Apple Certifications

Is Your IT Team Certified?

Certifications are available for most Apple technologies and skill levels from business workers to IT professionals, developers, technology trainers, and system architects.

Performance Under Pressure

Is Your Jamf Pro Server Ready?

Has your Jamf Pro server gone though many different Jamf Pro Administrators? Do you have a complete understanding of exactly how your Jamf Pro sever is configured? Let HCS preform a health check on your Jamf Pro Server.

Essential Utilities for Apple IT Administrators

Managing Apple technology in an enterprise or educational environment requires the right tools to ensure efficiency, security, and seamless user experiences. Our suite of IT utilities is designed to simplify device deployment, streamline management, and enhance security for macOS and iOS devices.

Establish your first Mac deployment

HCS Technology Group will help you implement a proof of concept (POC) efficiently and aligned with best practices for easily deploying Mac in your organization.

One of the ways companies protect critical account information is by remembering the devices you use to log in as “trusted devices” or “authorized devices.” Those logins will usually have been protected by two-factor authentication or another mechanism that guarantees the device is being used by you, its owner. Subsequent logins from those devices may be more convenient for you due to requiring only a username and password, and trusted devices may automatically receive two-factor authentication codes. That’s how Apple ensures you are who you say you are when you log in to your Apple ID on a previously unseen device.

Although trusted devices can help increase your security, they can also reduce it. If an attacker were to gain access to one of your trusted devices, they would have a better chance of breaking into your accounts or masquerading as you when setting up new accounts. As a result, it’s important to audit your trusted devices occasionally and make sure you still control all of them. The first time you do this, you may be shocked to see that a Mac you last used years ago could still be receiving Apple ID verification codes. Removing unused trusted devices from an account makes it more secure with no downside.

We can’t provide a comprehensive list of services that track trusted devices, but many of you use two high-profile ones: Apple and Google. In addition, most password managers with online accounts also rely on trusted devices—we’ll look at 1Password here, but if you use another password manager, look through its settings to see if it maintains a list of trusted devices.

Remove Trusted Apple Devices

Apple gives you access to the list of all your current Apple devices in System Settings > Your Name on the Mac and in Settings > Your Name on the iPhone and iPad. (You can also log in to appleid.apple.com, click Sign-in and Security in the sidebar, and click Account Security.) Some of the devices shown may not be trusted devices—there isn’t much to worry about with a HomePod, and some old Macs may not be logged in. Click or tap any device to learn more about it—the 27-inch iMac in the screenshot below is trusted and can receive Apple ID verification codes.

Unfortunately, Apple doesn’t display the date the device was last used, which can help identify ancient devices. So look for any devices that you don’t immediately recognize as being in use—particularly Macs, iPhones, and iPads—and remove them from your account. Don’t worry about inadvertently removing a device you do use—at worst, you’ll have to log in to your Apple ID again the next time you use it.

Remove Trusted Google Devices

You can quickly load Google’s list of trusted devices by logging in to your Google account at myaccount.google.com/device-activity. To navigate there manually, go to your Google Account at myaccount.google.com, click Security in the sidebar, scroll down to find the Your Devices tile, and click Manage All Devices. Google says it keeps track of sessions (whenever you sign in) on trusted devices for only 28 days, but the sessions shown on “unknown device(s)” below are far older than that. Google helps by displaying the location and date of most sessions.

Click a session to learn more about it, including the date you first signed in on that device. For devices you no longer use, click Sign Out to remove access to your Google Account.

Remove Trusted 1Password Devices

To remove old trusted devices from 1Password, start by logging in to 1Password.com, clicking your name at the top right, and choosing My Profile—you can also navigate directly to my.1password.com/profile. As you can see, 1Password provides information about each trusted device and browser, showing its IP address, location, operating system version, and last access time.

It’s easiest to click Deauthorize Inactive Devices, at which point 1Password will ask if you want to deauthorize all devices that haven’t been used in the last 60 days. If you prefer a more targeted approach, click the gear next to a device or browser you want to remove and click Deauthorize Device in the dialog that appears.

Again, the only harm that could come from deauthorizing a device you still use is that you will have to log in to 1Password again.

After you’ve audited your Apple, Google, and password-manager trusted devices—and any other accounts you may have that maintain such lists—there’s no need to check again right away. Once a month or once a quarter would be sufficient for most people.

That said, if you ever notice any unusual account activity, look at your trusted device lists to ensure you recognize everything. If there’s a device you don’t recognize or one that was used at an unfamiliar place or at a time when you were otherwise occupied, immediately remove it and change that service’s password.

(Featured image by iStock.com/Ildo Frazao)

Social Media: We all accumulate “trusted devices” in our Apple, Google, and password manager accounts, but it’s important to remove devices you no longer use because they could be security risks.

Trusted by organizations worldwide
Bose
The American Red Cross
PepsiCo
Apple Computer
Barnes & Noble
Cigna
Morgan Stanley
Company

HCS Technology Group

Over 35 years of experience helping you achieve your service objectives with Apple devices and technology.

Innovative IT Solutions

Our capabilities and solutions include:

Strategy and Analytics
Technology Architecture
Engineering Services
Pre-emptive Maintenance
Break/Fix Support
Education
Large-Scale Deployments
Hosting
Managed Services

Partners

Mosyle

Mosyle

With Mosyle’s MSP program, HCS Tech Group offers MDM-related services to customers so HCS Tech Group can manage your endpoints and ensure your Apple devices are running smoothly. This will facilitate learning and how technology is used in your business, as well as lower your operational expenditure and time.

Jamf

Jamf

As a managed service provider, HCS Tech Group offers strategic value to a subset of the market by identifying, securing and managing your Jamf Pro needs. A partnership with Jamf means bridging the gap between us as a method to help even more organizations succeed with Apple.

Jamf Service Provider3 d61da94b

To help ensure customer success, all sales of Jamf Pro include new customer onboarding services. We understand organizations have different needs and experience. Therefore, we offer a variety of onboarding services with multiple delivery methods and levels of training. Jamf will work with you to determine which option is the most efficient and effective for you and your organization:

  • Our full-service, personalized onboarding offerings are delivered by a Jamf Pro expert at your location.
  • Jamf remote onboarding services provide personalized sessions by a Jamf Pro expert utilizing remote connection tools.
  • For qualified customers in the US and APAC, a self-directed, no-cost onboarding option is also available.

During the personalized Jamf onboarding sessions, a Jamf Pro expert works with you to configure and integrate Jamf Pro seamlessly into your existing environment. Through a hands-on approach, the trainer will familiarize you with Jamf Pro features and configurations, provide workflow recommendations, review support resources available, and introduce you to additional training and certification options. Jamf’s self-directed onboarding is provided through a series of pre-recorded training sessions, combined with interactive tutorials and support staff to assist if needed.

Services

IT Solutions For All Your Needs

Handling every aspect of your computer network, from needs assessment and planning to installation, administration and training.

Business

Whether your business system consists of a single workstation or a comprehensive, high-speed, multi-station network with servers, HCS can help.

Learn More
Business

Education

HCS Technology Group provides Apple Professional Services for educational institution for K -12 As well as higher education.

Learn More
Education

Consumer

We can help you move forward in the home as new technology emerges and will benefit you by bringing you increased productivity, efficiency, creativity, and fun.

Learn More
Consumer

Mobility

If you are considering the deployment of a large number of iPad, iPhone and/or iPod Touch devices, you want to work with experienced Mobile Technical Coordinators like those found at HCS Technology Group.

Learn More
Mobility
Support

Latest Technical Articles

Whether you are experienced or new to the Mac, our technical articles offers insightful solutions for your needs.

Offboard a Mac Computer Using Jamf Pro and Apple Business Manager

This guide outlines the steps to properly offboard a Mac computer from Jamf Pro when an...

Read More

How to Configure Jamf Pro SMTP with Google Authentication

Configure Jamf Pro to use Google Authentication for SMTP enhances security, ensures compliance,...

Read More

How to Configure Jamf Pro SMTP to Use the Microsoft Graph API

Configuring Jamf Pro to use the Microsoft Graph API for SMTP enhances security, ensures...

Read More

Retrieve AppleCare Expiration for Mac Computers Using Jamf Pro

This guide provides a practical solution by demonstrating how to utilize Jamf Pro’s API roles,...

Read More

Speak with an Apple Certified expert today

We’d love to discuss your business challenges, even if you’re not sure what your next step is. No pitch, no strings attached.

Let's Talk