@Tarah
For a small nonprofit, I would prefer Intel MacBook or iMac hardware capable of running Ubuntu 22.04 LTS rather than a newer Apple-silicon Mac that depends on vendor-specific macOS security tooling.
I would also avoid deploying EDR by default. Instead, I would focus on teaching users and administrators how threats actually appear at the operating-system level: files, processes, permissions, logs, startup entries, network connections, and package changes.
@meadxmoon
Sure, this isn’t the 80s or 90s anymore, when most CPU power served useful tasks, tools, or gaming fun. Today, corporations have disempowered users, pushed online storage and tracking-first design, then repeat the surveillance industry’s sales pitch about purchasable “security." and "do not trust anybody and yourself/copy&paste". All big BS - and more big BS.
The only real defense against idiocy and empty slogans is: education, education, education, ...
@Tarah
There is no such thing as a “decent” EDR.
It is often sold through fear. The pitch is usually not education, autonomy, or user competence.
A good security culture teaches people how to recognize risk:
- What suspicious files look like
- How phishing works
- Why permissions matter
- How software gets persistence
- What normal system behavior looks like
- How to check processes, logs, services, startup items, and network activity
- When to stop, ask, and verify
@Tarah Sounds like some vendors are reproducing a version of the reason Microsoft skipped Windows 9. “It’s an A-series processor? Must be a phone!”
The chip really is the same series in all the ways which matter. The A18 and the M4 use the same core designs, the M4 just has more RAM channels and potentially some extra ASICs for stuff like media codecs.