Secure your Mac computer in 6 easy ways

Nov 15, 2018 8:37:04 AM / by Frontline, LLC posted in macos, cyber security

0 Comments

If you’re a Mac user, data privacy and security should be your #1 priority. Without the right security measures, you’re inviting cybercriminals to steal your critical data. Are you willing to take the risk? Secure your computer and fortify your defenses with these six tips. 

The basics
First, let’s start with the basics and head over to the Security & Privacy pane in System Preferences. Here, you’ll find the General, FileVault, Firewall, and Privacy tabs, which control various aspects of security. To change your security settings, click on the padlock icon on the bottom of the screen and type in your username and password.

Firewall
Enabling the firewall will block unwanted incoming network connections. All you need to do is click Firewall in the System Preferences > Security & Privacy pane, click the padlock icon on the bottom left, enter your username and password, and click Turn On Firewall. Don’t forget to enable Stealth Mode by clicking Firewall Options then clicking Enable Stealth Mode in the dialog box — this makes your computer invisible on public networks.

Passwords
Make sure to set strong passwords for your user accounts if haven’t already. To do this, go back to the General section of the Security & Privacy settings. In this section, you should also consider setting the Require Password field to “immediately.” This will require you to re-enter your login credentials to unlock your Mac when it goes to sleep mode or when a screensaver is on.

Automatic login
It’s best to disable this function, especially if you are using a mobile Mac. If your Mac gets stolen, you don’t want to give thieves a free pass to your private data.

Applications
At the bottom of the General Settings tab, there are three options that authorize which apps can run on your Mac. The safest option is to allow only apps from the App Store to run, and the least secure option is to allow apps downloaded from unauthorized stores. Get the best of both worlds by choosing the option of running apps from the App Store and from developers known to Apple.

FileVault
The FileVault tab enables you to encrypt all the files in your account. To decrypt them, you must enter either your account password or the recovery key you created when you switched FileVault on. It might be tedious to type in a password every time to access a file, but it helps keep your vital data under lock and key.

In this digital age, ensuring the protection of all your devices is crucial to your business’s success. Feel free to give us a call and we’ll help prepare your business for choppy waters.

Read More

Spectre & Meltdown: how to protect yourself

Jan 23, 2018 1:00:14 PM / by Frontline, LLC posted in 2018january23apple_a, Apple, cyber security, meltdown, processor, spectre, vulnerabilities

0 Comments

Spectre and Meltdown are critical security flaws that affect a majority of computers today, including the one you’re using to read this. They can leak your passwords and other sensitive data, which is why software companies are working on security patches. The good news for Apple users is that fixes are now available to keep their devices temporarily safe.

Read More

Tips to protect your smartphone

Dec 29, 2017 1:00:54 PM / by Frontline, LLC posted in 2017december29android_a, Android, cyber security, mobile phones, smartphones, tips

0 Comments

Cyber criminals will always be eyeing your data regardless of where it’s stored. That means even your trusty Android phone or iPhone isn’t safe. In fact, it may be more exposed to security risks than you think. These tips can help increase your mobile’s security.

Read More

Phishers use encrypted sites to scam

Dec 22, 2017 1:00:15 PM / by Frontline, LLC posted in 2017december22security_a, cyber security, Encryption, HTTPS, phishing scam, Security

0 Comments

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of security.

Read More

A keylogger found in HP laptops

Dec 20, 2017 1:00:35 PM / by Frontline, LLC posted in 2017december20hardware_a, antivirus, cyber security, Hardware, hp, keylogger, laptop, security, software

0 Comments

Are you using an HP laptop? If so, your machine might have a keylogger pre-installed. This means every stroke you hit on your keyboard can be recorded and your passwords and personal details can be exposed. But don’t panic. We’re about to tell you how to remove it while educating you about this sneaky software and how to steer clear from it.

Read More

Key points from Protenus’ new report!

Dec 4, 2017 1:00:03 PM / by Frontline, LLC posted in 2017december4healthcare_a, cyber security, emrs, Healthcare, protenus, security report

0 Comments

In November 2017, healthcare data security and privacy company Protenus released a report on the most common security breaches in healthcare. Here are a few key takeaways.

Read More

Essential macOS High Sierra updates

Nov 17, 2017 1:00:52 PM / by Frontline, LLC posted in 2017november17apple_a, Apple, cyber security, krack, macbook, macos, wifi

0 Comments

The macOS 10.13.1 High Sierra update “improves the security, stability, and reliability of your Mac and is recommended for all users.” This is a standard message in most operating system updates, but users seldom pay heed. This time, however, Apple’s latest Mac OS includes a security update that’s essential to keeping your devices safe from KRACK.

Read More

Watch out! More ransomware attacks incoming

Sep 4, 2017 1:00:32 PM / by Frontline, LLC posted in 2017september4healthcare_a, backup, cyber security, Healthcare, Healthcare IT, ikarus, locky, ransomware

0 Comments

Ever since the WannaCry and Petya ransomware outbreaks, healthcare organizations have been on their toes. But just when they thought they could relax, a new strain of ransomware has come along. A “Locky-variant” ransomware campaign is currently underway, and it’s every bit as dangerous as previous ransomware attacks.

Read More

What you need to know about malware

Jul 28, 2017 1:00:20 PM / by Frontline, LLC posted in 2017july28security_a, Adware, cyber security, cyber threats, Malware, ransomware, Security, Spyware, trojan

0 Comments

You’ve all heard of viruses, spyware, ransomware and trojans. But did you know that they’re all types of malware? They’re all designed to ruin your digital life, but different types of malware put your computer at risk in different ways. Understanding what sets them apart can keep your business guarded.

Read More

Why Nyetya is more threatening than WannaCry

Jul 13, 2017 1:00:04 PM / by Frontline, LLC posted in 2017july13security_a, cyber security, Malware, Microsoft, nyetya, ransomware, Security, wannacry

0 Comments

The WannaCry ransomware, which infected 200,000 business globally and made over $100,000 in ransom payments, is said to be one of the worst cyber attacks in history. However, a new ransomware strain named Nyetya is shaping up to be a more formidable security threat. It has already affected businesses globally, and security firms and researchers believe it to be stealthier and more sophisticated than WannaCry.

Read More

Subscribe to Email Updates

Lists by Topic

see all

Posts by Topic

see all

Recent Posts