Update your software now

You secure your valuables – your wallets, keys, and homes. You know that, if left unsecured, they can easily be a target for criminals. So it makes sense to think the same way about the information stored on all your electronic devices.

Computers, tablets, phones and other personal devices hold your emails and your financial and tax documents (with your Social Security numbers). Criminals who get access to this valuable information can commit identity theft, put harmful software on your devices, or both.

What’s one easy way to help protect all of this sensitive information? Update your software regularly, and as soon as possible when a newer version comes out. What’s an even easier way? Set the updates to happen automatically. Don’t ignore reminders to update. Criminals look to exploit vulnerabilities before the software companies can fix it. Delaying gives hackers time to access your information – even when a patch is out there to lock them out.

So what software should you be updating?

  1. Security software. Whether you use antivirus or firewall programs that were pre-installed on your device or that you bought on your own, make sure they’re up to date.
  2. Operating system software. Your operating system could be Windows, Apple OS, etc. If you’re not sure how to update your operating system, go to the website of your device manufacturer for help.
  3. Internet browsers and apps. Both are access points for criminals to enter your devices, so it’s important to keep them secure. 

For browsers, the Safari and Google Chrome browsers update themselves. For Firefox, go to the Firefox menu and choose “About Firefox” which will open a window and offer to download the latest update (if pending).

For iPhones and iPads, go to Settings:General:Software Update and turn on Automatic Updates.

For MacOS, we recommend going to System Preferences:Software Update and clicking on the Advanced… button (you will need to enter your Admin password) and setting your preferences this way, so that only the most major updates won’t be automatically applied for you:

Looking for more tips on how to stay safe online? Check out FTC.gov/OnGuardOnline.

It’s all too much!

What’s that you say? You’d rather just have a Macintosh consultant based in Denver just do it for you and be done with it? Absolutely! Contact us and we will get it done for you!

Want to remove your private info from the web?

Google your name – go ahead. Include some easily discoverable facts: the city where you live, the name of your employer, and maybe your middle name. 

If you’re like most people, the results page will be full of data brokers offering your address, your phone number, your email, the names of your relatives and their addresses, and so much more. In a world rife with random scams, this is a problem. 

Thankfully, there is something you can do about it. 

While removing all personally identifiable information from the internet is extremely difficult, there are a few simple steps you can take to snip the low-hanging fruit. If you’re simply worried about your privacy in general, then this act of privacy hygiene can go a long way. 

A good first stop is the World Privacy Forum, a nonprofit “dedicated to reimagining privacy in a digital era.” The organization has an extremely detailed opt-out list for data brokers, with the respective links and steps needed to remove your info from the companies’ sites. More broadly, the WPF put together what it calls the top 10 opt-outs — a detailed step-by-step guide to pulling your information from the data brokers of the world. 

Want the schools you’ve attended to stop releasing your home address and phone number? Check the FERPA opt-out information. How about an easy and direct way to get on the National Do Not Call Registry? WPF has that, too. 

Ready for more? Stop Data Mining Me, a website that bills itself as the “Do Not Call” list for data brokers, has its own opt-out list. Consumer Reports also has a helpful list of its six recommended opt-outs

Importantly, the above is by no means an exhaustive list, and should not be considered that way. However, if you have a morning to spare and want to better protect your privacy, it’s a great place to start. 

So go ahead and get clicking. Your newfound privacy will thank you later. 

Want some help? Feel overwhelmed? You could use a good Macintosh consultant from Denver – We are here to help you. Contact us and we will get it done together!

How to Encrypt your Mac’s Hard Drive

You may have heard of the words “FileVault” and “encryption” relating to your Mac’s hard drive, and you may be wondering if you should use this higher level of security and if it is easy to implement. The answer to all of this is “yes”. Even though you’ve already protected your Mac with a login password, encryption takes your safety and security to a whole new level.

How does Encryption work?

Encryption is industrial-level protection for your drive, such that probably no one, short of the NSA, would be able to retrieve your data should your device be lost or stolen. Apple has really improved their full-disk encryption in the last years (known as FileVault) so that it is easy to set up, and using it is basically transparent to the user.

About the only difference a user will notice is that upon boot-up, you will be asked for your login password right away, as that is required to unencrypt the entire drive.

  1. Choose Apple menu > System Preferences, then choose Security & Privacy.
  2. Click the FileVault tab.
  3. Then click the padlock in the lower left corner, and enter an administrator name and password.
  4. Click the “Turn On FileVault” button.

If other users have accounts on your Mac, you might see a message that each user must type in their password before they will be able to unlock the disk. For each user, click the Enable User button and enter the user’s password. OS X automatically enables any user accounts that you add after turning on FileVault.


Choose how you want to be able to unlock your disk and reset your password, in case you ever forget your password:

  • If you’re using OS X 10.9 or newer, you can choose to store a FileVault recovery key with Apple by providing the questions and answers to three security questions. Choose answers that you’re sure to remember.
  • If you’re using OS X 10.10 or later, you can choose to use your iCloud account to unlock your disk and reset your password (I recommend this choice).
  • If you don’t want to use iCloud FileVault recovery, you can create a local recovery key. Keep the letters and numbers of the key somewhere safe—other than on your encrypted startup disk.

IMPORTANT: If you lose or forget both your OS X account password and your FileVault recovery key, you won’t be able to log in to your Mac or access the data on your startup disk.

When FileVault setup is complete, your Mac restarts and asks you to log in with your account password. Your password unlocks your disk and allows your Mac to finish starting up. FileVault requires that you log in every time your Mac starts up, and no account is permitted to log in automatically.


After your Mac starts up, encryption of your startup disk occurs in the background as you use your Mac. This takes time, and it happens only while your Mac is awake and plugged in to AC power. You can check progress in the FileVault section of Security & Privacy preferences. Any new files that you create are automatically encrypted as they’re saved to your startup disk

Encrypting Your Backup Drive

In addition to encrypting your hard drive, you can also encrypt your backup drive(s). (If you have an existing backup drive, skip to the next section.)

  1. Launch System Preferences by selecting the System Preferences item from the Apple menu.
  2. Select the Time Machine preference pane.
  3. In the Time Machine preference pane, click the Select Backup Disk button.
  4. In the drop-down sheet which displays available drives that can be used for Time Machine backups, select the drive you wish Time Machine to use for its backups.
  5. At the bottom of the drop-down sheet, you’ll notice an option labeled Encrypt backups. Place a checkmark here, and then click the Use Disk button.
  6. A new sheet will appear, asking you to create a backup password. Enter the backup password, as well as a hint for recovering the password. When you’re ready, click the Encrypt Disk button.
  7. Your Mac will start encrypting the selected drive. This can take quite a while, depending on the size of the backup drive. Expect anywhere from an hour or two to a whole day.
  8. Once the encryption process is complete, your backup data will be secure from prying eyes, just like your Mac’s data.
password hint

What if I already have a backup drive?

If you have an existing (unencrypted) drive that you want to convert to being encrypted, follow these steps first:

In System Preferences:Time Machine, click on the “Select Drive” button. Highlight your existing drive and press the “Remove Disk” button.

selecting drive to encrypt

Once you’ve done that, then press the “Select Drive” button again. This time select that same drive, but also check the checkbox that says, “Encrypt backups”.

If your Mac complains and says that it cannot encrypt the drive, then you will need to use Disk Utility to erase the drive first, and then start from the beginning.

Wait – I think I need some help…

That is why we are here, to help you with every step of this if you want. Contact us and we will get it done for you!

Colorado’s Consumer Data Protection Law – Does it affect you?

In September of 2018, Colorado implemented some of the strictest laws in the U.S. concerning data breaches and the resulting reporting requirements. If you do any kind of business in Colorado, including capturing names and email addresses on your website (also known as Personally Identifying Information, or PII), then these laws affect you. This is… Continue Reading

Cleaning Up Safari Passwords

A Handy Tip for Cleaning Up Passwords in Safari The number one challenge for Mac users that I regularly hear about from my clients is dealing with passwords. This includes deciding on passwords to use with new services, as well as making sure passwords are never shared across services. If you use a password manager… Continue Reading

Skype 7 – Is It Really Almost Dead?

Yes, the Sad Day is Coming Soon Support for Skype 7 will end on Nov‍emb‍er 1, 2‍01‍8 on desktop devices. When support ends, Microsoft will begin requiring updates to version 8. Although you may be able to use older versions for a little while, they encourage you to update soon to avoid any interruption. Microsoft… Continue Reading

The Four Computer Dreads – Part 4: Ransomware & Scams

Ransomware is a form of malicious software (or malware) that, once it’s taken over your computer, threatens you with harm, usually by denying you access to your data. The attacker demands a ransom from the victim, promising — not always truthfully — to restore access to the data upon payment. Ransomware attacks are typically carried… Continue Reading

iPhone Spam Calls and Text Messages

What can I do about all these robocalls? The most common recommendation from security experts is to simply not answer your phone from numbers you do not recognize. That said, you’re probably still receiving voice messages that are clearly from robotic electronic recordings – robocalls. There are a number of apps you can run on… Continue Reading

The latest scam is from… AppleCare Tech Support???

Two different scams have become very prevalent in the last two weeks, with scammers escalating their tactics, and both of the scams seemingly involve Apple or AppleCare Tech Support. Both are bogus and both use social engineering to trick and scare you into doing some thing they want you to do. The so-called AppleCare Tech Support… Continue Reading

The Four Computer Dreads – Part 3: Phishing

Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication (like an email). According to the 2013 Microsoft Computing Safety Index, the annual worldwide impact of phishing could be as high as US$5… Continue Reading

Troubleshooting, small business networks,
Macs, iPads, and printers
Device syncing, backups,
passwords and email accounts
OS and app optimization and updates, and
preventive maintenance