Posts

Reveal Your Desktop Quickly with a Keyboard Shortcut

The Mac’s Desktop is a remarkably useful place. It’s a good spot for in-progress documents, screenshots, images dragged out of Web pages, and more. However, app windows tend to obscure the Desktop, making it harder to use. There are two quick ways you can temporarily hide windows, making it easy to access icons on the Desktop. In macOS 13 Ventura, in System Settings > Desktop & Dock, click the Shortcuts button at the bottom and assign a keyboard shortcut to Show Desktop (we like the Right Option key). Or click Hot Corners and choose Desktop for one of the corners. (In macOS 12 Monterey and earlier, look in System Preferences > Mission Control.) Then, press that keyboard shortcut or put your pointer in that corner to move your windows aside temporarily. When you’re done, press the key or move the pointer there again to put the windows back.

(Featured image based on an original by iStock.com/AmnajKhetsamtip)


Social Media: The Mac’s Desktop is a great place for in-progress documents, screenshots, and other things you’re working on, but only if you can get to it easily. Read on for two little-known tricks for temporarily pushing windows aside.

How Often Should Macs Be Replaced?

It’s a question as old as the personal computer. When should you replace your current Mac with a new model that’s faster and more capable? If money were no object, the answer would be easy—whenever you feel like it. For the rest of us, and particularly for organizations with multiple Macs and limited budgets, the question is harder to answer. But answer it we must because most of us can’t do our jobs without a Mac.

Let’s first look at some of the things that might encourage you to upgrade:

  • Performance and resale value: Many companies and large organizations swap out their Macs every 3 to 5 years. That’s considered the sweet spot where performance starts to decline, but resale value remains relatively high. Plus, Macs of that age start to have more problems that may require repair, resulting in lost productivity due to downtime.
  • Hardware limitations: At some point, you might feel your Mac is too slow—you’re seeing the spinning beachball frequently, or tasks are taking too long to complete. Another common concern crops up when you frequently have to shuffle files around to deal with low disk space on the startup drive. Or perhaps the battery life of a Mac laptop isn’t always sufficient for your needs—losing hours of productivity while on an airplane without seat power can be problematic.
  • macOS support: Although there’s no requirement that you run the latest version of macOS, being unable to upgrade is a hint that your Mac is getting older. Apple provides security updates for the two versions of macOS before the current one, so if your Mac can’t stay within that update circle, it will become more vulnerable to security exploits.
  • Physical damage: Macs are fairly durable, which often keeps them running even when the screen is cracked, a key sticks sometimes, or the case has been dented. The more damage your Mac has, the more likely it is that something else will go wrong, potentially at an inconvenient time.
  • General flakiness: It’s hard to quantify this, but an older Mac might start to feel slow, crash more often, or act weirdly. Sometimes those problems can be resolved by reinstalling macOS and apps from scratch, but that’s a lot of work and far from guaranteed.
  • Repair support: Apple guarantees that it will provide parts and service for all products within 5 years of when Apple last distributed them for sale. After that, Apple considers the products “vintage” for the next 2 years and will repair them subject to parts availability. Apple considers products pulled from the market more than 7 years before to be “obsolete” and won’t repair them apart from Mac laptops that are eligible for an additional battery-only repair period.
  • Shiny new Mac: Sometimes, it’s easy to delay a new Mac purchase because none of the Macs seem quite right. At other times, however, the exact Mac you want will be released just when you need it, making for an easy decision.

With those variables in mind, let us offer recommendations for different audiences:

  • Large-fleet organizations: It’s probably not worth the time to consider the needs of every employee in the context of what Mac they have. Instead, create a policy for replacing Macs on a 3- to-5-year schedule you can build into your annual budget. When it’s time to replace a particular Mac, swap it out for a comparable new model and send the old one to a resale organization.
  • Small-fleet organizations: For companies and nonprofits with a smaller number of Macs and a smaller budget, stick with the same 3- to 5-year schedule, but instead of automatically replacing each Mac as its number comes up, use it as an opportunity to evaluate the user’s needs and then either replace the Mac or set the next evaluation date. You may end up replacing Macs slightly less often, perhaps every 4 to 6 years. It’s also more likely that old Macs will be handed down rather than resold.
  • Creatives and freelancers: If you live and die by the work you can accomplish on your Mac, pay regular attention to whether your Mac is meeting your needs. You’ll probably start to notice issues in 3 to 5 years, and as soon as you do, start watching Apple’s releases to see what new Mac might be the best replacement. Also, consider saving a small amount per month with the idea that you’ll have enough to buy your new Mac about the time the old one noticeably starts to cut into your productivity.
  • Home users: As long as the Mac meets your needs and can run a version of macOS that’s receiving security updates, there’s no harm in continuing to use it for 8 years or more. However, if it starts to need hardware repairs and repeated consultant visits, that’s an indication that you should spend the money on a new Mac instead. Once it can no longer run a supported version of macOS, it’s time for a replacement.
  • Fixed budgets: We get it—sometimes there’s no money for a new Mac. Assuming you can accomplish what you need to do and avoid sketchy parts of the Internet, go ahead and run your current Mac into the ground. It could last 10 years or more. And when it comes time to replace it, there’s no shame in looking to the used market—all those Macs that others are replacing often come up for sale at bargain prices.

We hope this has given you some structure for thinking about replacing Macs, whether you’re worried about the Mac on your desk or all those in the entire design department. And, of course, feel free to contact us for help putting together a replacement schedule.

(Featured image by iStock.com/Prykhodov)


Social Media: When should you replace the Mac on your desk—or your organization’s Macs? There is no single answer, but we run down some variables that play into the decision and make recommendations for different use cases.

What’s the Difference between Removing and Deleting an App?

There are many reasons you might want to get rid of apps from your iPhone or iPad. To begin, touch and hold on a blank spot on a Home Screen to enter “jiggle mode.” Then tap the ⊝ icon for any app to see the question about whether to delete the app entirely or merely remove it from the Home Screen. Delete the app if you don’t want to use it anymore or need to reclaim the space it occupies. (You can download it from the App Store again.) Remove the app from the Home Screen if you want to reduce clutter, keep the app on your device, and don’t mind opening it from the App Library (swipe left past all the Home Screens) or from Search (swipe down from the middle of the screen).

(Featured image based on an original by iStock.com/Photosbypatrik)

Quickly Put Lots of Files in a Folder with One Command

Imagine that you’re working with a bunch of files, and you want to put a set of them in a new folder. You could stop what you’re doing, make a new folder, select all the files, and drag them into the folder, like an animal. Or you could take advantage of a slick Finder command that Apple added in macOS 11 Big Sur. Simply select the files you want to put in a folder, Control-click one of them, and choose New Folder with Selection (X Items) from the top of the contextual menu. A folder called “New Folder With Items” appears, with your selected files inside. This feature may not be life-changing, but some people use it often.

(Featured image by iStock.com/ArLawKa AungTun)

Find Devices and People from Your HomePod

This feature evokes one of those “living in the future” moments for us. The recently released HomePod Software 16.3 now supports Find My, which means you can ask Siri to locate one of your devices or a friend or family member who shares their location with you. If you have a HomePod, ask Siri, “Where is my iPhone?” Assuming your HomePod has updated (and if not, update it manually in the Home app), Siri will respond by causing your iPhone to play a sound. Or ask where someone is—Siri will respond with more details for nearby people and city locations for those far away.

(Featured image based on an original by Apple)

Need to Back Up or Export a Messages Conversation? Try PDF or iMazing

Occasionally, we hear from a client who needs to document a Messages conversation with timestamps, perhaps as part of a lawsuit. The only way to do that on an iPhone or iPad is to take a series of screenshots, but if you have a Mac, there are additional options. The easiest approach is to select the conversation, choose File > Print, and save it as a PDF. If you need a different format, try the macOS iMazing app, which can export all or selected messages from an iPhone backup in PDF, Excel, CSV, and text. It can also export attachments. The trial version lets you extract up to 25 items, and it’s only $39.99 if you have more significant iPhone exporting needs.

(Featured image by iStock.com/Morakot Kawinchan)

Is Your Wi-Fi Network a Security Risk?

With Wi-Fi security, it’s easy to fall into the “out of sight, out of mind” trap. Your Wi-Fi router probably lives in a corner or closet, and of course, Wi-Fi’s radio waves are invisible. But the ease of connecting your devices to your Wi-Fi network means it’s equally as easy for a hacker to connect to your network and eavesdrop on your traffic. Or rather, it’s easy unless you take advantage of the security options available in every Wi-Fi router.

Before looking at those options, let’s discuss the importance of securing your wireless network. The fact is, we all send sensitive data over Wi-Fi and onto the Internet. That data includes passwords, financial information, and personal details, all of which could be used for identity or outright theft. For those who work at home, it may also include important corporate credentials and information. In addition, if your Wi-Fi network is open for everyone and has a bandwidth cap, you could be throttled or incur additional charges due to extra usage from someone using your network without your knowledge. Worse, someone could engage in illegal activity from your network, potentially putting you at legal risk.

Here are six ways you should secure your Wi-Fi network, plus another that’s usually not worth the effort. Exactly how you go about these tasks varies depending on your Wi-Fi router, but they should all be easy to accomplish.

1. Change Your Wi-Fi Router’s Default Password

Every Wi-Fi router has an app- or Web-based administrative interface where you can adjust settings, including security options. The first thing you should do when setting up a new Wi-Fi router is change the password for accessing that admin interface. (And if you didn’t do that when you set up your current Wi-Fi router, go do it now. Immediately. We’ll wait.) The default passwords are well known to hackers, who can use them to take over routers and turn off all the other security settings.

2. Change the Default Network Name (SSID)

Every Wi-Fi network has a name—technically an SSID, or Service Set Identifier. There’s no security benefit in changing it to anything in particular, but you should change it from the default name. That’s because default names often identify the router’s manufacturer, such as “Netgear” or “Linksys,” and some routers have known vulnerabilities or password styles that make it easier to break in. Of course, the main advantage of changing the network name is that it makes it easier to pick out from any other nearby networks.

3. Update Your Wi-Fi Router’s Firmware

Wi-Fi router manufacturers frequently fix security vulnerabilities and release new firmware versions. Check to make sure your Wi-Fi router has the latest firmware available, and if there’s an option for it to update its firmware automatically, turn that on.

4. Disable WPS (Wi-Fi Protected Setup) If Possible

When you connect a new device to your Wi-Fi network, you need to enter your Wi-Fi password. That’s entirely reasonable, and Apple devices automatically offer to share that password with your other Apple devices and other people in your Contacts. More generally, a technology called Wi-Fi Protected Setup (WPS) was designed to enable connecting without typing the Wi-Fi password, either by entering an 8-digit PIN or pressing a button on the router. The button is fine—no one can connect without physical access to the router. But the PIN is horribly insecure and can be brute forced with readily available cracking software. If your router supports WPS—not all do, happily—turn it off entirely.

5. Create a Guest Network

You’ll probably want to give visitors access to your Wi-Fi network so they can get to the Internet. The best way to do that is to create a guest network—a feature in nearly all Wi-Fi routers—separate from your main Wi-Fi network. It has a different name and password, and its traffic is isolated from yours, ensuring that even if a hacker were to access it, they wouldn’t be able to eavesdrop on your communications. It can have a simpler password since all it’s protecting is your bandwidth. One additional tip—put “Internet of Things” devices like smart appliances, video game consoles, and the like on your guest network to ensure they don’t provide access to your main network’s traffic if they’re hacked. You probably won’t want to do that with HomeKit devices, which will work better on the same network as your Apple devices.

6. Use Strong WPA2 or WPA3 Encryption

After changing the default admin password, this is the second-most important piece of Wi-Fi security advice. All traffic on a Wi-Fi network can (and should) be encrypted so hackers can’t eavesdrop with impunity. The first wireless security protocol was WEP (Wired Equivalent Privacy), which was commonly used from the late 1990s through 2004. Unfortunately, WEP is so easily broken today that it’s no longer considered secure. If you still use WEP, immediately switch to WPA2 (Wi-Fi Protected Access). There’s also WPA3, which is even more secure but is available only in hardware sold in the last few years.

Don’t Bother Hiding Your SSID

Finally, you may see suggestions that you should hide your Wi-Fi SSID, which prevents nearby devices from displaying it when they list available networks. That might seem like it would improve security, but all it does is prevent the sort of people who aren’t a threat anyway from seeing it. Anyone with the necessary software and skills to break into an unprotected or weakly protected Wi-Fi network can still detect and access a hidden network. They might even be more interested in what’s there, given that the network owner took the trouble to hide it. As long as you follow all the other advice in this article, there’s no benefit in hiding the SSID as well.

Bonus Advice: Use a VPN When on Public Wi-Fi Networks

Ensuring the security of your Wi-Fi network is essential, but what about public Wi-Fi networks in coffee shops, hotels, and airports? Because they’re open to anyone within range, they’re insecure by definition, and anyone on the network could theoretically see any other user’s traffic. Don’t panic. Most Web connections now use HTTPS, which encrypts traffic between you and the destination site (look for https at the start of URLs or a lock icon in the address bar of your Web browser). To ensure that all traffic is protected from prying eyes, use a VPN (Virtual Private Network), which creates an encrypted pipe from your computer to a VPN server elsewhere. Many organizations provide or even require VPN use so that traveling or remote employees can’t inadvertently use unencrypted connections. If your organization doesn’t have a VPN now but would like to set one up, contact us.

(Featured image by iStock.com/CASEZY)


Social Media: As more personal and work information passes through Wi-Fi networks, it becomes increasingly important that you follow this advice to secure your network.

How to Share a Contact Card without Sharing Everything in iOS 16

Apple makes it easy to share contact cards on the iPhone or iPad—just scroll down in a contact and tap Share Contact. But what if you don’t want to share every piece of data on that card? To avoid oversharing in iOS 16 or iPadOS 16, tap Filter Fields at the top of the Share sheet and deselect the private items. If the card has a lot of data and you want to share only a few items, tap Deselect All Fields at the bottom of the sheet and select only what you want to share. Unfortunately, your selections aren’t remembered if you share the same card again later, so be sure to reset your selections each time you share.

(Featured image by iStock.com/diane39)

You Can Use Face ID in iOS 16 on Newer iPhones When You’re Lying on Your Side

If you’ve ever tried to use Face ID to unlock an iPhone while lying on your side in bed, you may have noticed that it didn’t work. That’s because Face ID used to require that the iPhone be upright, in portrait mode. In iOS 16, however, Apple has improved Face ID so it will unlock your iPhone even when you’re lying on your side and the iPhone is in landscape orientation. Alas, this capability requires an iPhone 13 or iPhone 14, but if you have one of those phones, give it a try in bed tonight—you don’t need to adjust any settings.

(Featured image by iStock.com/Kateryna Onyshchuk)

Use Quick Look to Preview Spotlight Results in Ventura

When you search using Spotlight on the Mac, it provides a decent amount of information about each result, including name and other metadata. But what if you want to see what’s behind the search result? In macOS 13 Ventura, Apple added Quick Look support to Spotlight so you can easily preview the search results. Do a search, click or use the arrow keys to select a search result, and then press the Space bar to open it in a Quick Look window. It even renders websites!

(Featured image based on an original by iStock.com/Nastco)