depth, more granular management tools.

Both Jamf School and Jamf Pro offer tools specific to teachers, schools, and students. Both offer zero-touch deployment. Both integrate seamlessly with Apple Classroom, endpoint security and content filtering. Both will always support Apple releases and features on day one.

So how do you decide which is right for your school?

Try Jamf School

Help IT administrators, teachers and parents. Request a free trial.

Jamf School

Most schools or districts will find Jamf School beneficial. It’s built specifically with education in mind, after all. Beyond its simple, intuitive web-based interface requiring no IT, Jamf School’s education-specific focus allows it to offer slightly more in its education-specific tools than Jamf Pro. While the interface is simple and streamlined, Jamf School’s behind-the-scenes capabilities can handle most needs, even for large and complex schools or districts.

“I love using Jamf School. It meets the needs I have for the iPads in regards to profiles and groups, and I can access it anywhere. The cost-saving aspect is also a plus and it has cut down on my time because the platform is so easy to navigate.”

Antoinette Latham, Technology Integration Specialist
Second Baptist School, Houston, Texas, USA

  • Manages around 800 iPads on six different campuses with Jamf School.

Who needs Jamf School?

Jamf School is a purpose-built educational tool known for its simple, fast setup and teacher-specific workflows as well as its teacher, parent and student apps. Jamf School’s interface is specifically designed for schools— it gets everyone to the most important things straight away, whether you are a teacher with added IT responsibility or a seasoned IT admin.

“[We use Jamf School] because of the enhanced feature set and the more education-friendly workflow that Jamf School offers. A lot of thought has gone into streamlining workflows in an education context, which means devices can more easily be used for the task at hand: learning.”

Tim Lings, Director of Digital Learning
Heronsgate Primary School, Royal Borough of Greenwich, UK

  • Manages nearly 50 AppleTVs, 70 Macs and 800 iPads with Jamf School.

Jamf School Apps

While you can offer a great deal of education-focused apps and features in Jamf Pro, Jamf School goes deeper into some of these tools with options like passcode unlock, attention screens for in-class use when students get unfocused, subgroup creation and teacher-created classes.

  • Jamf School Teacher (also available on Jamf Pro)
    Combined with Apple Classroom, the Jamf School Teacher app empowers teachers to restrict websites, apps and cameras. Teachers can also communicate directly with students and distribute lessons through their devices.
  • Jamf School Parent (also available on Jamf Pro)
    Parents can restrict device use for specific times throughout the day with Jamf School Parent, as well as receive a notification when a child gets to school or arrives at home.
  • Jamf School Student
    This app empowers students to set up their own devices, communicate with teachers and store documents.
  • Jamf Assessment (also available on Jamf Pro)
    The Jamf Assessment app provides schools with a simple method to administer remote proctoring for high-stakes exams.

Jamf School also offers:

  • Drag-and-drop classroom management
  • All device information on one dashboard
  • Automatic student access to subject-specific materials
  • Damaged device tracking

Who needs Jamf Pro?

Jamf Pro is the gold standard in modern device management, designed with the enterprise in mind. It offers more technical and specific customizations, has offered Mac management capabilities and customization for more than 20 years, and offers unmatched customer support.

Are you managing both individual schools and a district’s various administrative offices with Macs? If your Apple ecosystem is more Mac-heavy than iPad-heavy, and if you need specific scripting and more customized management tools, Jamf Pro is probably for you.

Jamf Pro offers:

  • Unmanaged Mac identification
    An unmanaged Mac is an at-risk Mac. Unmanaged Mac identification immediately enrolls unmanaged Macs into management the instant a network scan reveals one.
  • Detailed device management
    Jamf Pro device management goes beyond basic configuration to truly customize devices— including account permissions, custom scripts and full Apple TV support.
  • Excellent education-specific tools
    Jamf Pro includes many of the same tools for teachers, schools and parents as Jamf School does, in different versions.
  • App management and Self-Service
    Self Service offers a custom app catalog for on-demand user access, including in-house or outside apps.
  • Security
    Jamf Pro offers secure VPN configurations, granular management privileges and automatic patch management functionality.
  • Support
    Truly robust support: available via chat, email or phone during business hours, with Premium Support also available for round-the-clock support.

Package plans for K-12 education

Jamf offers combination plans for education, including:

  • Jamf Education Enhanced
    Simple management and security with Jamf School (MDM) and Jamf Safe Internet (threat prevention and content filtering). Includes enhanced support.
  • Jamf Education Ultimate
    Complete package: Jamf School, Jamf Safe Internet Jamf Protect (Mac endpoint protection), Jamf Connect (identity and authentication management). Enhanced support.

Jamf also offers education pricing for Jamf Pro.

Still can’t decide?

Take each for a free test drive! It’s hard to go wrong — regardless of the chosen tool, 96% of Jamf customers renew their contracts every year.

Let us help you get the most out of your Apple devices, and help your students get the most out of their educations.


Apple School Manager and Classroom Management

Education

Author: June 30, 2023 by Mat Pullen

Source: https://www.jamf.com/blog/apple-school-manager-and-classroom/

Teachers have always been expected to plan, prepare and teach lessons to improve student knowledge and skills. Today, they must also have a good understanding of technology and the digital tools modern classroom management requires.

Classroom management, in this case, refers to how educators can use technology solutions to help support workflow and classroom organization. In much the same way as behavior management can support individuals, classroom management can help ensure the smooth running of classroom sessions.

Why is classroom management important?

Effective classroom management offers benefits for both educators and their students.

We know that for some teachers, a lack of confidence can be a barrier to the effective use of technology in the classroom. If teachers lack confidence in this area, they may believe that students knowing more than they do will show them up. Or, they may fear not being able to monitor students’ technology use well enough to keep them out of trouble.

Even beyond these fears, teachers don’t want their focus to be on what technology they use in the classroom. They want technology to be just another tool like any other equipment. The more technology can be managed for specific uses at a given time, the less of a distraction it can be.

The goal: smart classroom management. Teachers set up activities in a way that works for them and trust that it is in place when students are ready to learn. With the right content and access in place, there’s no need for teachers to provide additional tech instruction.

The result: Teachers don’t have to provide tech support in the middle of lessons.

What does modern classroom management mean?

When modern classroom management includes digital management, for some teachers it can feel overwhelming. But effective digital management can simplify the teacher workload.

As educators incorporate modern devices like iPads into the classroom, implementing these key technologies can help:

  • Mobile Device Management (MDM) software. It’s crucial to enroll students and staff into classroom management software such as Jamf School or Jamf Pro. This enables admins to assign students to a classroom so that educators can have everything ready to go before the lessons begin.
  • Apple School Manager. This free web-based service for IT admins supports the creation of student and staff accounts that sync with your MDM.

Once in place, teachers can manage classrooms through two complementary methods:

  • Apple Classroom: This Apple application enables teachers to view student devices and the apps they’re using, as well as their screens. It supports teacher input and enables them to share content with the rest of the class.
  • Jamf Teacher: This Jamf app enables teachers to focus student attention on specific tools while restricting access to those not needed in a session. Teachers can toggle on or off restrictions on features such as spellchecking and autocorrect. They can allow specific apps and websites, remove those not needed and keep students where they need to be.

These tools help focus learning while keeping the technology invisible. Students don’t waste time searching for the right app or website and can get straight into their learning. It also supports student feedback – when a student can easily share their screen, feedback can be more timely.

What does effective classroom management look like?

  • It doesn’t interfere with a teacher’s lesson flow. Instead, it enhances lessons and offers new opportunities to engage learners.
  • It should be simple, effective and require minimal setup— not add to the teacher’s workload.
  • It should provide students with a measure of predefined independence, so they are able to find resources proactively.
  • It should cut down on classroom wait times and educator workloads; for example, by printing resources or creating QR codes for website access.

Why is classroom management important?

Without effective management in place, teachers and students pay the price.

Poor classroom management can lead to distracted students and less confident teachers. It can prevent technology from doing its job to support learning. Without effective management software, teachers can’t benefit from technology-supported feedback and collaboration.

It also impacts differentiation in the classroom. The inability to access extension activities is a lost opportunity for students who want to explore content independently. And learners who need a bit more time or a different approach to absorbing information can not only become frustrated if forced to proceed at the same pace and in the same way as the rest of the class, but they can even fall behind.

Effective classroom management can lead to a new approach to how a classroom functions.

Sometimes it can even mean that the traditional view of a classroom is no more.

When devices are connected to the teacher, not the classroom, students can work in places that enhance their own learning. Those learners who need a quiet space can find one and be in contact with their teachers with access to all the content they may need.

Students who need to move, interact and explore away from the classroom can also do so while still remaining in contact with the instructor with subject matter materials at their fingertips

Teachers can set up groups based on these learning differences to allow student access to the support that works best for them.

Support doesn’t stop there. It can continue beyond the school with home-based learning.

Guiding technology use: management philosophy

As with any technology deployment, it’s important to lead with a purpose and have a clear vision from the outset that all staff can follow. This provides students equity, regardless of their ages or the teacher they have.

Good classroom management helps keep learners organized and shows teachers the real potential for technology. It also provides consistently applied and supported feedback and assessment opportunities that support learning.

And as with all things new, staff need training to feel confident and competent in using technology. This can often start with how they can manage it in their own spaces.

Where to begin: Apple School Manager

As already discussed, signing up for Apple School Manager is an important starting point for smart classroom management.

It allows schools to create the classes and groups that Jamf will ultimately use to set up a solid classroom management experience.

After setting up Managed Apple IDs, it allows students –who can now work in new ways made possible by classroom management tools– to collaborate on work with each other, even when not in the same physical space.

See how Apple School Manager and Jamf School transform classrooms.


WWDC 2023 Takeaways: The impact on health and wellness

Education

Author: June 23, 2023 by Adam Mahmud

Source: https://www.jamf.com/blog/wwdc-2023-health-and-wellness/

It’s been a couple of weeks since Apple’s World Wide Developer Conference (WWDC), and if you are still trying to catch up with the highlights, let us help you get up to speed.

WWDC Blog recaps:

While WWDC brings a number of exciting announcements for developers and users alike, impactful innovations in Apple’s longstanding mission to improve health and wellness were also visibly on display.

It’s been a few years since Tim Cook was first quoted saying Apple’s greatest contribution to humanity would be in health. And he has reaffirmed this belief over the years. If this emphasis wasn’t clear during the recent WWDC sessions, Apple’s press release brings it into view: Apple provides powerful insights into new areas of health.

“Our goal is to empower people to take charge of their own health journey. With these innovative new features, we’re expanding the comprehensive range of health and wellness tools that we offer our users across iPhone, iPad, and Apple Watch.” – Sumbul Desai, M.D., Apple’s Vice-President of Health

At Jamf, we are passionate about the way that technology empowers people to live a better life. And while there were a number of platform improvements for device management announced this year, the updates highlighted below are all personal features.

Whether your device is provided and managed by work or your own, all Apple devices share these user features, which if leveraged, can help you become a better version of yourself. Check out the details below!

Mental Health

It’s no surprise that mental health awareness is continuing to come into focus. Especially with what the world has faced over the last few years. After living through a global pandemic, people from all walks of life are more openly discussing and destigmatizing the need for mental health, which is long overdue.

While many have been harnessing the benefits of mental health services for years, others are exploring what’s available for the first time, often in a digital or app-based form. Mixed with the growing concerns about privacy, some look for these self-service ways to start their own mental health journey, but are left with fear and doubt. Luckily for them – and us all – Apple offered an exciting glimpse into what’s ahead with the fall operating system releases.

Assessments

As Apple shared in the press release, “a recent CDC article shows that nearly 30% of US adults have showed symptoms of anxiety or depression.” That is quite an impactful stat. Even more impactful is what Apple is doing about it. Apple users will now have simple, on-demand access to assessments in the Health app to survey for depression and anxiety, and determine if it’s time to get additional help. These are often the same surveys used in a clinical setting, but now available whenever is right for you.

Mindfulness

While the Mindfulness app is not new to watchOS, and it has long offered breathing and meditation exercises to help reduce stress, its functionalities are drastically expanded across the platform this year. New in Mindfulness on watchOS 10, users can now log “momentary emotions” and their overall mood. And this data will be available in the Health app to review insights about what may have contributed to their state of mind.

More on the Health app below… so keep reading.

Journal

Apple’s announcement of a Journal app for iOS 17 provides users with a whole new way to capture their thoughts and reflect on moments in their lives. With a new Journaling Suggestions API, a user can benefit from quick prompts from their digital life – say places or photos from a recent vacation – or a recent workout with friends. On-device machine learning allows this experience to be snappy for users, and entirely secure. Notifications can be configured to remind a user when it’s time to journal, helping this practice become a habit.

As cited in Apple’s release, “research shows that reflecting on one’s own mental state can help build emotional awareness and resilience; can reduce emotions like sadness and anger; and positively impact our body by slowing our heart rate.” While journal and diary apps are not at all new, it’s exciting to see how Apple is opening up a native way that integrates across devices and the platform overall.

Vision Health

The second health category highlighted at WWDC 2023 was vision. Apple has introduced two specific ways to help users to monitor and adjust behaviors that help prevent Myopia or nearsightedness.

Why Myopia you ask? It’s the leading contributor to vision impairment around the world. So what are the features of iOS 17, iPadOS 17 and watchOS 10 that help, and what are the behaviors to watch out for? Some may have felt like common sense to many parents for years but are now things able to be realized through monitoring and tracking. For example:

Monitor Screen Distance

It’s now possible for iPhone and iPad devices to help us hold them at the proper distance from our eyes. In iOS 17 and iPadOS 17, a user can be notified if they hold their device at a distance closer than 12 inches for an extended amount of time. Reading at a distance closer than this is a known risk factor for Myopia.

Track Daylight Exposure

New in watchOS 10, it’s now easy to monitor how much time we get outside. It’s recommended that children are exposed to sunlight for 80-120 minutes per day to help prevent Myopia, and the new ambient light sensor in Apple Watch allows for the data to be captured. As per the theme of this article, the data is available in, you guessed it, the Health app on iOS or iPadOS to interpret and track.

Physical Health & Wellness

Beyond the mental and vision health updates above, Apple introduced some other awesome updates that are worth a shout-out:

Medications

While the Medications feature of Health was added in a prior iOS version, the iOS 17 and now iPadOS 17 updates are super powerful. Users can configure a follow-up reminder to occur if they miss logging taking their medication. This can also be configured as a Critical Alert – so that the alert’s sound overrides the device’s mute switch. Something that was only previously reserved for specific app vendors with a special entitlement from Apple’s Worldwide Developer Relations team for their app. Now this is possible for something as simple, yet crucial, as taking medication.

Apple Fitness+

A host of new user enhancements are available in Apple’s subscription workout offering. These include “Custom Plans” that tailor workout and meditation sessions, “Stacks” so a user can more easily link their sessions together; and “AudioFocus” to more easily bring attention to the trainer’s voice or background music.

Putting it all together

Health App for iPad

The Health app has been hinted at as the hub which centrally controls readings throughout this blog. But for any active iPhone user, this isn’t any secret. Health is the way to deep dive into your workout data from the Fitness app, sleep data from your Apple Watch or other third-party app data that you have elected to share.

On its 9th birthday, Apple Health takes a step forward with the long-awaited introduction of iPad support. This new app launches as part of iPadOS 17, and will securely sync a user’s health app with watchOS and iOS devices via iCloud. While this on its surface is a big deal – now offering users the iPad’s larger screen real estate to interact with their health data and refreshed look for favorites, trends and insights – the future implications may be even larger.

HealthKit

HealthKit – Apple’s open-source framework for developers to build apps that work with Apple Health – also makes this same transition. With third-party developers now able to integrate their iPad apps directly with Apple’s secure health ecosystem, new use cases and capabilities emerge for iPad applications to participate in Apple’s secure health information data exchange. While first introduced in 2014 on iOS 8, the ecosystem of Apple’s open-source APIs expanded in 2015 with ResearchKit and in 2016 with CareKit, which allowed third-party developers to build rich, native iOS apps for clinical trials and surveys. Later, remote care at home modalities allowed data collected by patients to be seamlessly shared back to their provider and care team through HealthKit integrations.

Some of these apps have existed for years and integrate with their own proprietary peripheral devices to record a user’s information back into their app’s platform (ex. a wireless blood pressure monitor). That said, those app developers were not able to write that information into a user’s HealthKit store from iPad directly. With this change, users and developers have a whole new world to explore. Of course, in typical Apple fashion, this is all built with security and privacy in mind and only the user who can share which apps can share (and read) their Health data.

While there is a lot to unpack, we hope this article helps surface what is most important: How technology can help us be better versions of ourselves. While Jamf is a software provider that makes IT management and security solutions for Apple and therefore helps our customers succeed with Apple, our purpose is to ensure people are empowered with their technology. And I for one can’t wait to start testing out the new features on my own journey to be a better me.

To ensure your organization is best positioned to embrace the latest from Apple, contact us today.