Your Guide to Enhancing Macbook’s Security

Alice Bonasio
Nov 18, 2020 · 4 min read
Image for post
Image for post
Your Guide to Enhancing Macbook’s Security

The variety of cybersecurity threats makes it difficult to predict when you may become the next target on someone’s list. Hackers may target people who do not even have particularly sensitive information on their computers.

Macbooks are known for their reliability, and there are articles online about how Macs are not so prone to attract potential malware or viruses. Thus, these users fail to take the necessary measures to secure their computers.

You should have a proper cybersecurity strategy prepared. Otherwise, you may encounter a number of problems, including poor Macbook performance or personal data exposure. Take these steps to give yourself peace of mind.

Step #1 — Create Data Backups

It is better to be safe than sorry, and in the event that something does happen to the computer, why not take some time and create data backups? Get yourself an external hard drive and sync the files with Time Machine. Or, as an alternative, if you do not have that much data, you can transfer it to iCloud or Dropbox. Cloud services are free with an option to pay a monthly fee for extra storage, but the most important thing is how safe they are as a location to keep your files on.

Step #2 — Get Reliable Antivirus Software

Do not rely on default antivirus software to protect you. Some users found that their default antiviruses caused more harm than good, and since there are so many good options available, why not spend some time and find the best antivirus you can find?

Get in touch with your tech-savvy friends and ask for recommendations. If you do not have any friends like that, look for suggestions online. There is a plethora of articles and videos that will give you in-depth information on choosing reliable antivirus software. Not to mention that you will have opportunities to educate yourself about cybersecurity while researching the subject.

Step #3 — Limit Physical Access to Your Macbook

Physical access is not an issue if you live alone and do not take the Macbook together with you. However, if there are other people who may use your computer or use it regularly, making some adjustments would be beneficial.

For starters, create a non-admin account for other users, so others do not have access to specific system files. Disabling the auto-login feature is recommended because people would not have access to the main account after restarting the computer.

Step #4 — Change Passwords Regularly

A regular password change is a good piece of advice. It will also help if you stick to using more complicated passwords, such as those that an online generator can create for you. Memorizing random passwords can be difficult, but you have the option to write it on a piece of paper until you can remember.

Finally, avoid using the same password for different accounts. If someone gets your password from a random profile online, they will have access to emails, social media, and other important accounts.

Step #5 — Use Ad Blockers

The internet is full of malware-infected websites. And more often than not, it is a random pop-up or another type of advertisement that redirects you to such landing pages. The simplest solution is to get yourself an ad blocker.

Even if you are aware of potential dangers that random ads on the internet pose, you cannot guarantee that someone else who uses the computer has the same experience.

Step #6 — Install System Updates

The lack of macOS updates could lead to unexpected system exposure. While people associate updates with new features or stability and performance improvements, they do not consider what it does for the overall computer security.

The developers have to react to new threats and patch the system holes before it gets too late. There are instances when even reliable antivirus software fails to protect the Macbook if the OS fails to ensure certain areas of the computer’s safety.

Step #7 — Avoid Shady URLs

Shady URLs that you receive from others or encounter online yourself should be avoided. For example, if your friend sends you a link to a funny video, but the URL does not look trustworthy, you are better off ignoring it.

Take a similar approach when looking for information or files to download yourself. If you need a PDF or an MP3 file, but cannot find it on legal sources, do not click on the first link on Google.

Step #8 — Browse via VPNs

Virtual private networks can be a life-saver when you have to surf the net on public access, such as at cafes, hotels, or libraries. Public internet access creates a perfect place for hackers to attack unsuspecting people.

Meanwhile, those who use a VPN can enjoy browsing the web without worries about third parties tracing their steps. Virtual private networks encrypt data and change your IP address, making it hard to track your location and access the device you use for the internet.

Alice Bonasio

Written by

Technology writer for FastCo, Quartz, The Next Web, Ars Technica, Wired + more. Consultant specializing in VR #MixedReality and Strategic Communications

Tech Trends

Showcase for the latest disruptive technology that is changing the education landscape globally

Alice Bonasio

Written by

Technology writer for FastCo, Quartz, The Next Web, Ars Technica, Wired + more. Consultant specializing in VR #MixedReality and Strategic Communications

Tech Trends

Showcase for the latest disruptive technology that is changing the education landscape globally

Medium is an open platform where 170 million readers come to find insightful and dynamic thinking. Here, expert and undiscovered voices alike dive into the heart of any topic and bring new ideas to the surface. Learn more

Follow the writers, publications, and topics that matter to you, and you’ll see them on your homepage and in your inbox. Explore

If you have a story to tell, knowledge to share, or a perspective to offer — welcome home. It’s easy and free to post your thinking on any topic. Write on Medium

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store