The Practical Guide to Mac Security

PODCAST · technology

The Practical Guide to Mac Security

The Practical Guide to Mac Security is a video podcast with tutorials and explanations that will enable the typical home and office Mac user to secure their Mac from dangers like malware, online account break-ins, data loss, and online scams.

  1. 25

    25. Selling Your Mac

    Before you sell or give away your Mac, you should log out of all of your accounts, wipe the hard drive and re-install the original operating system that came with your Mac. You can do this by booting in a special Internet Recovery mode.

  2. 24

    24. Private Browsing

    The Private Window feature in Safari is handy, but perhaps not for the reasons you think. It does not really provide any security or hide your browsing activity from your ISP or work IT department.

  3. 23

    23. WiFi Passwords

    You may not think it is important to set a Wi-Fi password in your home. But without one, the data being sent from your Mac and other devices may by unencrypted and easy for someone to snoop. You should set a password and also be wary of public Wi-Fi that does not require a password.

  4. 22

    22. Suspicious Sharing

    Old-fashioned file sharing can still be useful at home or work, but it opens up a security vulnerability if you connect to a public network.

  5. 21

    21. Find My Mac

    If your Mac is stolen you may be able to track it if you have enabled the Find My Mac feature. This will also let you remotely wipe your Mac in some cases.

  6. 20

    20. Using a UPS

    A simply battery system can protect your Mac from short power outages and let you gracefully shut down your Mac in the case of longer ones. A UPS can also be used on your Wi-Fi system to prolong your Internet connection in case of a power failure.

  7. 19

    19. Online Backups

    Local backups are easy and provide a lot of protection, but online backups provide off-site backups which will protect you in case both your Mac and local backup are destroyed or stolen. They are also handy for users who travel often.

  8. 18

    18. FileVault

    MacBook users should consider using macOS’s built-in encryption. This prevents someone from stealing your Mac and accessing your data. Without FileVault, it is possible from someone to get to your data even if they can’t log on to your Mac.

  9. 17

    17. Storing Files in the Cloud

    If you use cloud storage, such as iCloud Drive or Dropbox, then you have a certain amount of protection since the files live on remove servers. This can make recovering from a physical disaster or theft very easy.

  10. 16

    16. Time Machine Backups

    Great overall security protection is provided simply by backing up. In addition, this protects you from physical disasters, theft, or simply your own mistakes. Every Mac user should get an inexpensive backup drive and start using Mac’s built-in backup system.

  11. 15

    15. Social Engineering Scams

    The web is teeming with scams. Classified sites and shopping sites, while legitimate, may harbor malicious threats in the form of common cons and scams.

  12. 14
  13. 13

    13. Web Scams and Phone Calls

    Other scams will use fake web ads and unsolicited phone calls to try to gain access to your Mac or online accounts. Learn how to recognize and avoid these scams.

  14. 12

    12. Phishing Scams

    Just because an email looks like it comes from a service you use, doesn’t mean that it is from that service. It is easy for email to be faked in order to get you to hand over your passwords and other personal information. Find out how to protect yourself from this very common scam security weak point.

  15. 11

    11. Secure Connections with VPN

    If you are connecting to Wi-Fi away from home or work you should be using a VPN. This keeps your online transactions safe and secure from compromised Wi-Fi systems and on-the-air snooping.

  16. 10

    10. Mac User Accounts

    Each person using a Mac should be logged into their own account. Doing so will protect you from security issues and make your Mac experience better. Anyone else you let use your Mac should be using a Guest account.

  17. 9

    9. Using Gatekeeper

    macOS will try to stop you from downloading and installing software that is not from the Mac App Store or has not been signed by registered developers. Learn how this protects you and how to get around the protection if you need to.

  18. 8

    8. Three Simple Rules

    To keep your Mac free of malware you need to follow three simple rules: Don’t download software from sites you don’t trust, keep your Mac up-to-date, and stay informed. Find out how to follow these three rules and stick to them.

  19. 7

    7. Do You Need Anti-Virus Software?

    Experts and non-experts disagree on whether you need to buy anti-virus software for your Mac. But macOS already contains anti-virus protection that operates quietly and without any settings or controls. Often third-party “anti-virus” software is just a waste of money that causes more problems and should be avoided.

  20. 6

    6. What To Do If Your Accounts Have Been Compromised

    If you fail to use strong passwords and two-factor authentication and your accounts are hacked, find out what you should do first. It is important to act quickly to avoid more damage and identity theft.

  21. 5

    5. Security Questions

    If you are asked to enter answers to security questions for a website or service, you should avoid using real answers as they can be easily guessed. Instead, use random passwords which will prevent your account from being compromised.

  22. 4

    4. Password Management

    Using strong passwords doesn’t require much extra effort if you use a password manager, such as the one built into Apple products. Or, you could use a third-party password manager.

  23. 3

    3. Using Two-Factor Authentication

    When available you should also use two-factor authentication. When you log into a site you not only need to enter your password, but also a code received on another device or via text message. This is important for securing your most important online accounts like email, iCloud and more.

  24. 2

    2. Improving Your Passwords

    The weakest point in most peoples’ security is their passwords. Almost all security failures are simply a matter of weak passwords. Learn what a weak password is and how to create a strong password. Strong passwords should be computer-generated random passwords. You should only ever use a password once.

  25. 1

    1. Introduction

    An introduction to the podcast. Find out what you will learn.

Type above to search every episode's transcript for a word or phrase. Matches are scoped to this podcast.

Searching…

No matches for "" in this podcast's transcripts.

Showing of matches

No topics indexed yet for this podcast.

Loading reviews...

ABOUT THIS SHOW

The Practical Guide to Mac Security is a video podcast with tutorials and explanations that will enable the typical home and office Mac user to secure their Mac from dangers like malware, online account break-ins, data loss, and online scams.

HOSTED BY

MacMost

URL copied to clipboard!