{"id":10490,"date":"2017-11-15T06:30:07","date_gmt":"2017-11-15T14:30:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/11\/15\/news-4262\/"},"modified":"2017-11-15T06:30:07","modified_gmt":"2017-11-15T14:30:07","slug":"news-4262","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/11\/15\/news-4262\/","title":{"rendered":"Lock it down: The macOS security guide"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/11\/best_buy_best_sellers_no_5_apple_macbook_pro_13-100741584-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Wed, 15 Nov 2017 06:11:00 -0800<\/strong><\/p>\n<p>Apple\u2019s systems are highly secure, but if your private or enterprise data matters to you it\u2019s essential to ensure your Mac is as highly secured as possible. This quick guide should help you do just that.<\/p>\n<p>Malware is everywhere and Macs are not immune. You can ignore the potential threat if you choose, but if you are an enterprise user holding confidential data, an educator in possession of private data, or even a Bitcoin collector who maybe clicked a few too many links on one of those dodgy faucet websites, you should know to get your Mac secured.<\/p>\n<p>Before we get into some of the security technology inside your Mac (including a wide range of security improvements in <a href=\"https:\/\/www.intego.com\/mac-security-blog\/macos-high-sierra-security-and-privacy-features-overview\/\" rel=\"nofollow\">High Sierra<\/a>) it is also important to point out that the biggest threat your computer faces is the person using it. Cyberattackers are highly sophisticated and can piece together lots of information about you, or companies associated with you by simply getting a little more data a little at a time. Make it hard for those people by following simple tips, including:<\/p>\n<p>The jury <a href=\"http:\/\/www.techadvisor.co.uk\/how-to\/security\/do-macs-get-viruses-3418367\/\">remains out on virus checkers<\/a>.<\/p>\n<p>Many Mac users believe it slows Mac performance \u2013 but so too does unwanted adware, Potentially Unwanted Programs (PUPs) and malware if it lurks on your Mac.<\/p>\n<p>I choose to scan my system regularly as I send and receive digital assets from lots of sources, and also believe that I have a responsibility to ensure I don\u2019t inadvertently transmit Windows malware to others from my Mac.<\/p>\n<p>Numerous applications are available. <a href=\"https:\/\/www.avg.com\/en-gb\/all-products?utm_source=CJ&amp;utm_medium=CPA&amp;utm_campaign=3641069\" rel=\"nofollow\">AVG for Mac<\/a> is <a href=\"https:\/\/www.macworld.co.uk\/feature\/mac-software\/best-mac-antivirus-2017-3637103\/\"><em>Macworld UK\u2019s<\/em><\/a> most highly-recommended (free version available) anti-virus package,\u00a0<a href=\"https:\/\/www.malwarebytes.com\/mac\/\" rel=\"nofollow\">Malwarebytes for Mac<\/a> is also popular. \u00a0There are several paid solutions available.<\/p>\n<p>Let\u2019s move on to look at some of the other security protection solutions in place on your Mac. (You\u2019ll find that you need to unlock System Preferences by tapping the padlock icon and entering your password to make changes in many of the following cases).<\/p>\n<p>Your Mac\u2019s built-in Firewall should be enabled by default. Check that it is in <em>System Preferences&gt;Security &amp; Privacy<\/em> where you choose the Firewall Tab. Choose Turn on Firewall and it will be enabled. Tap Firewall Options and you can choose which apps can receive inbound connections, and even enable a Stealth Mode which will make your Mac less visible on public networks by preventing it responding to probing network requests (such as Ping requests) that may reveal its existence.<\/p>\n<p>I\u2019m certain you already use a strong password to secure your Mac, but you can choose how strongly password protection is applied in System Preferences&gt;Security &amp; Privacy. Here you can set how long your Mac is left unattended before a password is required, (immediately after sleep is the best protection if working in a shared environment).<\/p>\n<p>The<em> Privacy<\/em> pane in <em>Security &amp; Privacy Preferences<\/em> controls numerous items. You can choose which apps (if any) you allow to use Location Services, or disable them entirely. You can also control which apps are given access to other data on your Mac: Contacts, Calendars; Reminders, Photos, Twitter, Facebook, Accessibility and Analytics.<\/p>\n<p>You will also need to vet the security settings of your browser. The Safari browser in High Sierra has a selection of privacy focused improvements. \u00a0Open <em>Safari&gt;Preferences&gt;Privacy<\/em> to see the following:<\/p>\n<p>You should also open the <em>Security<\/em> pane in <em>Safari Preferences<\/em>. Here you can ensure you receive warnings when you visit a fraudulent site, disable JavasScript and block popup windows.<\/p>\n<p><em>System Preferences&gt;Sharing<\/em> lets you choose to share services \u2013 files, printers, Bluetooth and more &#8211; from your Mac. I tend to keep all of these off by default but you may find that some apps ask you to switch a service on (for perfectly legitimate reasons). When you finish using an app that is using Sharing tools you should manually look inside these settings to make sure they are disabled again afterwards.<\/p>\n<p>Most enterprise security guidelines encourage you to strictly police the apps installed on your Mac if your computer carries confidential information, for example, company files, enterprise secrets, patient data or student reports. Apple agrees, and that is why the company has made it much harder to install apps from sources other than the App Store.<\/p>\n<p>You control App download behaviour in the <em>General Pane<\/em> of <em>Security &amp; Privacy Preferences<\/em>.<\/p>\n<p>Here you can allow apps downloaded only from the App Store, or only from the App Store and identified developers. In most enterprise set-ups you\u2019ll choose the second, if only so you can install trusted but limited distribution apps made by the company.<\/p>\n<p>Apple\u2019s FileVault encryption is a powerful tool with which to prevent your data being abused even if your system is compromised.<\/p>\n<p>FileVault is available in <em>Security &amp; Privacy System Preferences.<\/em> When enabled it encrypts the contents of your Mac automatically and you will need to use your login password or a recovery key to access your data. The downside? If you can\u2019t remember either of those passcodes you will<em> lose access to your data<\/em>.<\/p>\n<p>Apple\u2019s Find My iPhone feature will also help you find your Mac if it is lost. You can enable this in <em>System Preferences&gt;iCloud<\/em> where you should ensure Find My Mac is checked to on (and that you are logged in using your Apple ID).<\/p>\n<p>If your Mac is lost you may then be able to find it by visiting <a href=\"http:\/\/www.icloud.com\" rel=\"nofollow\">www.icloud.com<\/a> using a web browser, logging in using your Apple ID, and finding the device in the Find My iPhone web application there.<\/p>\n<p>You can also set a firmware password. This makes it impossible to start your Mac up from an external bootable volume unless you enter a password.<\/p>\n<p>You\u2019ll probably find most enterprise Macs have this feature enabled by your tech support team \u2013 but you must be very careful when you choose to enable it yourself.<\/p>\n<p>Why? If you forget your firmware password the only way to regain control of your Mac will be a visit to an Apple Service Provider or Apple retail store.<\/p>\n<p>You enable a firmware password by starting your Mac up into Recovery Mode (hold down <em>Command-R<\/em> during start-up), and selecting <em>Firmware Password Utility<\/em> from the Utilities menu that appears at the top of the Recovery Mode screen.<\/p>\n<p>Good luck:<\/p>\n<p>Armed with this selection of tips your Mac should be as strong and stable as it can be for most ordinary use. You may also find a few more ideas to improve your Mac security <a href=\"https:\/\/www.computerworld.com\/article\/3008908\/apple-mac\/11-privacy-and-security-tips-for-os-x-mac-users.html\">in this earlier article<\/a>. <em>Do you have any good suggestions to help secure your Mac? Let me know via social media below.<\/em><\/p>\n<p><strong>Google+?<\/strong>\u00a0If you use social media and happen to be a Google+ user, why not\u00a0join\u00a0<a href=\"https:\/\/plus.google.com\/u\/0\/communities\/102592251674546201152\" rel=\"nofollow\">AppleHolic&#8217;s Kool Aid Corner community<\/a>\u00a0and get involved with the conversation as we pursue the spirit of the New Model Apple?<\/p>\n<p><strong>Got a story? Please\u00a0<\/strong><a href=\"https:\/\/twitter.com\/jonnyevans_cw\" rel=\"nofollow\">drop me a line via Twitter<\/a>\u00a0and let me know. I&#8217;d like it if you chose to follow me there so I can let you know about new articles I publish and reports I find.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3237187\/apple-mac\/lock-it-down-the-macos-security-guide.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/11\/best_buy_best_sellers_no_5_apple_macbook_pro_13-100741584-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Wed, 15 Nov 2017 06:11:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Apple\u2019s systems are highly secure, but if your private or enterprise data matters to you it\u2019s essential to ensure your Mac is as highly secured as possible. This quick guide should help you do just that.<\/p>\n<h2><strong>Keep it zippy<\/strong><\/h2>\n<p>Malware is everywhere and Macs are not immune. You can ignore the potential threat if you choose, but if you are an enterprise user holding confidential data, an educator in possession of private data, or even a Bitcoin collector who maybe clicked a few too many links on one of those dodgy faucet websites, you should know to get your Mac secured.<\/p>\n<h2><strong>Common sense first<\/strong><\/h2>\n<p>Before we get into some of the security technology inside your Mac (including a wide range of security improvements in <a href=\"https:\/\/www.intego.com\/mac-security-blog\/macos-high-sierra-security-and-privacy-features-overview\/\" rel=\"nofollow\">High Sierra<\/a>) it is also important to point out that the biggest threat your computer faces is the person using it. Cyberattackers are highly sophisticated and can piece together lots of information about you, or companies associated with you by simply getting a little more data a little at a time. Make it hard for those people by following simple tips, including:<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3237187\/apple-mac\/lock-it-down-the-macos-security-guide.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11078,6606,714],"class_list":["post-10490","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple-mac","tag-computer-hardware","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10490","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10490"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10490\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10490"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10490"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}