Upon restart the background will now be gray and feel slightly different (reminding the user FileVault 2 is being used).Restart the Mac to begin the encryption process.Enable Do not store the recovery key with Apple.Save the recovery key (text or screenshot).System Preferences:Security & Privacy:FileVault (If it is left unchecked or unpaired any Apple remote will be able to control the Mac by default)Ĥ. “This computer will not work with any remote” otherwise if a remote is used make sure it is paired ahead of time. Disable remote control infrared receiver.Automatically update safe downloads list’.Require an administrator password to access system preferences with lock icons.Require password immediately after sleep or screen saver begins. The following recommendations are obvious, but only a few are enabled by default verify the following are enabled. System Preferences:Security & Privacy:General The padlock icon is on the lower left and does not take a password to enable but takes a password to disable.ģ. Of the 29 default System Preferences 11 locking options are offered by default in Security & Privacy, Energy Saver, Print & Scan, Network, Sharing, Users & Groups, Parental Controls, Date & Time, Software Update, Time Machine, Startup Disk. Locking system preferences configurations is ideal in a secure world as to make changes requires authentication with administrative credentials. System Preferences : Change Lock Security Feature Anyone can see the hint, so choose a hint that won’t make it easy to guess your password.”Ģ. Note that Apple states “Enter a hint to help you remember your password. I like to put in an appropriate message directly to the attacker such as ‘Sorry buddy, it isn’t that easy – try something else’. If a password hint is entered make sure it doesn’t reveal to a potential attacker the password. Create Your Computer Accountĭuring this screen enter a password make sure the checkbox labeled ‘Require password when logging in’ is checked. The following 21 recommended security tips are not only recommended but also encouraged: 1. Just around where they would turn on their Macs for the very first time. For most users this is known as post-installation. Third-Party – Using both commercial and/or free anti-virus/anti-malware suites such as MacScan, Sophos, ClamXAV.įor the most part by configuring and enabling the built-in security features that Apple Mac OS X Lion has to offer third-party utilities turn into a ‘want’ more than a ‘need’. XProtectUpdater which updates the ‘safe downloads list’. Malware Securityīuilt-in – Using native available malware protection. Third-Party – Using both open source and/or commercial encryption suites such as TrueCrypt, Mac GPG, Symantec’s PGP Desktop. Apple comes with FileVault 2 a whole disk encryption feature allowing users to have their data made irrecoverable in an event of theft, loss, physical compromise. Encryption Securityīuilt-in – Using native available encryption. Third-Party – Using third-party vendors to further enhance the native system usually with additional front-ends. For example System Preferences, Keychain Access, Software Updates. General Securityīuilt-in – Using the operating system’s native toolset available for the user to configure and raise the security posture from its default ‘convenient’ settings. This article will discuss how to further harden the Mac OS X environment and raise users up a few notches from the low-hanging fruit category. It’s the ideology of convenience versus security and as it is well known Macs are quite convenient. Mac OS X 10.7.3 (Lion) inherently contains many desired security features however it takes a few moments for the user to enable most of them. 20+ Top Security Tips for Safe Computing Mac OS X – Mac OS X Trojan Horse
0 Comments
Leave a Reply. |