- Here are a few cybersecurity tips to help protect your Mac from malware: Keep macOS and your web browser up-to-date. Beware of suspicious emails. Use long, complex passwords. Avoid public Wi-Fi.
- Here are the top remote working security tips to ensure you and your staff are working from home safely. Use antivirus and internet security software at home. One of the most effective security tips for working from home is to invest in a comprehensive antivirus suite for you and your employees. According to sources, the estimated global.
Use strong password for user accounts
Check Your Firewall. Checking your firewall sounds complicated, but it really isn’t. If you own a Windows-based system, just go to your control panel and type “firewall” in the search box. If your firewall is “on” or “connected,” then you’re good to go. If you own a Mac, click the Apple icon on your toolbar, go to “system.
Weak password, which is easy to guess, increases the chance of unauthorised access of computer.
Function: Assist users to learn and practice on how to create strong passwords.
Purpose: Change log in password of your computer.
- Steps on how to change your user account password.
- Change password regularly and use a password that is difficult to guess but easy to remember.
- Don't reuse passwords or write down your password, particularly anywhere near the computer. Please visit InfoSec website for more good practices on Handling User Account and Passwords.
Set up standard user accounts for daily use
Malware can infect a computer and operate malicious activities under the user rights of the logged-in user.
Purpose: Create standard user account for your computer and change user account’s administrator right.
- Steps on how to set up user accounts.
- Use administrator account only where necessary, such as managing other user accounts, installing or removing software or changing security settings.
- Use different passwords for different user accounts, in particular those for handling private and sensitive data.
Disable Guest account
Guest account of computer can provide information to attacker and increase security risks.
Purpose: Check whether Guest User account is disabled.
- Open the Apple menu and select System Preferences.
- Select Users & Groups under the System section.
- Verify the status of Guest User is Disabled.
- Where necessary, disable the Guest User by unlocking the pane by clicking the lock in the lower-left corner and enter the administrator username and password to uncheck options of Allow guests to log in to this computer and Allow guests to connect to shared folders.
- Assess security risks before using guest account, which allows users to log on to a network, browse the Internet, and shut down the computer.
- Establish a password for guest account before use because the guest account password is blank by default.
Enable password protected screen saver
Unattended computer is susceptible to unauthorised access to the system.
Purpose: Enable password protected screen saver.
- Steps on how to set preference of screen saver and lock screen.
- Enable password protected screen saver in all time and do not leave your computer unattended, in particular in public area.
- The default user inactivity time set for screen saver to launch is usually 15 minutes; however a shorter time period can be set for better security.
Use up-to-date anti-malware security software
Your computer is susceptible to virus, Trojan horse and other malware attacks, which may lead to data and financial loss.
Function: Detect malware attack and remove malware from infected computer.
Note: Please be aware that the exact process for applying the security features will vary between different products. It is recommended that users follow the instructions contained in the official user manual where possible.
- Enable auto-update features of the anti-malware security software to keep the software and its definition up-to-date.
- Enable real-time protection feature and perform full scan of computer in periodic basis (e.g. weekly).
- Stay alert to symptoms that might indicate a malware infection, such as battery drain, performance clogging, unusual large data usage, etc.
- Be aware that fake anti-malware software and rogue pop-up security alerts are popular ways for tricking users to download malware onto their computers.
Use personal firewall
Networked computer is more susceptible to cyber attacks because attackers can discover and scan the computer remotely, connect to it and send user data to external server.
Function: Enable firewall protection for your computer.
- Mac OS Firewall (Built-in software in Mac OS)
Purpose: Check whether Mac OS Firewall is enabled and verify the firewall rules.
- Steps on how to verify that Windows Firewall is on and restrict unwanted connections.
- Enable your personal firewall in all time, in particular when connecting to the Internet.
- Enable built-in firewall of home router to further protect your computer and home network from cyber attacks.
Update operating system, application and browser
Computer with known security weaknesses is more susceptible to malware infection and other cyber attacks, in particular when connecting to the Internet.
Function: Detect outdated software, browsers and their plug-ins.
- Check and Secure website (Detect outdated browser and plug-in)
- Qualys Browser Check (Detect outdated browser and plug-in)
- Nessus Vulnerability Scanner (Evaluation version) (Detect outdated operating system and application)
Purpose: Obtain latest security patch update and check whether operating system and other Apple App Store products are up-to-date.
- Steps on how to update operating system and App Store applications.
- Steps on how to set your computer to check for updates automatically.
- Enable auto-update feature of software product and remember to restart your computer to finish installing the updates.
- Uninstall end-of-support software products or upgrade to another software product that has security updates and avoid performing sensitive operations, such as online banking, from computer without security updates.
Configure basic security settings for web browser
Default settings in common web browsers may allow execution of malicious code, cache of sensitive information and password without the owner's knowledge.
Purpose: Check whether the basic security settings of web browser are adopted.
- Steps on how to secure Internet Explorer, Mozilla Firefox and Safari browser
- Steps on how to secure Chrome browser – Phishing and malware alerts, manage your website passwords, run or block plug-ins, delete your cache data and disable Autofill feature
- Do not visit suspicious websites or follow the links provided in those websites, as they may cause malware infection and force a browser to download files without user's knowledge.
- Logout application after use and clear browser cache, in particular after performing sensitive operation, such as online banking.
Backup data regularly
Data cannot be recovered in case of malware infection, hardware failure and device loss.
Purpose: Backup and restore files and full system.
- Steps on how to back up your computer using Time Machine.
- Backup regularly and protect your backup data securely.
- Test the restore procedures to ensure the backup data can be restored.
- Assess security risks before synchronising data to cloud services and avoid automatic backup of sensitive data to them.
- Protect your online user account with a strong password and enhanced authentication mechanism such as 2-factor authentication if available, in particular those for cloud backup. Please visit InfoSec website for more good practices on Handling User Account and Passwords.
Completely remove data before giving away or selling your computers
Data can be accessed or recovered by data recovery applications.
Purpose: Securely delete data on a hard disk or erase free disk space.
- Steps on How to erase an Intel-based Mac.
- Steps on How to erase a Mac with Apple silicon.
Note: Read the instructions carefully before the hard disk is being deleted securely.
- Data cannot be recovered after secure delete. If data need to be kept, perform backup before erasing the data.
- Please visit InfoSec website for more options for disposal of computer equipment containing sensitive information
- In order to protect data, enable full disk encryption (e.g. FileVault) with strong password after purchase.
Disclaimer: The health check settings here are proactive in nature and intended for improving computer security, as they may change the user experience and interfere with the functionality and utility of some applications. The exact process for applying the security features during the health check will vary between different products. It is recommended to follow the instructions contained in the user manual provided at the official website of the manufacturer where possible.
Users are also recommended to observe the Important Notices of CSIP and read the user agreements and privacy policies of the security software and tools before download and use them.
Sept. 30, 2020
Try Norton 360 FREE 30-Day Trial* - Includes Norton Secure VPN
30 days of FREE* comprehensive antivirus, device security and online privacy with Norton Secure VPN.
Cybercrime is an ongoing threat.
You might think that the only form of cybercrime you have to worry about is hackers stealing your financial information. But it may not be so simple. There are far more concerns than just basic financial ones. Cybercrime continues to evolve, with new threats surfacing every year.
When you hear and read about the range of cybercrimes out there, you might be tempted to stop using the internet entirely. That’s probably too drastic.
Instead, it’s a good idea to know how to recognize cybercrime, which can be the first step to helping protect yourself and your data. Taking some basic precautions and knowing who to contact when you see others engaged in criminal activities online are also important steps.
You might want to learn how to prevent cybercrime, but here’s the thing: You can’t. You can, however, take precautions to help protect against it.
What is cybercrime?
Cybercrime is any crime that takes place online or primarily online. Cybercriminals often commit crimes by targeting computer networks or devices. Cybercrime can range from security breaches to identity theft.
Other cybercrimes include things like “revenge porn,” cyber-stalking, harassment, bullying, and child sexual exploitation.
Terrorists collaborate on the internet, moving terrorist activities and crimes into cyberspace.
How to protect yourself against cybercrime
Anyone using the internet should exercise some basic precautions. Here are 11 tips you can use to help protect yourself against the range of cybercrimes out there.
1. Use a full-service internet security suite
For instance, Norton Security provides real-time protection against existing and emerging malware including ransomware and viruses, and helps protect your private and financial information when you go online.
2. Use strong passwords
Don’t repeat your passwords on different sites, and change your passwords regularly. Make them complex. That means using a combination of at least 10 letters, numbers, and symbols. A password management application can help you to keep your passwords locked down.
3. Keep your software updated
This is especially important with your operating systems and internet security software. Cybercriminals frequently use known exploits, or flaws, in your software to gain access to your system. Patching those exploits and flaws can make it less likely that you’ll become a cybercrime target.
4. Manage your social media settings
Keep your personal and private information locked down. Social engineering cybercriminals can often get your personal information with just a few data points, so the less you share publicly, the better. For instance, if you post your pet’s name or reveal your mother’s maiden name, you might expose the answers to two common security questions.
5. Strengthen your home network
It’s a good idea to start with a strong encryption password as well as a virtual private network. A VPN will encrypt all traffic leaving your devices until it arrives at its destination. If cybercriminals do manage to hack your communication line, they won’t intercept anything but encrypted data. It’s a good idea to use a VPN whenever you a public Wi-Fi network, whether it’s in a library, café, hotel, or airport.
6. Talk to your children about the internet
You can teach your kids about acceptable use of the internet without shutting down communication channels. Make sure they know that they can come to you if they’re experiencing any kind of online harassment, stalking, or bullying.
7. Keep up to date on major security breaches
If you do business with a merchant or have an account on a website that’s been impacted by a security breach, find out what information the hackers accessed and change your password immediately.
8. Take measures to help protect yourself against identity theft
Identity theft occurs when someone wrongfully obtains your personal data in a way that involves fraud or deception, typically for economic gain. How? You might be tricked into giving personal information over the internet, for instance, or a thief might steal your mail to access account information. That’s why it’s important to guard your personal data. A VPN — short for virtual private network — can also help to protect the data you send and receive online, especially when accessing the internet on public Wi-Fi.
9. Know that identity theft can happen anywhere
It’s smart to know how to protect your identity even when traveling. There are a lot of things you can do to help keep criminals from getting your private information on the road. These include keeping your travel plans off social media and being using a VPN when accessing the internet over your hotel’s Wi-Fi network.
10. Keep an eye on the kids
Just like you’ll want to talk to your kids about the internet, you’ll also want to help protect them against identity theft. Identity thieves often target children because their Social Security number and credit histories frequently represent a clean slate. You can help guard against identity theft by being careful when sharing your child’s personal information. It’s also smart to know what to look for that might suggest your child’s identity has been compromised.
11. Know what to do if you become a victim
If you believe that you’ve become a victim of a cybercrime, you need to alert the local police and, in some cases, the FBI and the Federal Trade Commission. This is important even if the crime seems minor. Your report may assist authorities in their investigations or may help to thwart criminals from taking advantage of other people in the future. If you think cybercriminals have stolen your identity. These are among the steps you should consider.
- Contact the companies and banks where you know fraud occurred.
- Place fraud alerts and get your credit reports.
- Report identity theft to the FTC.
How you can help by following the 11 tips
In a way, fighting cybercrime is everybody’s business. Think of it as an obligation to do your part in the fight against cybercrime.
For most people, that means following a few simple, common-sense steps to keep yourself and your family safe. It also means reporting cybercrimes to relevant officials at the appropriate time.
When you do, you’re helping to fight cybercrime.
Try Norton 360 FREE 30-Day Trial* - Includes Norton Secure VPN
30 days of FREE* comprehensive antivirus, device security and online privacy with Norton Secure VPN.
Editorial note: Our articles provide educational information for you. NortonLifeLock offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about cyber safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses.
Copyright © 2021 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.
No one can prevent all identity theft or cybercrime. Not all products, services and features are available on all devices or operating systems. System requirement information on norton.com.
*Important Subscription, Pricing and Offer Details:
Mac Cybersecurity Tips To Keep Your Computer Safe For Kids
- The price quoted today may include an introductory offer. After that, your membership will automatically renew and be billed at the applicable monthly or annual renewal price found here.
- You can cancel your subscription at my.norton.com or by contacting Member Services & Support. For more details, please visit the Refund Policy.
- Your subscription may include product, service and /or protection updates and features may be added, modified or removed subject to the acceptance of the Customer Agreement.
The number of supported devices allowed under your plan are primarily for personal or household use only. Not for commercial use. If you have issues adding a device, please contact Member Services & Support.
Mac Cybersecurity Tips To Keep Your Computer Safe On Internet
§ Dark Web Monitoring in Norton 360 plans defaults to monitor your email address only. Please login to the portal to review if you can add additional information for monitoring purposes.