Home > Articles > Home & Office Computing > Mac OS X

Secure Your Mac OS X System Now!

  • Print
  • + Share This
As more people buy and use Apple devices for their personal and professional productivity, the security challenges are greater, for both you and your business. In this article, information security and IT professional John Traenkenschuh, gives his ideas on good security for your Mac OS X computer. Easy to configure and immediately useful, these ideas will help you secure your expensive device and very valuable information.
Like this article? We recommend

Like this article? We recommend

As I sit here typing this on my MacBook Pro, I'm struck by how much my MacWorld has changed. Mac software is available, and more than just games or Microsoft products. Everyone loves Apple technology—including today's hacking community.

The hacking community seems more interested in system and application compromise. We Mac users are less likely to see worms and viruses that have taken down Windows systems. Many of those “chain-reaction” attacks will need higher Mac OS X numbers to work as effectively. Does this mean we Mac users can ignore security?

As never before, we need to secure our systems. As our iPads and MacBooks roam corporate hallways, thanks to “bring-your-own-browser” (BYOB) computing initiatives, our purchased gear is more likely to be attacked for any corporate information remnants (in memory, in cache, etc.).

Research CanSecWest, a regional security conference. One contest, Pwn2Own, showed in 2008 that among the three major consumer operating systems, Mac OS X fell down fastest, with Windows Vista creating a formidable defense. At this year's contest, Safari and Internet Explorer browsers led to their operating system's downfall quickly. We need to improve our security now!

These days, we have so much more information, starting with Apple's improved focus on giving us better security information. Review Apple Support and begin reading. These articles help with basics. Now let's dig into Mac OS X security specifics.

Passwords: Use Good Ones and Secure Them

I'm amazed we still use passwords. Today's hacking software can break through passwords too quickly. Today's pre-built password dictionaries routinely include the skript kiddie $pe77!ngs that once kept password crackers at b@y. For more information on password weaknesses, read my Informit article. Let this article help you select difficult-to-guess passwords. Even with this security measure, passwords can be easy to break. What then?

Use a Basic User Account for Browsing

Let's start security with the basics: Does your daily-use account have Admin authority? You must expect trick URLs, trick email attachments, and trick files thrown at your computing session. If you let your guard down—just once—those tricks run on your computer with privilege. Plant a backdoor? Sure. Maybe your telnet daemon returns to life. Maybe a hacker's public key is placed into your SSH's authorization files.

Improve system security by being less than all you can be: Use a non-admin account for daily work.

  • + Share This
  • 🔖 Save To Your Account