• December 24, 2024

    The Importance of Properly Offboarding Employees

    Employers and their employees part ways for all sorts of reasons. People may move on because of a contract’s completion, to take a new job, or because they’re retiring. Employees may also leave due to being laid off or fired. Whatever the reason, offboarding—the process of managing an employee’s departure from an organization—is essential. Without a systematic offboarding protocol, or... Read more
  • December 17, 2024

    Website Owners: Identifying Copyright Infringement Link Insertion Scams

    We regularly warn Internet users about online scams and phishing attacks. Most of these are relatively easy to identify and avoid once you’re aware of telltale signs. Unfortunately, we’ve encountered a newer type of scam that’s more difficult to identify, partly because it plays on fears of legal action. Website owners are the target of this scam email, which purports to come from a lawyer. ... Read more
  • December 12, 2024

    Don’t Listen to Anyone Who Tells You to Drag a Text File into Terminal

    In macOS 15 Sequoia, Apple made it more difficult to bypass Gatekeeper to run apps that aren’t notarized. (Notarization is one of the ways Apple ensures that apps distributed outside the Mac App Store are unmodified and free from malware.) Cybercriminals have responded to this increase in security with a new social engineering attack. They provide the victim with a disk image, ostensibly to ins... Read more
  • October 17, 2024

    Passwords Becomes a Real App in macOS 15 Sequoia, iOS 18, and iPadOS 18

    Although we’re still fans of 1Password, and there are plenty of other good password managers out there, like BitWarden and Dashlane, Apple has finally removed the last hurdle to using its bu... Read more
  • October 3, 2024

    Beware Fake “Sextortion” Scams

    All those data breaches are coming back to haunt us. Once our phone numbers and addresses began to be leaked, it was only a matter of time before scammers would personalize their attacks to make them seem more real. The latest “sextortion” scams purport to have compromising video of you taken from your computer’s webcam, backing it up with your phone number and a Google Street View-like image t... Read more
  • September 26, 2024

    Set macOS to Require a Password after Screen Saver Start or Display Sleep

    Although paying attention to online security is of primary importance, don’t forget local security. You don’t want to go out for lunch and let someone wandering by your office poke through your email, messages, photos, and private files. To ensure this doesn’t happen, set your Mac to start the screen saver or sleep the display after a few minutes (on a laptop, just close the lid), and then set ... Read more
  • September 19, 2024

    NPD Breach Reveals Data on Hundreds of Millions, Here’s How to Respond

    A few months ago, news broke about the latest massive data breach, this time from a company called National Public Data, a company that collects vast amounts of personal data about individuals from public data sources, including addresses, employment history, criminal records, and Social Security numbers. NPD then sells access to that data to employers conducting background checks, landlords sc... Read more
  • September 12, 2024

    No More Ransom Website Offers Ransomware Decryption Tools

    We’ve written in the past about how Apple-only companies can protect themselves from ransomware (strong security, isolated backups, monitoring software), but realistically, it’s primarily a threat to computers running Windows and Linux. If you, or anyone you know, is targeted by ransomware, look to the No More R... Read more
  • August 20, 2024

    Understanding the Key Differences Between Personal and Managed Apple IDs

    In the Apple world, the account that controls access to all your Apple-related online services is the Apple ID. Buying apps from the App Store, putting photos in iCloud Photos, and sharing data between iCloud-enabled apps—all these actions rely on your Apple ID. If you’re a regular Apple user, you have an Apple ID associated with your email address. Most Apple users set up an Apple ID when t... Read more
  • August 8, 2024

    Protect Domains That Don’t Send Email from Email Spoofing

    We recently wrote an article for those who manage their own Internet domain names about using SPF, DKIM, and DMARC to prevent your domains from being used in phishing attacks and enhance the deliverability of legitimate email. But what about other domains you own but don’t use for email? To make phishing attacks more believable, spammers sometimes forge email so it appears to come from parked d... Read more