Even with
my very limited understanding of security, I don't agree with the assessment of "Macs don't get viruses" - I do agree with the assessment of "Most of the Mac-based malware in the wild is mainly adware that is more of an annoyance and some are phishing attempts that an aware User can probably spot. Macs being compromised by more serious forms of malware are still relatively rare, although vulnerabilities to firmware and ransomware attacks have been established and demonstrated in lab settings. For most Users right now, they can safely use a Mac without massive concerns if practicing good security habits."
For me, when working with the PII of others, it is:
- Use FileVault 2 with a very strong password and disable the iCloud reset feature (so if my AppleID is compromised, it will NOT allow access to my local machine) - I think someone is insane to use any computer without whole disk encryption enabled if using it for any sensitive information at all!
- Use Little Snitch so I know exactly what connections are incoming and outgoing
- Use a strong iCloud/Apple ID password that is unique only to iCloud
- Use a secure password manager App so all of my passwords look like TskTnM3DYs83WNdd6U864QsXVL33hvuF and are unique to that specific login
- Use an open-source encryption program like Veracrypt with sensitive files I work with in my Windows VMs
- Run a solid AV program on my Windows VMs (currently using ESET and Emsisoft)
- When entering sensitive information to be sent over the internet, ensure the cryptography is modern with a TLS check - https://www.ssllabs.com/ssltest/
- Use a browser add-on like HTTPS Everywhere to force all connections to use encryption
- Periodically check the System Preferences --> Security & Privacy --> Privacy tab to see which Apps are granted control of my system (doing this led me to abandon Dropbox completely, because of some the App's behavior wasn't unlike that of malware.)
- Periodically check the launchd folders for any processes starting at startup or login that I do not recognize or want starting.
- Periodically scan with Malwarebytes
- Staying mindful of devices on the wifi network that are vulnerable to attack (e.g., webcams)
- Any higher risk activities (e.g., torrents) are done in a Mac VM that lives on its own SSD, has snapshots enabled, has the firewall enabled, and has a Mac antivirus installed
I've had various AV programs on my system at given times. IMO, they are most useful when a User is very unaware of security concerns (for example, blatant phishing attempts or fake ransomware messages) or when wanting to scan files for Windows-based viruses that did not originate with them that they will be sending files to Windows users.
One limitation I have observed with banking is the deployment of new cryptography among financial institutions. One would think they would be fast to adopt the latest standards. However, that appears to be often untrue. Addressing vulnerabilities to downgrade attacks and other man-in-the-middle attacks were slow, at best, and TLS 1.2 adoption was anything but fast, and the GCM cipher adoption was, in some cases, disturbingly slow. Presumably, TLS 1.3 adoption will not be quick either. Unfortunately, the implication here is that you could do everything right on your end, and still have your data being vulnerable depending on what a company is doing on their end. Again my understanding here is
very primitive.
MacRumors
Bank of America
My knowledge on security is very limited, but why on Earth would they set this order?!?!