Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Mobile
    • Networking
    • PC Hardware

    Create a Non-Admin Account

    By
    Jeff Burt
    -
    April 10, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Create a Non-Admin Account

      1

      The default account on Mac OS X is an administrator user, which malware writers can leverage to infect a computer. Create a non-admin user for everyday tasks like checking email and Web browsing. This can limit the damage from threats and malware attacks, according to Kaspersky’s Raiu.

      2Use a Secure Web Browser

      2

      Users should look for a browser that contains a sandbox and has a strong track record of quickly fixing security issues, Raiu said. He recommends Google’s Chrome for several reasons, including the fact that it’s updated more often than Apple’s built-in Safari browser. It also has a sandboxed version of Flash Player, which creates significant hurdles for malicious exploits.

      3No Standalone Flash Player

      3

      Users should uninstall the standalone Flash Player, which has become a popular target for hackers who are looking to take control of computers. In addition, an old version of Flash Player puts users at a heightened risk when browsing the Internet, according to Raiu.

      4Ditch Java

      4

      Like Flash Player, Java is a popular target for exploit writers who want to plant malware on systems. Kaspersky suggests uninstalling Java from the machine completely. A problem, Raiu said, is that Apple doesn’t let Oracle update Java for Mac completely. Instead, Apple officials do the updating themselves, and usually several months late. That means the window of exposure for Mac users is much longer than for PC users. If a user must use Java for specific applications, they should at least disable Java in Safari and other Web browsers.

      5Update and Patch When Necessary

      5

      Many of the recent attacks against Mac OS X have taken advantage of old or outdated software. Among the most commonly exploited suites are Microsoft Office, Adobe Reader, Acrobat, and Java. That said, there are other applications that also can be abused. Whenever a user sees Apple’s “Software Update” prompt, they should apply the fixes and reboot the systems when necessary.

      6Use a Password Manager

      6

      Included in Mac is a built-in password manager, called the “Keychain,” which can help deal with phishing attacks. When possible, users should generate unique, strong passwords for their resources and keep them in the keychain instead of relying on simpler passwords that are easier to remember. When a cyber-criminal compromises an account, they will immediately try the same password in other places, like Gmail, Facebook, eBay, etc. Having a strong, unique password on each resource will boost a user’s online security, Raiu said.

      7Use a Password Manager

      7

      Included in Mac is a built-in password manager, called the “Keychain,” which can help deal with phishing attacks. When possible, users should generate unique, strong passwords for their resources and keep them in the keychain instead of relying on simpler passwords that are easier to remember. When a cyber-criminal compromises an account, they will immediately try the same password in other places, like Gmail, Facebook, eBay, etc. Having a strong, unique password on each resource will boost a user’s online security, Raiu said.

      8Enable Full Disk Encryption or FileVault

      8

      In Mac OS X “Lion” Apple updated the FileVault encryption system—now known as FileVault 2—and added full disk encryption. If a laptop is stolen, having the entire disk—rather than just the home folder—encrypted can be helpful.

      9Upgrade Adobe Reader

      9

      Given that Adobe Reader remains a popular target of cyber-criminals, users should update it to version 10 or later, according to Kaspersky. Users can get the latest version from the download page at Adobe.

      10Install a Good Security Solution

      10

      The idea that Macs don’t get viruses should be buried by now, Raiu said, given the growing number of attacks, such as the recent Flashback Trojan. Now, Mac users must install a strong security solution on their systems.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×