Security

Backup strategy for Mac ransomware

  Macs are not immune to ransomware. The first functional Mac ransomware was found in the wild last year. A good backup strategy is critical if you’re hit with this… Read more »

Alternatives to Profile Manager for Macs

  Apple’s Profile Manager is an example of a Mobile Device Management (MDM) system. Despite the “mobile” designation, many MDM systems can manage desktop computers. The Profile Manager is no exception. It can… Read more »

NIST SP 800-179: Securing Apple OS X 10.10 Systems

  I noticed that NIST recently published the Draft Special Publication 800-179: Guide to Securing Apple OS X 10.10 Systems for IT Professionals. I’m looking forward to reading it. The public comment… Read more »

Ditching Adobe Flash on the Mac

  While I’ve kept Flash updated religiously over the years, last month I finally reached the point where the plugin was adversely impacting my Mac Pro’s performance. So I uninstalled… Read more »

iCloud Keychain vs. 1Password

  There are several password manager products available for the Mac and iOS. In this post, I’ll focus on iCloud Keychain (free) and 1Password 5 ($49.99 for the Mac app). There are other… Read more »

Little Snitch first impressions

I started using Little Snitch (version 3.5.1) a couple of weeks ago. It’s software firewall for the Mac, with a primary focus on outbound connections. This is also known as… Read more »

PingFederate Consulting

MacMaven Consulting offers PingFederate architecture, installation, and support services. In the first part of our SSO series, I explained what SSO is, and the special flavor of SSO called federation…. Read more »

SiteMinder Consulting

MacMaven Consulting offers SiteMinder architecture, installation, integration, development, and support services in the New York City area. Introduction to SSO Many large corporations have turned to off-the-shelf software for handling… Read more »

Secure email

  Generally speaking, sending an email over the internet is not secure. The message can be intercepted or even modified before it reaches the recipient. There are several technologies that… Read more »

Apple ID two-step verification

Apple recently added two-step verification to Apple IDs. This optional feature helps thwart hackers from using your Apple ID. This mechanism requires you to enter a four digit code after… Read more »