<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Mac Protection Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/mac-protection/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/mac-protection/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Thu, 16 Jan 2025 19:17:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Mac Protection Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/mac-protection/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Mac Users &#8211; Urgent Security Alert: Protecting Your Mac from Banshee Stealer Malware</title>
		<link>https://fosterinstitute.com/mac-users-urgent-security-alert-protecting-your-mac-from-banshee-stealer-malware/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sat, 11 Jan 2025 23:29:10 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple Virus]]></category>
		<category><![CDATA[Mac Protection]]></category>
		<category><![CDATA[Mac Virus]]></category>
		<category><![CDATA[Malware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5972</guid>

					<description><![CDATA[<p>Mac Users – Beware of Current Malware There is a virus for Mac named Banshee Stealer that is potentially affecting millions of Mac users. IMMEDIATE ACTIONS REQUIRED: &#8211; Never enter your Mac user or admin password unless you recognize the need to enter it because of an action you’re performing, such as powering on your [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/mac-users-urgent-security-alert-protecting-your-mac-from-banshee-stealer-malware/">Mac Users &#8211; Urgent Security Alert: Protecting Your Mac from Banshee Stealer Malware</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Mac Users – Beware of Current Malware</strong></p>
<p>There is a virus for Mac named Banshee Stealer that is potentially affecting millions of Mac users.</p>
<p><strong>IMMEDIATE ACTIONS REQUIRED:</strong></p>
<p><strong>&#8211; Never enter your Mac user or admin password unless you recognize the need to enter it because of an action you’re performing, such as powering on your Mac.</strong></p>
<p><strong>&#8211; Back up your critical data immediately in case you need to perform a clean MacOS install</strong></p>
<p><strong>&#8211; Because Banshee Stealer is unnoticeable, strongly consider running an anti-malware tool capable of detecting it.</strong></p>
<p><strong>What Anti-Malware Tools Work? </strong></p>
<p>Intego, Malwarebytes, and Combo Cleaner are the only Mac-based anti-malware tools that I can find today that advertise that they can identify and stop the newest version of Banshee Stealer. There might be others. Combo Cleaner is available in the Mac App Store. Downloading apps from the store reduces the likelihood of getting a fake infected version. We don’t endorse any of the tools mentioned, nor do we receive any compensation. There are many online reviews about those two products. Stay current with your Mac OS updates, and hopefully, Apple’s built-in tools will soon detect and conquer the newest version of Banshee Stealer.</p>
<p>I realize many Mac users do not want to install anti-malware. If that’s you, please carefully understand all the information in this article to reduce your exposure. The newest variant of Banshee Stealer cleverly evades Apple’s built-in anti-malware tool, XProtect.</p>
<p><strong>What is Banshee Stealer?</strong></p>
<p>The sophisticated Banshee Stealer malware compromises computers and laptops running MacOS, including Intel-based Macs and those with Apple Silicon chips. Attackers use it to breach privacy, inflict financial losses, and steal identities. So far, iPhones and iPads have not been affected by Banshee Stealer. In my presentations and speeches, participants often ask if Macs are susceptible to viruses and other malware; this is an example of when they are.</p>
<p>Banshee Stealer is a new variant; it started as Malware-as-a-Service (MaaS). Threat actors could purchase access for $3,000 per month to attack Mac users. The new variant resurfaced in September, using encryption from Apple&#8217;s XProtect anti-virus tool, evading antivirus detection for months.</p>
<p><strong>How Can Your Computer Become Infected with Banshee Stealer?</strong></p>
<ul>
<li>If you click on links in email messages that take you to a site that might appear normal but will infect your computer with Banshee Stealer</li>
<li>If you open attachments to email messages that contain the Banshee Stealer malware or take you to a site that downloads and installs Banshee Stealer</li>
<li>Scanning QR codes in email mail or other messages for the same reason</li>
<li>If you enter your username and password into what appears to be a legitimate Apple pop-up</li>
<li>Downloading programs and applications that have Banshee Stealer hidden inside</li>
<li>If you follow a fake prompt that tells you an update or program needs to be installed, a password needs to be reset, or some application asks to use your camera or microphone or have some other elevated privilege.</li>
</ul>
<p><strong>Symptoms:</strong></p>
<p>Banshee Stealer is designed to be undetectable. You might not find out your Mac was infected until your finances, identity, and privacy are in shambles. Possible symptoms include:</p>
<ul>
<li>Your Mac computer or laptop starts behaving differently than before.</li>
<li>You might receive unexpected prompts asking you to install software, reset your password, grant permission, etc.</li>
<li>If you notice that your bank or other online accounts have been compromised, an attacker may have used Banshee Stealer to steal your passwords.</li>
<li>If your Mac starts operating much slower than before, or if the battery life seems shorter, Banshee Stealer might upload data in the background or perform other activities on your computer.</li>
<li>If you notice unexpected file changes on your computer</li>
<li>If you have a Crypto Wallet that gets compromised.</li>
</ul>
<p><strong>What to Do to Help Prevent Infection:</strong></p>
<p>Strongly consider using anti-malware capable of detecting Banshee Stealer, as discussed above.</p>
<p>Beware of all prompts that pop up on your screen that look like they are Apple prompts asking for your password. Banshee Stealer is great at mimicking the Apple prompts, and if you enter your username and password, Banshee Stealer captures them. It is essential that you only enter your username and password when you are actively expecting to need to, such as:</p>
<ul>
<li>When you power on the computer or when you log in after the screen is locked</li>
<li>When you are installing new software right then</li>
<li>When you are logging into Keychain</li>
<li>When you told the Mac to install system updates</li>
<li>Administrative tasks like when you are intentionally accessing system files</li>
<li>And some of the changes to system preferences you’re making right then.</li>
</ul>
<p>Only install programs and applications from trusted companies. Remember that attackers can sometimes infect trusted companies and install malware without the software provider&#8217;s knowledge. This is called a supply chain attack, and it can be very successful if people trust the website or tool. Getting programs from the Mac App Store helps minimize the risk of downloading malware hidden inside an otherwise functional program.</p>
<p>Do not double-click on a link or button on a website. Legitimate website navigation involves single-clicks. Threat actors have determined that people will follow instructions to double-click or double-click if something does not seem work the first time. During a double-click process, attackers will quickly replace the original link with a malicious one right after the first click before the second. Users do not realize what they&#8217;ve done and might have executed a script or unknowingly performed another task the threat actor wanted.</p>
<p>Do not click on links in email messages or other messages, and do not scan a QR code—it functions as a link. Do not click on links on services such as YouTube; threat actors will put links into the descriptions and comments. View every link everywhere as suspicious and avoid clicking.</p>
<p>Do not open attachments that arrive via email or another method unless you confirm with the sender that it is indeed the file they sent. Remember that attackers can compromise other companies or users and use their email addresses to send malicious files when you expect them. This is a way for even the most security-conscious people to be infected.</p>
<p>Update your MacOS regularly. Instead of answering a prompt on your screen telling you about an update, regularly click on the apple in the top left corner and choose System Settings, General, then Software Update.</p>
<p>Consider removing as many browser extensions as possible. Sometimes malware infects browser extensions or comes included when you install an extension.</p>
<p>Use multi-factor authentication (MFA) on all the websites, Software as a Service (SaaS) solutions, and everywhere else you can. Choosing to receive a text message for the second step of the login process is much better than having no MFA, but it is not the most secure choice due to the SIM-Swapping attackers use. They learn as much as they can about you, frequently using AI, and contact your phone provider and try to convince your provider that they are you and that you have a new SIM chip or a new phone. Recent breaches have exposed your location history gathered by companies who write apps and sell your location information. Threat Actors can use AI to combine location information with publicly available data to learn much about you and your life. If the phone provider is duped, they’ll successfully take over your account and be able to receive the text messages on their device. If you ever change your phone number, you&#8217;ll need to go to all the websites where you set up text-based MFA, disable MFA, and re-enable MFA when you get the new number.</p>
<p>For more secure multi-factor authentication, if the website or SaaS tool allows, set up an authenticator app on your smartphone that generates a number every thirty seconds. This Time-Based One-Time Password (TOTP) is more secure because it doesn&#8217;t rely on a text message. Popular authenticators include Google Authenticator, Microsoft Authenticator, Authy, and more. (Same disclaimers as above). Be sure to back up your authenticator app in case you lose or upgrade your phone. Otherwise, you could be locked out of everything you set up for TOTP. If you can’t generate the codes, you won’t be able to log in to the sites that require that code. There are other options that are more secure than text message-based MFA, including USB Keys, Passkeys, etc.</p>
<p>Be sure you use different passwords for every website or SaaS offering. When attackers compromise your password anywhere, they’ll perform credential stuffing, meaning they try the same username and password at dozens of other popular websites and SaaS platforms. It is challenging to remember passwords, and password manager software can be very helpful. Password managers remember your passwords for you and can fill them in when prompted. Although web browsers have this feature, too, many people consider password managers more secure since, if an attacker compromises your browser, the passwords are not readily available to them. Some password managers will synchronize across multiple devices, reset weak passwords for you, and offer other features. It is almost always best not to use the VPN and other services that come with password managers. 1Password, DashLane, Keeper, LastPass, and many others are common. (Same disclaimers about not endorsing these nor do we get compensation). And Apple has revamped the MacOS Keychain password manager to be more secure than it was. When you use a password manager, be sure it is backing up somewhere in case you lose your laptop. Apple Keychain automatically backs up to iCloud and synchronizes across your other devices.</p>
<p>If you have sensitive data, consider encrypting the files in case Banshee Stealer or other malware accesses and steals them.</p>
<p>Computers and devices communicate through a network, copper or WiFi. Malware can move from one computer to another. If you use your Mac at home and family members have Macs who aren’t as careful as you are, having a segmented network for you to use, separate from everyone else, helps protect you from malware spreading from their computers onto yours. Segmentation is slightly technical, and the easiest way to segment a home network might be to have all the other family members connect to the “guest” network and use the primary network.</p>
<p>Set up text messages for all financial transactions. Most financial institutions offer SMS or email alerts whenever transactions larger than a certain amount are processed. I have my accounts set to text me anytime a transaction of more than one dollar occurs on any account because that is the minimum amount my banks allow. Yes, I receive many alerts, but I’d prefer to receive many alerts than not knowing about an unauthorized withdrawal. Continue to monitor bank statements and other financial records.</p>
<p>If your company has an Extended Detection and Response (XDR) solution, contact your IT professionals to be sure they&#8217;ve installed the XDR agent on your Mac, too. If your business isn&#8217;t already using XDR, you must. This technology is designed to detect and stop malicious activity before it has time to do much, if any, harm. Examples of XDR tools include Crowd Strike, Cynet, Sentinel One, and more (we don&#8217;t endorse nor receive compensation for mentioning them).  As cybersecurity consultants, we recommend that our customers get XDR from their IT Team&#8217;s vendor. The typical approximately $20/mo/user seems expensive until after a breach. Many companies get breached even though they have XDR in place, but the most common reason is that something wasn&#8217;t implemented correctly or there is a breakdown or delay in communications. Companies engage with us to perform independent periodic vigorous red team exercises to attack and test their XDR response. Most XDR implementations fail the first exercise, but finding weaknesses before the threat actors do is the point. After the exercise and forthcoming recommendations are implemented, a company is much more prepared for a real-world attack.</p>
<p>This recommendation isn’t for everyone; I left it for last. Implementing this can be complicated and frustrating and is most often initiated by enterprises using Windows and Mac. Another strategy to help avoid getting malware from websites is to use a hosted browser, also known as browser isolation. This service runs a web browser on their servers, and your computer shows you their browser. Thus, all browser attacks will attack the company hosting the browser, not your computer’s browser. Sometimes, hosted browsers work better than others, but you might consider this option to further isolate and protect your computer from browser-based threats. For example, if a website wants to access your local mic and camera, it won’t work since you’ll be using the hosted browser. But this protects you from malicious websites that take over your mic and camera. My research to locate a hosted browser for the Mac was complex, and I want to rush this blog to the press due to the urgency of Banshee Stealer. Candidates for stand-alone hosted browser solutions for the Mac include Menlo Secure Cloud Browser, Authentic8, and the Puffin Browser. Zscaler and Cloudflare also offer hosted browser solutions for the Mac, but they don’t seem to be sold as a stand-alone solution but as part of a larger package. We are not endorsing or receiving any compensation for listing those products.</p>
<p><strong>Proactive Steps to Take In Case You Get Infected:</strong></p>
<p>There are other steps to take that will help you if you do get infected. Be sure you are backing up with Mac OS’s built-in Time Machine or another service. Using multiple external USB drives for backup and rotating them is a great idea. Mac OS will keep track of each drive and apply the backups when you plug in the specific drive. Strongly consider an online backup service. Examples of highly rated cloud backup services for Mac users include BackBlaze, iDrive, and Acronis, but there are others. We are not endorsing those, nor do we receive any compensation for recommending them. You might even copy your files to an online storage service; use multi-factor authentication and all the other industry-best cybersecurity practices for cloud storage. Some people copy their most important files to one or more external drives, leaving them disconnected except when copying files.</p>
<p><strong>What to do if you think you are infected:</strong></p>
<p>Turn off your Wi-Fi or disconnect your Ethernet cable to stop any more files from being stolen and uploaded.</p>
<p>Run an anti-malware package described above under prevention.</p>
<p>Continue to watch your financial accounts for any suspicious activity.</p>
<p>Follow all the steps above under the section on what to do to avoid infection.</p>
<p>Consider moving your assets to a new, secure wallet if you use cryptocurrency.</p>
<p>You should contact gurus at Apple or another support organization who can help you with your Mac.</p>
<p>Reset all of your passwords. If you are not using a password manager, now might be a good time to do so.</p>
<p>Decide whether to alert your business and associates that if they receive an email pretending to be from you, it is likely not from you.</p>
<p>If you want to feel confident you’ve removed all of the malware, consider backing up your data and performing a clean install of macOS.</p>
<p><strong>Final Thoughts:</strong></p>
<p>I hope you do not become infected with Banshee Stealer and are not already infected, which is tricky to detect. Following the guidance in this article can also help protect you from other Mac malware. Tell your friends.</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/mac-users-urgent-security-alert-protecting-your-mac-from-banshee-stealer-malware/">Mac Users &#8211; Urgent Security Alert: Protecting Your Mac from Banshee Stealer Malware</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Mac Vulnerability Permits Unauthorized Login</title>
		<link>https://fosterinstitute.com/mac-vulnerability-permits-unauthorized-login/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 29 Nov 2017 16:25:29 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[High Sierra]]></category>
		<category><![CDATA[Mac Protection]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[Apple operating system]]></category>
		<category><![CDATA[apple risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[enable root user]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[High Sierra Vulnerability]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Mac security]]></category>
		<category><![CDATA[MacOS High Sierra risk]]></category>
		<category><![CDATA[OS Vulnerability]]></category>
		<category><![CDATA[reset root password]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[unauthorized]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2578</guid>

					<description><![CDATA[<p>Apple’s newest operating system has a serious vulnerability that can allow someone else to logon to your Mac. Here’s what to do:  First, see if you are vulnerable. Click on the apple symbol on the top left of your screen, then choose About This Mac. If you have macOS High Sierra, you are probably vulnerable. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/mac-vulnerability-permits-unauthorized-login/">Mac Vulnerability Permits Unauthorized Login</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Apple’s newest operating system has a serious vulnerability that can allow someone else to logon to your Mac. Here’s what to do: <span id="more-2578"></span></p>
<p>First, see if you are vulnerable. Click on the apple symbol on the top left of your screen, then choose About This Mac. If you have macOS High Sierra, you are probably vulnerable. If you have anything else, stop here.</p>
<p>Second, you can protect yourself by making sure nobody other than you can get to your computer. So far, though theoretically possible, the vulnerability has not been exploited remotely unless you have enabled “Share my Screen.” If you feel confident that no bad actors will have access to your computer, you can stop here.</p>
<p>Third, reset the root password. Apple provides the 8 necessary steps at <a href="http://support.apple.com/en-us/HT204012">support.apple.com/en-us/HT204012</a> , Scroll down to the section entitled: Change the Root Password. In their step 7, if the option Edit &gt; Change Root Password is grayed out on your Mac, then instead click the option Edit &gt; Enable Root User and continue with step 8.</p>
<p>Please forward this to everyone you care about that has a Mac.</p>
<p>The post <a href="https://fosterinstitute.com/mac-vulnerability-permits-unauthorized-login/">Mac Vulnerability Permits Unauthorized Login</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Your iPhone and iPad are in Danger</title>
		<link>https://fosterinstitute.com/your-iphone-and-ipad-are-in-danger/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 24 Mar 2017 16:44:49 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Mac Protection]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Turkish Crime Family]]></category>
		<category><![CDATA[Apple Breach]]></category>
		<category><![CDATA[Apple Safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[iPad]]></category>
		<category><![CDATA[iphone Security]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Mac security]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2450</guid>

					<description><![CDATA[<p>If you use Apple products, here is what to do to protect yourself. By now, you&#8217;ve probably heard that attackers have told Apple that they have access to millions of iPhone and iCloud accounts. The hacking group calls themselves “Turkish Crime Family.” They are demanding $100,000 in gift cards, or $75,000 in cryptocurrency by April [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/your-iphone-and-ipad-are-in-danger/">Your iPhone and iPad are in Danger</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you use Apple products, here is what to do to protect yourself. By now, you&#8217;ve probably heard that attackers have told Apple that they have access to millions <span id="more-2450"></span>of iPhone and iCloud accounts.</p>
<p>The hacking group calls themselves “Turkish Crime Family.” They are demanding $100,000 in gift cards, or $75,000 in cryptocurrency by April 7, or they will wipe all the Apple accounts. It is easy to see why people who have Macs, iPhones, and iPads are concerned.</p>
<p>Apple says that Apple has not been hacked, but it is likely that any compromised passwords are the result of Apple users who may have used the same password at other websites as they do for their Apple account.</p>
<p>What should you do?</p>
<p>Perhaps the best solution to protect all your online accounts, Apple and other companies as well, is to set up two step verification.</p>
<p>You may have experienced going to a website, entering your username and password, and then your mobile phone buzzes and tells you to enter a code such as 777888 to complete the login process. That&#8217;s one type of two step verification.</p>
<p>When you use that kind of two step verification, an attacker would need to steal your mobile phone too before they could log on with your username and password. So, keep your phone with you. It will be difficult for people, especially those thousands of miles away, to access your phone even if they already know your username and password.</p>
<p>Another, even easier to use method for two step verification is called one tap login. Then, instead of needing to enter a code that comes via text message, all you have to do is tap an app on your phone to approve a login attempt.</p>
<p>To set up two step verification to protect your Apple devices, follow the instructions you will find when you google the following text. Either use copy and paste or manually type these words into a Google search:</p>
<p>two factor authentication for apple id site:apple.com</p>
<p>Always keep your devices upgraded with the latest security patches. If you have an older iPhone or iPad that cannot be upgraded to at least iOS 9 or newer, or a Mac that cannot be upgraded to El Capitan or newer, then follow the instructions you will find when you google:</p>
<p>two step verification for Apple ID site:apple.com</p>
<p>Drobox, PayPal, Google apps, and many other sites already support two step verification. You just have to turn it on. Do it today for all of your sensitive accounts.</p>
<p>To set up two step verification on your Google accounts, visit www dot google dot com/landing/2step/</p>
<p>Another way to find that page is to google this text, including the first word google:</p>
<p>Google 2 step verification site:google.com</p>
<p>For instructions to set up two step verification at Dropbox, google this text:</p>
<p>enable two step verification site:dropbox.com</p>
<p>Use similar searches to find instructions for your other services. It is important to use the word site followed by the actual website of your service if you want to get the information straight from the service, not somewhere else.</p>
<p>But you may wonder what to do for all the sites that you use that do not support two step verification.</p>
<p>Remembering passwords is too much trouble, so many people, even non-technical people, use a password manager to remember the different passwords for them. When they visit a site that asks for a password, the password manager quickly and automatically fills in their username and password for them.</p>
<p>But of course, you can never feel positive that password managers will keep your passwords secure. So, separate your passwords into two groups:</p>
<p>Put the passwords that you need to keep really secure, such as bank passwords, into the first group. You may choose to omit those sensitive passwords from your password manager. You might choose to remember them in your head. Or if you don&#8217;t like that idea, then you can write them down on paper that you keep in a secure location. Writing them down isn&#8217;t as good as memorizing them, but at least it is difficult for people thousands of miles away to read the paper on which you wrote the passwords. Or, if you feel you must store those passwords in a file on your computer, then encrypt the file, and name the file something other than &#8220;my passwords&#8221;.</p>
<p>The second group of passwords contains passwords, such as airline website logins, that it will not devastate you in the unlikely event that your password manager gets compromised. The passwords in this group are great candidates for your password manager.</p>
<p>Many people put the vast majority of their passwords in the password manager. The automatic filling in process sure speeds up the login process. Additionally, since you needn&#8217;t remember passwords anymore, using different passwords at different sites is easy. In fact, people sometimes trust password managers with even their most sensitive passwords, but only if those sites use two step verification too.</p>
<p>And, for a sometimes fun/sometimes scary experience, if you want to see if your password might have been hacked, follow the instructions you will find in The Foster Institute blog when you google:</p>
<p>How to Find Out if Your Password Might Have Been Hacked site:fosterinstitute.com</p>
<p>Please forward this to anyone you know who uses Apple devices, as well as anyone you know who wants to make their user names and passwords much more secure.</p>
<p>The post <a href="https://fosterinstitute.com/your-iphone-and-ipad-are-in-danger/">Your iPhone and iPad are in Danger</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protect your Mac from Viruses</title>
		<link>https://fosterinstitute.com/protect-your-mac-from-viruses/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 15 Oct 2015 13:00:58 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple Virus]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Mac Protection]]></category>
		<category><![CDATA[Mac Virus]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[Virus]]></category>
		<category><![CDATA[Bitdefender for Mac]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Mac protection]]></category>
		<category><![CDATA[Mac security]]></category>
		<category><![CDATA[Mac security testing]]></category>
		<category><![CDATA[Mac viruses]]></category>
		<category><![CDATA[Norton for Mac]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2157</guid>

					<description><![CDATA[<p>More executives are realizing that their Macs can catch viruses too. Independent studies by the testing firm AV-TEST show that two top picks for Mac anti-virus are: Bitdefender Antivirus for the Mac (Around $60) Symantec Norton Security (Around $50) The latter offers more features, but the tests demonstrate that they are both effective and barely [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/protect-your-mac-from-viruses/">Protect your Mac from Viruses</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>More executives are realizing that their Macs can catch viruses too. </p>
<p>Independent studies by the testing firm AV-TEST show that two top picks for Mac anti-virus are:</p>
<p>Bitdefender Antivirus for the Mac (Around $60)<br />
Symantec Norton Security (Around $50)</p>
<p>The latter offers more features, but the tests demonstrate that they are both effective and barely slow Mac computers down so it is unlikely that you will experience any changes in your user experience. </p>
<p>(We do not make any money or receive any royalties for recommending these tools)</p>
<p>You can look at the AV-test website to see the specifics.</p>
<p>Forward this to your friends who have Macs so that they can be protected too!</p>
<p>The post <a href="https://fosterinstitute.com/protect-your-mac-from-viruses/">Protect your Mac from Viruses</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
