Posts

Stay Safe in 2026 with These New Year’s Resolutions

We’re approaching the end of 2025, so we encourage you to consider your New Year’s resolutions. For many people, the new year offers an opportunity to reflect on habits we’d like to adopt or solidify. Although we support reducing social media use and making other positive lifestyle changes, we’d like to suggest a few additional resolutions to improve your digital security and reduce the risk of bad things happening to you online.

If you read through this list and think, “I’m already doing all that,” then you’re done. Keep up the good work!

Back Up All Your Devices Regularly

The most important thing you can do to avoid digital disasters is to back up your data regularly. Bad things happen to good devices, like a Mac’s SSD failing, an iPhone falling into a pool, or data being lost due to theft, fire, or flood. With a solid backup plan, you can recover from nearly any problem.

For the Mac, the easiest way to back up is to use an external drive with Time Machine, but an off-site or Internet backup is also essential. Backblaze is a good choice, but there are numerous online backup services. For iPhones and iPads, it’s simplest to back up to iCloud, which automatically happens every night if you turn it on in Settings > Your Name > iCloud > iCloud Backup. You can also back up iPhones and iPads to your Mac if you do not have enough iCloud storage space. Apple Watches automatically back up to their paired iPhones, and that Watch data is included in iPhone backups, making restores straightforward. Whatever your setup, restore a few files periodically as a test to make sure your backups are working.

Always Install Security Updates

An important step to enhance your security is to install new operating system updates and security updates promptly after Apple releases them. While the specifics rarely make headlines because they are highly technical and detailed, you can gauge the significance of security updates by noting that a typical update fixes 10–30 vulnerabilities identified by Apple or external researchers. Other security updates include only one or two fixes, as they’re aimed at addressing zero-day vulnerabilities currently being exploited in the wild.

It’s usually wise to wait a few days after an update appears before installing it, in case it causes any undesirable side effects. Although such problems are rare, when they do happen, Apple quickly pulls the update, resolves the issue, and releases a new version, typically within a few days.

Use a Password Manager

We’ll keep emphasizing the importance of a password manager until passkeys—the replacement for passwords—become widespread, which will take years. Until then, if you’re still typing passwords manually or copying and pasting from a list stored in a file, please start using a password manager like 1Password or Apple’s Passwords, which is now pretty good. A password manager provides six significant benefits:

  • It generates strong passwords for you. Password1234 can be hacked in seconds.
  • It stores your passwords securely. Anyone walking by your unlocked Mac can read an Excel file on your desktop.
  • It enters passwords for you. Wouldn’t that be easier than typing them in?
  • It audits existing accounts. How many of your accounts use the same weak password, which has likely been stolen in multiple breaches?
  • It lets you access passwords on all your devices. Logging in to websites is just as easy on the iPhone and iPad!
  • It can store and enter two-factor authentication codes. Whenever possible, protect important accounts with two-factor authentication so even a stolen password won’t provide access.

A bonus benefit for families is password sharing. It allows couples to share essential passwords or parents and teens to share specific passwords.

Using a password manager is quicker, simpler, and more secure. If you need assistance getting started, reach out.

Beware of Phishing Email

Individuals and businesses often experience security breaches due to phishing, which involves fake emails that trick someone into revealing login details, credit card numbers, or other sensitive data. While spam filters catch many of these attacks, you must stay alert. Here’s what to watch out for:

  • Any email that tries to get you to reveal information, follow a link, or sign a document
  • Messages from unfamiliar people, asking you to take an unusual action
  • Direct email from a large company for whom you’re an anonymous customer
  • Forged email from a trusted source requesting sensitive information
  • Urgent threats like “account locked,” “unauthorized charge,” or “action required”
  • All messages that contain numerous spelling and grammatical mistakes

When unsure, avoid clicking the link or replying to the email. Instead, reach out to the sender via another method to verify the message’s authenticity. Legitimate companies—especially Apple, financial institutions, and cellular carriers—will never ask for your password or two‑factor codes by email, text, or voice.

Never Respond to Unsolicited Calls or Texts

Phishing attacks increasingly take place via texts and phone calls—and even some via deepfake audio and video. Because of weaknesses in the telephone system, these messages and calls can appear to come from trusted companies like Apple and Amazon. Other common scams warn about unauthorized logins or payments to trick recipients into calling scammers, advertise fake deliveries with malicious tracking links, or send fake two-factor authentication messages that prompt recipients to click a link to “secure” their account.

Avoid clicking links in texts unless you recognize the sender and it makes sense for you to receive that link. (For example, Apple might send text messages with delivery details for a recently placed order.) Never enter login information on a website you reach through a link because you can’t be sure it’s legitimate. Instead, if you’re interested in more details, go directly to the company’s official website by typing its URL into your browser, then log in from there.

For calls from companies, unless you’re expecting a callback regarding a support ticket you opened, don’t answer—caller ID can be spoofed. Let the call go to voicemail, and if you believe it’s important to respond, look up the company’s phone number from a reliable source and contact someone at that number instead of using the one provided by voicemail.

Avoid Anything Associated with Sketchy Websites

We won’t dwell on this last point, but it’s worth noting that you’re much more likely to encounter malware on fringe websites or those that cater to societal vices. The more you can steer clear of sites that deal with pirated software, cryptocurrency, adult content, gambling, or the sale of illicit substances, the safer you’ll be. That’s not to say reputable sites haven’t been hacked and used to spread malware, but such cases are far less frequent.

Don’t call numbers from pop‑ups or ads, don’t grant remote access, and don’t pay for any service you didn’t seek out unprompted. Instead, go directly to the company’s official site (type the URL) or contact us for help. And never paste commands into Terminal from websites or “verification” pages—you could install malware without realizing it. If you are worried after spending time in the darker corners of the Web, download a free copy of Malwarebytes and manually scan for malware.

Let’s raise a glass to staying safe online in 2026!

(Featured image by iStock.com/Marut Khobtakhob)


Social Media: Kick off 2026 with smart security habits: back up every device, stay current on software updates, outsmart phishing attempts, avoid sketchy sites, and streamline your logins with a password manager.

When Purchasing a Fireproof Safe, Pay Attention to the Details

The devastating losses caused by the Los Angeles wildfires have underscored the need to protect data from catastrophic events. A traditional offsite backup—periodically moving a hard drive to another location—might not have sufficed in areas affected by wildfires, where many structures were destroyed. An online backup using a service like Backblaze or CrashPlan is often a better solution, although it can become costly for multiple Macs, and some individuals and organizations are uncomfortable storing their data online, even with encryption.

What about a safe? Would storing one or more backup drives in a safe provide adequate protection? Possibly, but the details are critical. Some safes are designed solely to guard against theft, focusing on preventing thieves from opening the door. However, paper ignites at 451ºF (it chars around 387ºF), and most house fires reach temperatures between 800ºF and 1200ºF, so you may think that all you need to do is look for a “fireproof” safe. That’s a good start, but paper is actually much more resilient than magnetic and optical media.

Fireproof safes come with ratings that indicate the internal temperature they can maintain, with the most common being:

  • Class 350: Safes maintain an internal temperature of 350ºF, suitable only for paper.
  • Class 150: Safes keep the interior below 150ºF, which should protect magnetic media.
  • Class 125: Safes maintain temperatures under 125ºF, appropriate for optical media.

It is also important to determine how long the safe can maintain that temperature. Generally speaking, a fireproof safe is rated for 1 or 2 hours, indicating it can maintain the specified internal temperature for at least that duration. Time ratings represent minimums, not maximums, so the actual protection time may be longer.

In most cases, the protection time is likely to be longer. That’s because safes are tested in furnaces at temperatures that can be two to three times hotter than the average house fire. For example, Underwriters Laboratory (one of several independent testing labs) conducts tests at 1700ºF or 1850ºF. Additionally, while a house fire may burn for several hours, the average fire will consume everything near the safe within 20 minutes and then move on.

Wildfires are a different story. In extreme conditions, wildfire temperatures can range from 1500ºF to 2200ºF, approaching or exceeding the testing conditions. Wildfires also last longer, so a safe in a destroyed building may remain in embers for hours or even days before it can be recovered.

While temperature over time is the main factor to consider when researching a fireproof safe, also look for two other variables being mentioned as well:

  • Water resistance: Where there’s fire, there’s usually water. Thousands of gallons of water, some of which will undoubtedly affect the safe. Not all fireproof safes are waterproof, so verify whether a specific safe can withstand being doused by firefighters.
  • Impact protection: If the floor collapses, a safe on an upper story could fall a considerable distance. If you are considering such a location, ensure the safe can withstand the impact. To simulate realistic fire conditions, the test may involve withstanding a 30-foot drop onto a concrete floor, followed by reheating.

Finally, remember that if your safe is in a fire, the heat will cause its insulation to swell up, rendering the lock useless, regardless of its type. Typically, you will need to hire a locksmith to access the safe using instructions from the manufacturer.

If you’re going to trust your data to a fireproof safe, do your research to ensure that whatever you buy will meet your needs for fire, water, and impact protection. It won’t be cheap—depending on the size and other factors, a good fireproof safe can cost many hundreds or even thousands of dollars. However, this is one area where you definitely shouldn’t cut corners.

(Featured image based on originals by iStock.com/phive2015 and Hanna Plonsak)


Social Media: If the wildfires in Los Angeles have you considering a fireproof safe to safeguard backups and important documents, make sure to research temperature ratings over time and be mindful of water and impact resistance.

What You Need to Know Before Switching to a New iPhone

Are you planning to upgrade to a new iPhone 16? It’s exciting, we know, but it’s best to proceed deliberately when setting up your new iPhone to avoid causing yourself headaches. Follow these instructions when you’re ready to transfer your data—and, for many people, much of your digital life—to the new iPhone. Apple also has a series of videos you can watch.

  1. Update your old iPhone to the latest version of iOS. If you have an Apple Watch, update it to the latest version of watchOS. This process can take some time, so it may be best done overnight before you move data to your new iPhone.
  2. Make sure you know your Apple ID and password, and if you have an Apple Watch, its passcode. You will likely have to enter them at least once during this process.
  3. Back up your old iPhone to iCloud or your Mac. (If you back up to a Mac, be sure to encrypt the backup, or else it won’t include saved passwords, Wi-Fi settings, browsing history, Health data, and call history.) Or back up to both, for safety’s sake. We prefer iCloud backups because they’re easier and don’t introduce additional variables, like flaky USB cables. If you don’t usually back up to iCloud, Apple will give you temporary iCloud storage to make a backup when moving to a new iPhone. To initiate an iCloud backup, go to Settings > Your Name > iCloud > iCloud Backup and tap Back Up Now.
  4. If you have an Apple Watch, you don’t need to unpair it from your old iPhone at this point in the process. (Later, if the automatic transfer has not worked, you can unpair it manually and pair it again later. If you end up taking the manual route and have a cellular Apple Watch, you’ll be asked if you want to keep or remove your plan. If you’re keeping your Apple Watch to re-pair with your new iPhone, keep the plan.)
  5. You shouldn’t need to worry about transferring a SIM card. If you ordered your new iPhone through Apple and connected to your cellular carrier account during purchase, activating the new iPhone should cause it to take over your phone number. The same should be true if you’ve purchased directly through your carrier. Besides, it’s likely that iPhone 16 models sold in the US will rely on eSIM and lack SIM trays like the iPhone 15, so only non-US users might need to transfer the SIM card from the old iPhone to the new one. Even then, it’s better to contact your carrier and get them to activate the new SIM in the new iPhone because old SIMs don’t always support all current cellular features, such as full 5G support.
  6. Transfer your data, settings, apps, and purchased content in one of these three ways. None of them will be quick, despite the first one’s name, so initiate the transfer only when you have plenty of time:
    • Quick Start: With the Quick Start feature, content from your old iPhone copies directly from your old iPhone to your new one. We recommend this technique because it’s more likely to preserve app logins, something that’s less true when restoring from an iCloud backup. Put your iPhones next to each other (plugged into power), use the old iPhone to scan the animation on the new one, and then follow the rest of the steps.
    • iCloud: With this technique, the new iPhone will download your content from your old iPhone’s iCloud backup. Once you’ve joined a Wi-Fi network on the new iPhone and tapped the Restore from iCloud Backup button, you’ll have to select the correct backup—likely the most recent one you just made. Keep your new iPhone plugged into power the entire time to ensure that all your content syncs during this step.
    • Finder or iTunes: With this approach, you’ll restore your old iPhone’s content from a backup made to your Mac. Connect your new iPhone to your Mac using an appropriate cable, open a Finder window (or iTunes on an old Mac), select your device in the left-hand sidebar, click Restore Backup, and choose the appropriate backup—likely the most recent one.
  7. Perform post-transfer tasks. Ensure that you can make and receive a phone call. If necessary, pair your Apple Watch with the new iPhone. You’ll also need to pair your Bluetooth accessories—including AirPods—with your new iPhone. Plus, some app data needs to sync to your new iPhone, so open the Mail, Contacts, and Calendar apps and check if they have your data. It could take a few minutes for them to fill up. Apps may request notification permissions again, and you may need to download content and in-app purchases.
  8. If you use two-factor authentication with an app like 1Password, Authy, or Google Authenticator, ensure you can get your 2FA codes using your new iPhone. 1Password and Authy are good about providing access to 2FA codes from multiple devices—just log in to your account from each device—but Google Authenticator may require some additional setup since it didn’t initially offer any way to transfer codes to a new phone.
  9. Finally, if necessary, set up single sign-on for work or school. If your workplace or school uses a security system like Duo, you’ll likely want to activate your new iPhone and deactivate the old one. Using any device, navigate to a standard single sign-in login screen from your organization, look for a link for managing your logins, click that link, and follow the prompts.

Although Apple works hard to make the process of transferring from an old iPhone to a new one as painless as possible, some things may fail to transfer seamlessly. For that reason, we strongly recommend holding onto your old iPhone for a week or so to ensure the new one can do everything the old one could. During that time, put the new iPhone through its paces with an eye toward checking every app you need.

(Featured image by iStock.com/valiantsin suprunovich)


Social Media: It’s exciting to get a new iPhone, but take a few minutes to read our advice on what you need to do before—and after—transferring your data from your old iPhone.

Time Machine Now Offers Daily and Weekly Frequencies

Since its inception, Time Machine has backed up on an hourly schedule. It then keeps hourly backups for the previous 24 hours, daily backups for the last month, and weekly backups back to the start of the backup. Once free space on the backup drive gets low, Time Machine deletes older backups to make room for new ones, always maintaining at least one copy of every backed-up file. The traditional hourly backups are usually fine, but starting in macOS 13 Ventura, Apple lets you choose a daily or weekly schedule instead. One of those might be useful for Macs that are turned on infrequently or where very little important data changes. It also might reduce resource usage and how much data Time Machine backs up. Most people shouldn’t need to change the backup frequency, but if you’ve always wanted to, now you can.

(Featured image based on an original by iStock.com/STILLFX)


Social Media: Has Time Machine’s hourly backup frequency been problematic for you? Starting in macOS 13 Ventura, you can instead choose a daily or weekly backup schedule.

Make Sure to Back Up iPhone Photos on Your Mac

If your iPhone were to be stolen or suffer an unfortunate accident, would you lose all your precious photos? Those using iCloud Photos are probably shaking their heads smugly, thinking that all those baby and vacation photos are backed up securely in iCloud. iCloud Photos does indeed store a copy of all your photos, but you shouldn’t assume that everything in it is completely protected. Although it’s extremely unlikely that Apple’s systems would fail so that you’d lose anything, the contents of your iCloud account aren’t as safe as would be ideal.

An Aside to Explain Why iCloud Isn’t Perfectly Secure

Recently, Wall Street Journal reporters Joanna Stern and Nicole Nguyen covered a troubling form of crime aimed at iPhone users in an article (paywalled) and accompanying video. Thieves hang out in bars, looking for users who tap in their passcodes instead of using Face ID or Touch ID. Once they’ve learned someone’s passcode with surreptitious shoulder surfing, they grab the iPhone and run. As soon as they’re clear, they use the passcode to change the user’s Apple ID password and enable or reset a recovery key, which prevents the user from employing Find My to locate and lock the iPhone. Worse, with the passcode, they can make purchases with Apple Pay, access all passwords in iCloud Keychain, and use other information on the iPhone to facilitate identity theft. It’s a disaster.

But it gets worse, as the reporters detail in a new Wall Street Journal article (paywalled) and video. By enabling a recovery key, the thief disables Apple’s normal account recovery process for resetting the Apple ID password. In other words, if this were to happen to you, along with all the financial losses and headaches, you would lose access to your iCloud account, possibly forever, and with it, all your photos in iCloud. With luck, Apple will block this attack soon.

For now, follow this commonsense advice to reduce the chances of being victimized:

  • Pay attention to your iPhone’s physical security in public.
  • Always use Face ID or Touch ID in public.
  • If you must enter your passcode in public, conceal it from anyone nearby.
  • Never share your passcode beyond highly trusted family members.

Backing Up Your iPhone Photos

As with so many other modern ills, good backups go a long way toward minimizing the pain of problems. They won’t prevent someone from stealing your iPhone or locking you out of your account, but if that were to happen, at least you won’t lose all your photos!

There are two possible backup scenarios. Using iCloud Photos and downloading originals to your Mac is easiest but requires that you pay Apple for more storage if you have more than a handful of photos. If you don’t use iCloud Photos, you can just back up your iPhone to your Mac or, better yet, import images into Photos on the Mac and then sync them back. It’s more work and fussier, but doesn’t cost anything.

  • iCloud Photos: When using iCloud Photos, the trick to protecting your pictures is to sync the originals with your Mac. In Photos > Settings/Preferences > iCloud, select Download Originals to this Mac. The only downside of this approach is that you need enough disk space on your Mac to hold them all; if that’s not the case, you may need to move your system Photos Library to an external hard drive.
  • iPhone-only photos: If you aren’t using iCloud Photos, the best approach is to connect your iPhone to your Mac using a USB-to-Lightning cable or Wi-Fi and then import new snapshots into Photos on your Mac manually (select the iPhone in the Photos sidebar). It’s helpful to remove the original photos from the iPhone with the Delete Items checkbox after importing so you can manage them solely on the Mac.

    Then you can sync all the photos (or just desired ones, if your iPhone is low on space) back to your iPhone using the Finder. First, select the iPhone in a Finder window’s sidebar. Then click Photos in the button bar at the top, and select “Sync photos to your device from Photos” along with “All photos and albums” and “Include videos” in the options below. Finally, click Apply or Sync.

    Technically speaking, backing up your iPhone to your Mac without syncing to Photos also backs up your photos, but the only way to get them back is to restore a backup onto an iPhone. It’s much better to have all the photos accessible in Photos too.

Either way, once the photos are on your Mac, you should back up all your data using Time Machine, an Internet service like Backblaze, or a third-party app like Carbon Copy Cloner or SuperDuper. If you’re concerned about the quality of your backups for preserving photos, contact us for advice.

(Featured image by iStock.com/metamorworks)


Social Media: With new reports of iPhone theft victims being locked out of their iCloud accounts, it’s all the more important that you copy your iPhone photos to a Mac and then back up that Mac.

Two Important Tips for External Storage Devices

It’s tempting to think that most external storage devices—whether simple hard drives or more complicated network-attached storage (NAS) units—are relatively similar because they all do roughly the same thing. However, a recent problem with older Western Digital My Book Live NAS devices highlighted that there can be large differences. In that case, hackers figured out how to cause a factory reset that wiped the entire drive of all files. (If you have one, note that Western Digital recommends disconnecting it from the Internet immediately.) Two tips: Although no one could have anticipated this particular problem, ask us before buying external storage because we may be able to recommend known good products or warn you away from sketchy manufacturers. Also, if you store unique data on an external drive, you must back up that drive just like your Mac’s internal drive or risk losing everything, like these My Book Live owners did. Backup, backup, backup!

(Featured image by Western Digital)

Make Sure to Test Your Backup System with Occasional Restores

Did you know that the word for the irrational fear of Friday the 13th is paraskevidekatriaphobia? Neither did we, but what that supposedly unlucky day is good for—whenever it rolls around—is reminding us to test our backup systems. If something does go wrong, backups can save your bacon, but only if they’re actually working. So on Friday the 13th this month, take a few minutes to make sure you can restore files from Time Machine, see if you can boot from your bootable duplicate, and generally verify that your data really is being backed up successfully. And if you’ve already missed the 13th, today is a fine day to make up for it with a quick test.

(Featured image by Adam Engst)