Chapter 2

Protecting Your Mac against Local and Remote Threats

IN THIS CHAPTER

Bullet Locking your Mac

Bullet Adding passwords

Bullet Using Touch ID

Bullet Encrypting your documents with FileVault

Bullet Configuring Firewall and Privacy settings

Bullet Adding other users to your Mac

One of the Mac’s advantages is that it seems to be a minor target of viruses — but that certainly doesn’t make it immune. With the worldwide connectivity of the Internet, everyone is vulnerable to everything, including malicious software (malware) and people with above-average computer skills, particularly those who use those skills for evil (hackers). Worse are those hackers who like to use email and websites to steal your personal identity information, such as credit card accounts or Social Security numbers (phishing), or those who send out software masquerading as one thing but as soon as you open it, you discover it’s harmful (Trojan horses ...

Get Macs All-in-One For Dummies, 5th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.