We all accumulate “trusted devices” in our Apple, Google, and password man-ager accounts, but it’s important to remove devices you no longer use because they could be security risks.

We all accumulate “trusted devices” in our Apple, Google, and password man-ager accounts, but it’s important to remove devices you no longer use because they could be security risks.
Apple’s iCloud Keychain password manager keeps improving, and we now recommend it, especially for those not already using a third-party password manager. Here’s how to use iCloud Keychain to store and enter secure passwords.
If your organization has its own domain for email addresses — [email protected] — set up email authentication to help ensure your email is delivered and your domain can’t be spoofed for phishing.
You’ve chosen Apple devices to run your business. That’s great, but are you still dealing with each of those devices individually? If you hire a new employee, do you go to the Apple Store to buy a new Mac, bring it back to the office, spend a few hours installing the right software, and then […]
Major upgrades aside, we recommend installing updates as soon as they’re available. The danger from unpatched security holes is just too great nowadays.
Although it may feel like you’re having a private conversation with an AI chatbot, don’t share anything you wouldn’t tell a stranger.
We recommend everyone who uses Face ID and Touch ID turn on Stolen Device Protection.
Please be aware of a common phishing scam targeting newly-hired employees.
Don’t let websites send you spammy and fraudulent notifications
By now, you’ve probably seen a new form of update for iOS, iPadOS, and macOS: the Rapid Security Response. Early in May, Apple released the first instances of these updates, which the company had promised for iOS 16, iPadOS 16, and macOS 13 Ventura when those operating systems were first announced. Let’s answer some of the questions we’ve been hearing.