Many of our visitors, in addition to looking for solutions to bugs on our blog, may have a Mac device. That is why in this article we will give you some tips to know what applications we can install to have a totally safe Mac operating system .
Rumors have long been left behind that Mac devices could not be infected with viruses or malware. This is a falsehood, and there are many programs whose sole function is to infect these computers, although it is true that there is not as much volume as in Windows.
The firewall is vital
As in most operating systems, enabling the firewall is a necessary step to protect the computer, on Mac you can do it by going to: System preferences>Security and Privacy and check that it is active.
With this we will ensure that the connections of both the browser and the email ports are filtered and are secure.
What is FileVault?
FileVault is a military encryption system, yes yes, military. Apple made this option available to its users since they have in the focus of their business model, that the information and data of their customers must be only available to them, and security is important. It’s one of his insignia.
To activate FileVault we must go to System preferences>Security and Privacy and check the corresponding box.
This will activate the automatic encryption of the content of your computer, your hard drive.
We recommend you access the following link if you are interested learn more about encryption capabilities from your Mac.
Antivirus is your great ally
Although Macs are less exposed systems than Windows, it is highly recommended to install an antivirus and keep it updated.
Of course, it must come from an official and verified source, and keeping the virus definition library up to date is essential for it to function properly. There are many options, but the following is reviewed by many users. It is a comprehensive comparison of current antivirus for Mac and its functions and costs.
Having an antivirus with active shields is vital to protect your computer regardless of the operating system.
Increase security in the browser
Mac operating systems, by default have a native browser called Safari incorporated. It is a solid browser optimized for these computers, a good competitor against Google Chrome.
To improve the privacy of Safari, please refer to preferences>Privacy>Website tracking and click on the boxes that appear on “prevent cross-site tracking” and “ask websites not to track me”
If you have an iphone or ipad, you can see these options in the section of settings-> privacy
With these options we ensure that the portals do not store sensitive data from our browser profiles. These data are often used for remarketing or covert advertising.
Is it possible to increase security in addition to the above measures?
If we want to take our privacy to another level, we can also use an anonymous connection or VPN every time we connect to the internet.
A VPN is a connection established with a provider between your computer and browsing. These services are usually paid, although there are many applications like Hipe my Ip that allow you to browse anonymously.
What to do if everything fails or there is a fatal error?
It may be the case that you launch a suspicious application or that your computer becomes infected in some way despite taking all these measures. That is why we also advise you to make regular backup copies of all your files.
In addition, on Macs, there is a backup encryption option, an extra protection with which to be fully prepared for the worst possible scenarios.
You can enable it in: Encrypt backups>System preferences>Time machine
Other useful tips
As in most cases, it is vital to have an updated version of your Mac’s kernel. Apple continually releases patches and updates that in addition to improving performance, ensure breaches in the system for potential attackers or malware.
You can keep your equipment and applications updated from the section App Store>Upgrades from the My applications section.
What is the keychain?
All iCloud accounts have a keychain, it is a system that encrypts each of the passwords stored on the computer, with the sole intention of facilitating the management of accounts between online services.
You can make sure you have the password keychain active by going to System preferences>iCloud>Keychains and checking that there are records within the keychain.
You can also access here to know how to view the passwords saved on the keychain.
Grant access only to people you trust
It is interesting to point out that on many occasions, vulnerabilities come from unsafe activities of people in our immediate environment.
That is why you should avoid giving your administrator credentials to friends or family at all costs. If you want to provide them with access to your computer, it is convenient that you create an independent user profile for them.
You can manage all the current accounts of your team from System preferences>Security and Privacy>Privacy
Safe and legal downloads
The ideal way to download an application on Mac is to do it from your own app Marketplace. It is true that we are often tempted to look for alternatives, but believe me when I say that having a reliable and secure source of your applications is worth it.
Keep in mind that many tools that you use on Mac devices have access to your photos, calendar events, email content, etc. And that, installing one that does not have a certified provider, will make you expose your information to complete strangers.
You can also check related information about how to remove Mac applications that you don’t use.
Unauthorized access, exposure of sensitive data and password vulnerability is not something that only happens in movies. These are events that happen with increasing frequency unfortunately.
Keep in mind that our IT equipment is a professional and personal tool, and that it surely has more sensitive information than you think and that its exposure can do a lot of harm.
As an example of this, there are malicious software that are even capable of encrypting your hard drive and requesting a ransom to be paid in bitcoins at anonymous addresses. And this is just one example of what attackers are capable of doing by exploiting security breaches.
From our iOS blog, we know that a great challenge for low or medium level users is to keep their computers safe and their information protected.