An Apple a Day Keeps the FBI Away

appleRemember those annoying essays you had to write in high school and college English classes, the ones that ask you to take a position on some seismic cultural issue like capital punishment, abortion, or lip-synching? Well, maybe the first two. The news these days suggests that history is writing another of those epic essays, and the topic is one you can appreciate as an IT Professional. The question is, should Apple crack the phone to mine the data that might connect the killing dots.

We’re with the Government. We’re Here to Hack.

The quandary is clear and clearly complex. The angel on your right should says that data could help us track down the bad guys. The angel on your left side points out, though, that once you let the lions in the gate, they’re always there, in the background, quietly growling. Purring, they call it. If you see both sides of that equation, welcome to the human race. If there is a compromise, it seems unlikely to reside anywhere near the middle of the security spectrum, if that spot even exists.

Last Stand at the Fruit Stand?

Cybersecurity seldom offers such a ripe opportunity for reflection and for looking way out over the hood. No matter Apple’s decision or direction, the security world is watching and ICS can help your organization navigate what might be turbulent times ahead. So while you wax philosophically about which angel is sitting on the right shoulder, call ICS and let’s keep the main thing the main thing.