Lock it down: The macOS security guide

“Malware is everywhere, and Macs are not immune,” Jonny Evans writes for Computerworld. “You can ignore the potential threat if you choose, but if you are an enterprise user holding confidential data, an educator in possession of private data, or even a Bitcoin collector who maybe clicked a few too many links on one of those dodgy faucet websites, you should know how to secure your Mac.”

“Before we get into some of the security technology inside your Mac (including a wide range of security improvements in High Sierra) it is important to point out that the biggest threat your computer faces is the person using it,” Evans writes. “Cyber attackers are highly sophisticated and can piece together lots of information about you or companies associated with you by simply getting a little more data a little at a time.

Evans writes, “Make it hard for those people by following simple tips…”

Read more in the full article here.

MacDailyNews Take: Evans provides plenty of excellent tips that will help to harden your Mac’s already robust security even further.

7 Comments

  1. I’d add to this useful article the following subject:

    • The #1 Rule of Computing and Security is to BACK UP YOUR DATA. If you don’t, you will wish you had.

    • Apple provides an integrated anti-malware system called XProtect. It’s not perfect and Apple takes a few days to catch up with latest malware. Professionals should add further protection.

    • These days, expect to be social engineered, aka scammed, at every turn on the Internet. Be wary and aware.

    • Browser cookie control add-ons and apps are an excellent first defense against being tracked over the net. SweetP Productions offers the two best apps. I use their ‘Cookie’ app.

    • IMHO the must-have browser add-on to improve security is uBlock Origin (versus ordinary uBlock).

    My fave anti-malware apps are MalwareBytes, Intego VirusBarrier and ClamXav.

    1. A big rule: NEVER click links you cannot easily verify, especially those received via email, but many other sources can be spoofed. Instead, go to the main website yourself by typing in the address. This is a big component in social engineering hacks.

  2. I got my Mac just as the “Macs are invulnerable to malware” stage was ending. At that point, it was mostly true that you didn’t need anti-malware or to be cautious about which files to open. With every passing year, more malware was created for the Mac. And yet, here I am getting to switch to Linux – though not for security.

Reader Feedback

This site uses Akismet to reduce spam. Learn how your comment data is processed.