Posts

Website Owners: Identifying Copyright Infringement Link Insertion Scams

We regularly warn Internet users about online scams and phishing attacks. Most of these are relatively easy to identify and avoid once you’re aware of telltale signs. Unfortunately, we’ve encountered a newer type of scam that’s more difficult to identify, partly because it plays on fears of legal action.

Website owners are the target of this scam email, which purports to come from a lawyer. The message states that an image on your site has been used without permission. Such a claim is all too believable for many, especially those who may not have been as careful about usage permissions in the distant past as they are today. The message includes a link to the image, a link to the purportedly infringing page, and a threat to initiate legal action if certain actions aren’t taken within five business days

Unusually, the email doesn’t ask you to take down the infringing image or pay a retroactive licensing fee. Instead, it says you must credit the image’s copyright holder and include a link. Such a simple request seems like a huge win—instead of paying a licensing fee or worrying about being sued, you can twiddle a little HTML and move on with your life.

Don’t do it! This is what’s called a “link insertion scam.” It exploits the search engine optimization principle that links on reputable sites provide legitimacy to linked sites, helping them move up in the search rankings. Unfortunately, the reverse is also true; linking to a scammer from your website will cause Google and other search engines to penalize your site in the search rankings.

Unfortunately, these copyright infringement scams look legitimate at first glance, as you can see in this example. The From and Subject lines don’t seem forged or malformed, and there are no obvious grammatical errors or indications that the writer doesn’t speak fluent English. And when you click the link in the signature, you end up at what appears to be the website of a real law firm. What should you do if you receive a message like this?

First, don’t panic. Just because the message looks legitimate doesn’t mean it comes from a real lawyer. Also, don’t call your lawyer unless they’re willing to work for free. You can save stress, time, and money by evaluating the message yourself.

A few details in the message suggest that it’s not real:

  • The domain in the From line’s email address—elitejusticeadvisors.biz—sounds sketchy and doesn’t match the company name.
  • The Subject line of “DMCA Copyright Infringement Notice” sounds official, but those familiar with the DMCA will know that it can be used only for a formal notice-and-takedown process, not to make demands for attribution or payment. But most people won’t know that.
  • The message is addressed to the generic “Dear owner of,” whereas legitimate messages from a lawyer would be addressed to a specific entity.
  • The required link URL points to a telecom news site in Sri Lanka, and it’s odd that an Arizona lawyer would be working for such a client.
  • The example of the purportedly infringing image is hosted at Imgur, a consumer image-hosting site known for funny pet pictures and cringeworthy GIFs. Legal firms would always use some sort of case management site.

Those details may feel wrong, but they’re insufficient to prove it’s a scam. You’ll need to dig deeper. Here are some ways you can do that:

  • Investigate the domain: Do a Web search on the domain in question: elitejusticeadvisors.biz. Because others have written about this scam, articles identifying it as a scam will appear on the first page of the results.
  • Search for the lawyer and firm: The lawyer’s name is too generic to yield revealing results, but if you do a Web search on “Dean Parker Commonwealth Legal Services,” you’ll once again see that others have identified it as a scam.
  • Check a state bar association directory: Most state bar associations or state courts have a searchable directory of licensed legal professionals. A quick search of the State Bar of Arizona’s member directory reveals that no “Dean Parker” is licensed in Arizona.
  • See if the headshot matches a real person: If the website provides a headshot, you can copy the image (Control-click it and choose Copy Image) and paste it into the TinEye reverse image search engine. Since all the results say “generated.photos,” it’s a good bet that the image was AI-generated.
  • Search for the company’s full name and address: As with the name of the lawyer, the generic-sounding name of the law firm will probably match other companies. However, if you search for the full name and address, you’ll likely turn up articles about it being fake.
  • Visit the address virtually: With Apple Maps and Google Maps, you can verify that a business is present at a location (or not) and often view the offices using Google Street View. Both mapping tools show no law firm at the provided address. Additionally, the building does not have a fourth floor, as specified in the address.
  • Ask ChatGPT: Now that ChatGPT has access to current Web information, it’s worth pasting the complete contents of the message into a ChatGPT conversation and asking it to tell you about the message. Start generally, but then ask if it thinks the message might be a scam, and if so, to suggest ways you could verify your suspicions.

Some of the above search suggestions identify the scam only because the scammer has reused the same company name, lawyer name, physical address, and website. If you were the first to be targeted by a new scam, the state bar association search and physical address check would be the most likely to expose it.

Let us leave you with an important caveat. You shouldn’t assume that all copyright infringement messages are scams. A legitimate DMCA takedown notice will ask you to remove the content, and a real copyright infringement message—probably from a company that specializes in such matters rather than a lawyer—will likely demand payment. In both cases, take down the offending image right away. If you really were using an image without permission, some payment may be required, and if the amount feels excessive, contact a lawyer specializing in copyright infringement cases. They may be able to negotiate a lower payment or point out issues that will make the claim go away.

(Featured image based on an original by iStock.com/Olivier Le Moal)


Social Media: If you receive what looks like a copyright infringement message complaining about an image on your website, don’t panic—it might be a scam. We help you identify such scams and explain what to do if the message turns out to be real.

Understanding the Key Differences Between Personal and Managed Apple IDs

In the Apple world, the account that controls access to all your Apple-related online services is the Apple ID. Buying apps from the App Store, putting photos in iCloud Photos, and sharing data between iCloud-enabled apps—all these actions rely on your Apple ID. If you’re a regular Apple user, you have an Apple ID associated with your email address.

Most Apple users set up an Apple ID when they configure their first Apple device, and if you don’t have an email address that you want to use, you can create a free @icloud.com address during the process. (If you need to create a new Apple ID, you can do that at appleid.apple.com.)

There are actually two types of Apple IDs: personal Apple IDs used by individual users and managed Apple IDs given to employees by businesses and other organizations. Managed Apple IDs are popular with companies that give devices to staff members and need to ensure compliance with various usage and security policies. Let’s look at how they differ:

  • Creation, ownership, and control: Individuals set up personal Apple IDs on their own and maintain full ownership over the account and control over the device. Managed Apple IDs are set up by the organization, typically through Apple Business Manager, and the organization retains ownership and control for centralized management. That control is essential when an employee leaves. Otherwise, a company may be unable to reset a returned device and give it to another employee.
  • Access to Apple services: Personal Apple IDs have full access to all Apple services and features. Managed Apple IDs have much more limited access to protect the organization from unauthorized purchases and insecure behavior. Users with managed Apple IDs can’t purchase anything from the App Store, iTunes Store, or Apple Books. Nor can they access Apple Arcade, Apple Fitness+, Apple Music, Apple Music radio, Apple News+, or Apple TV+. The Find My, Health, Home, Journal, and Wallet apps aren’t available or fully functional. Plus, Apple Pay, iCloud Family Sharing, iCloud Mail, and iCloud+ services like Private Relay, Hide My Email, and custom email domains are unavailable.
  • Security and management: When a device relies on a personal Apple ID, that user is responsible for maintaining security and managing apps (which will belong to the user). That’s appropriate for individuals, but for companies that need to protect corporate information, managed Apple IDs allow the IT department to enhance security by requiring passcodes, enforcing password policies, setting role-based permissions, and separating work and personal data. On the management side, managed Apple IDs make it easier to reset devices, revoke access, comply with legal and privacy regulations, integrate with corporate identity systems, and centralize app licensing.

Though some organizations may prevent it, it is technically possible to use both types of Apple IDs on the same device. For instance, you could use a managed Apple ID on an employer-provided device along with a personal ID to access the App Store, Apple Music, Apple News+, and other Apple services. To do that on an iPhone, you’d go to Settings > Your Name > Media & Purchases and either sign in with your personal Apple ID or, if necessary, tap Sign Out and sign back in.

What’s the takeaway? There are three possibilities, depending on who owns the device and the employer’s security and management policies:

  • Personal device not used for work: If you’re a regular user who has purchased your own device and you either don’t use it for work or your employer doesn’t care what you do, all you need is a single personal Apple ID. Although it’s possible to create multiple Apple IDs and use them for different purposes, it’s a recipe for confusion down the road.
  • Personal device used for work: If your employer has a BYOD (Bring Your Own Device) program that lets you use your own device with corporate resources, they will likely ask to use Apple’s User Enrollment to create a profile on the device that separates personal and work data and allows the use of both personal and managed Apple IDs. Although the IT department cannot access your personal data (emails, messages, photos, location, etc.), it can enforce security policies, install and configure work-related apps, and control corporate data on the device. Some people find the privacy implications of this approach troubling and opt for separate work and personal devices.
  • Employer-provided device: If your employer provides a device for your use, they will likely require you to use a managed Apple ID on it. That prevents you from having to worry about security or management, but comes with some restrictions on what you can do. Talk to your IT department if you also want to use your personal Apple ID on the device.

Hopefully, we’ve clarified the situation surrounding personal and managed Apple IDs. Which makes the most sense in any given situation depends on a wide range of variables, so contact us if you need to talk through the possibilities as either an employee or employer.

(Featured image based on an original by iStock.com/dolgachov)


Social Media: There are actually two types of Apple IDs: personal and managed. Regular users have personal Apple IDs; those who use employer-provided devices are often required to use managed Apple IDs. Learn more about both.

Tame the Tangle! Quick Cable Management Tips

Take a moment and look behind your Mac. Do you see a tangle of cables? The main downside of a mess of cables is that it’s a cluster of chaos that attracts dust bunnies. However, it’s possible for power cables—especially when tightly bundled or looped—to emit electromagnetic interference that can disrupt or degrade the signal carried by nearby data or network cables. They can also heat up, which is generally best avoided. Plus, the more tangled the cable nest, the more likely you’ll cause harm if you pull too hard while attempting to remove a cable from the tangle.

Also, consider cables that extend beyond your desk. Do you have power cables that run across the ground or Ethernet cables that loosely snake up into the ceiling? To protect both people and equipment, ensure that cables aren’t a tripping or catching hazard.

If your cables are a complete disaster, take some time to shut down your devices, disconnect all the cables, clean underneath, and reconnect them in an organized fashion, removing unused cables and replacing damaged or unnecessarily long cables with new ones.

To keep your cables under control going forward, follow these tips:

Select and reduce cables:

  • Buy and use cables that are only as long as they need to be.
  • When buying new cables, prefer braided cables, which catch less and last longer.
  • If you have many cables, try to trim the number with judicious use of docks or hubs.
  • Upgrade to wireless accessories, like the Magic Keyboard and Magic Trackpad, that only need to be plugged in occasionally to charge.

Pay attention to cable location:

  • Try to keep cables off the floor, but use a floor cord cover if it’s unavoidable.
  • Attach long runs of network cabling to the wall or floor to reduce the chance of accidents.
  • Run cables through raceways or inside cable trays to keep them together under desks.
  • Add adhesive cable clips to the back or underside of desks without cable management options.
  • Ensure cables don’t interfere with workstation ergonomics, especially with movable sit/stand desks.
  • Keep power adapters away from other cables for better heat management.

Group your cables:

  • Use Velcro straps or cable ties to bundle power and data cables separately.
  • Avoid bundling too many power cables too tightly to avoid heat buildup.
  • Label cables with their type and use so you can easily distinguish between them.
  • Store extra cables in clear zip lock bags or bins, one per cable type.

Maintain your cables:

  • Throw out any damaged or suspect cables right away.
  • Periodically check and reorganize your cables, removing any that aren’t in active use.

You should be able to find a wide variety of cable management accessories, such as Velcro cable ties, cable labels, cable clips, and floor cord covers, at your preferred electronics retailer.

None of these suggestions are difficult to follow, and you’d be surprised how much you will appreciate having neatly organized cables in use and available when you need them.

(Featured image by Adam Engst)


Social Media: Do you have a rat’s nest of random cables behind your Mac? Follow our quick tips to bring order to the mess, reduce the chance of accidents, and avoid degraded data signals.

The Importance of Staying Updated

Does it feel like your Apple devices are always asking you to install operating system updates? You’re not wrong—from September 2022 to January 2024, we saw the following releases in Apple’s previous set of operating systems:

  • macOS 13 Ventura: 20 releases
  • iOS 16: 25 releases
  • iPadOS 16: 20 releases
  • watchOS 9: 15 releases
  • tvOS 16: 12 releases

Apple issued many of those at the same time, but since you might not use all your devices every day, it can seem as though you spend all your time installing updates. As annoying as updating can be, we encourage you to do so soon after you’re notified for three reasons.

Reason One: Fewer Bugs

First, as has always been the case, updates fix bugs. You may not have experienced all the bugs that Apple fixes, but when one blocks something you want to do, the fix comes as a huge relief.

For instance, in a set of releases in January 2024, Apple inadvertently introduced a bug that caused text in many apps, including Mail, Notes, and Safari, to appear to be duplicated and overlap. It was only cosmetic, and switching to another window or resizing the window would make it look right again. But the bug was hugely disconcerting, so Apple fixed it two weeks later in macOS 14.3.1 Sonoma, iOS 17.3.1, iPadOS 17.3.1, and Safari 17.3.1 (which brought the fix to macOS 13 Ventura and macOS 12 Monterey).

Reason Two: Better Security

Second, many of the bugs Apple fixes won’t impact your experience of using your device, but they make it possible for attackers to steal information, install malware, spy on your communications, or even take over your entire device. Nearly all of Apple’s operating system updates contain security fixes to address newly discovered vulnerabilities, and some releases only have security fixes. Apple continues to release security updates for the last two versions of macOS and older versions of iOS and iPadOS as appropriate.

It’s easy to think that you won’t be impacted by security vulnerabilities, but remember that as soon as Apple releases an update outlining what it has fixed, attackers know what vulnerabilities exist in unpatched systems. Apple has to react swiftly to some reported vulnerabilities because blocking them can literally be a matter of life or death when it comes to, for instance, iPhone-using dissidents, activists, or journalists working in opposition to repressive governments that employ spyware against their enemies. (All spyware relies on previously unidentified vulnerabilities.)

However, some security vulnerabilities are more likely to impact regular users. For instance, in macOS 14.2.1, Apple fixed a bug in Screen Sharing. If you were sharing your full screen with someone else and had multiple Spaces, Screen Sharing could show the other person random windows in other Spaces, which could range from embarrassing (adult pictures) to seriously problematic (passwords or financial details).

Reason Three: New Features

Third, on the positive side, many operating system releases introduce welcome new features. When Apple unveils its next set of operating systems at the Worldwide Developer Conference in June, some of the promised features won’t appear with the initial releases. New features that shipped in later releases of macOS 14 Sonoma, iOS 17, iPadOS 17, and watchOS 10 include:

  • watchOS’s double-tap gesture for tapping the default button in many apps
  • AirDrop transfers continuing over the Internet when you move out of AirDrop range
  • Adding NameDrop to share contact info when you bring two devices near each other
  • Additional options to control when the iPhone screen shuts off in StandBy
  • The option to choose a specific album for the Lock Screen’s Photo Shuffle wallpaper
  • HomeKey support for Matter locks
  • Expanded Favorites in the Music app
  • A new automatic Favorite Songs playlist in the Music app
  • The addition of Apple’s Journal app
  • A Translate option for the Action button in the iPhone 15 Pro models
  • 10-day precipitation forecasts in the Weather app
  • Sharing of eligible passes in the Wallet app via NameDrop-like proximity
  • A catch-up arrow in Messages that lets you jump to the first unread message
  • Multiple timers in the Clock app on the Mac
  • Stolen Device Protection for the iPhone
  • Collaborative playlists in Apple Music
  • Support for streaming content to TVs in select hotel rooms using AirPlay

Just Update It

Updates provide both a carrot (user-facing bug fixes and new features) and a stick (security fixes). That’s why we recommend updating soon after Apple pushes out a new release and why devices under management usually receive updates quickly. Even if a security breach is unlikely, the liability of allowing devices to remain unpatched is too high for most organizations. Installing updates is an easy way to reduce worry about things like compromised accounts and ransomware.

There are three types of operating system releases:

  • Minor bug fix and security updates: Install these as soon as convenient, usually within a few days. Examples of these include macOS 14.3 to 14.3.1.
  • Interim feature updates: Because these include bug fixes and security updates alongside the new features, you’ll also want to install these within a few days. An example is iOS 17.2.1 to iOS 17.3.
  • Major version upgrades: Because Apple always releases security updates for the two versions of macOS before the current one, you can wait a month or three before installing a major upgrade, such as from macOS 13 to macOS 14. However, once you’ve verified that your apps and workflow are compatible with the new version, we recommend upgrading because skipping a major version of macOS often results in a more difficult upgrade experience.

In each of these cases, if you’re worried about how an update might impact your workflow, check online forums for discussions of each update and feel free to ask us what we recommend for your particular situation.

(Featured image by iStock.com/Fokusiert)


Social Media: We know it seems like your Apple devices are constantly asking you to install an update. Other than for major upgrades, we recommend updating shortly after updates appear so you can take advantage of bug fixes, security updates, and new features.

Concerned by the Privacy or Results of Google Search? Try These Other Search Engines

Google is big. Google Search generated $225 billion in revenue in 2022, thanks in part to being the default search engine on all Apple devices. To retain that position—and continue to reap the ad revenue that it generates—Google pays Apple about $18 billion every year. Along with Apple, Google pays billions to phone manufacturers like Samsung, LG, and Motorola; major wireless carriers such as AT&T, T-Mobile, and Verizon; and browser developers like Mozilla and Opera.

So is Google Search’s 90% market share because it’s the best search engine or because Google has enough money to pay distributors for top placement?

Along with concerns about whether Google is the best search engine, some people worry about Google collecting information about them to show targeted ads alongside search results. The more information Google has on users, the argument goes, the better that ads can be targeted, and the more likely it is that users will click the ads, which generates money for Google from advertisers. Others worry that Google’s results may reflect certain types of bias.

If you’re perturbed by the privacy implications of Google knowing everything you search for, or if you’ve found Google’s search results less helpful than you’d like, you can easily switch to another search engine to see if you prefer its results and privacy stance.

How to Switch Search Engines

For many Apple users, the main place to choose a preferred search engine is in Safari’s settings. On the Mac, choose Safari > Settings > Search and choose the desired search engine from the Search Engine pop-up menu. You can choose a different one for Private Browsing windows if you want.

In Chrome-based browsers like Google Chrome, Arc, Brave, Microsoft Edge, and Opera on the Mac, open the settings and look for Search Engine. A pop-up menu lets you choose from some standard options, and additional choices let you add search engines like Brave Search that are too new (or not paying) to appear. Firefox offers similar options when you choose Firefox > Settings > Search.

On the iPhone and iPad, go to Settings > Safari >  Search Engine. Again, if you want a different search engine in Private Browsing tabs, turn off Also Use in Private Browsing and choose another option.

Top Alternative Search Engines

Conceptually, what search engines do is simple—they search a set of Web pages for matching keywords and return a list of them in order of relevance to the user. The hard part is dealing with the number of pages—estimates suggest Google indexes 50 billion pages and Bing 4.5 billion—and scaling the service to respond instantly to tens or hundreds of millions of queries per day. (Google processes 8.5 billion searches per day; Bing handles 400 million.) Beyond Google, here are the main search engines and what sets them apart. (You will also likely see Yandex, sometimes called “the Google of Russia.” Avoid it. For so many reasons.)

  • Bing: The second-most popular (though far, far behind Google) search engine in the world, Microsoft’s Bing sets itself apart with a busy, highly designed search results page that mixes a variety of results. It may work well for you, or you may find it overwhelming and difficult to parse. Microsoft is also putting a lot of effort into chat-based AI-powered results. Bing claims to offer more user privacy than Google, but it’s still tracking users to target ads better. If Bing has better privacy than Google, it may mostly be due to not being part of the larger Google data-collection empire.
  • Yahoo: Though it was the first Web search engine, Yahoo hasn’t run its own index since 2009. Today, Yahoo’s search results are powered by Microsoft Bing, so while the look of the search results page may differ, the results should be identical to Bing’s. Yahoo’s privacy stance is also similar to Bing’s.
  • DuckDuckGo: If privacy is paramount, DuckDuckGo is worth a look because it does not track or store user information at all. Instead, it chooses ads to display only by matching with search keywords. Although it uses Bing for some of its results, DuckDuckGo also incorporates information from numerous other sources, so it won’t seem like an exact clone of Bing.
  • Ecosia: The main reason to use the Berlin-based Ecosia is if you like Bing’s results (but not its layout) and want to support a “social business” that claims to be carbon-negative, offers full financial transparency, and protects users’ privacy. Founded in 2009, Ecosia today relies entirely on Bing’s search results and ads (clicks on which are how Ecosia earns money), and it claims to have planted over 188 million trees in 35 countries since its inception. It’s hard to argue with Ecosia’s environmental results, but as a search engine, it doesn’t feel special.
  • Brave Search: A truly independent search engine, Brave Search relies on its own created-from-scratch index (it leaned on Google and Bing for some results early on, but ceased in August 2023). It also emphasizes user privacy and doesn’t track users, searches, or clicks. Although Brave Search displays keyword-based ads by default, users can pay $3 per month for Brave Search Premium, which provides ad-free results pages. You’ll have to set Brave as the default search engine for most browsers manually; for Safari, all you can do is make a favorite to search.brave.com.
  • Kagi: Speaking of paid search engines, if you really want to avoid ads, Kagi is another independent search engine that rolls its own index and provides access only to subscribers, eschewing ads entirely. You can sign up for a 100-search test account, and if you like it, pay $5 per month for 300 searches or $10 per month for unlimited searches. As with Brave Search, you must manually set Kagi as the default search engine (there’s an extension for Safari).

The “best” search engine is the one that gives you the answers you want without triggering privacy worries or concerns about bias. If you want to see if something other than Google will work better for you, set it as your default search engine and try it for a few weeks.

(Featured image by iStock.com/Prykhodov)


Social Media: Have you become disillusioned by Google due to its search quality or how it tracks your activity to serve targeted ads? You can try other search engines that promise to protect your privacy and provide independent search results.

With Storms Increasing, Protect Your Tech Gear from Damaging Power Fluctuations

It has been a tough year for extreme weather events. While the connection between weather and technology may seem tenuous, heat waves, high winds, and lightning strikes can play havoc with all sorts of powered and networked electronic devices.

Anything that causes power fluctuations—spikes, surges, sags, brownouts, and blackouts—can hurt your tech gear. Protecting your most vulnerable devices doesn’t have to be expensive, but don’t be complacent because you plug your Mac into a cheap surge protector you’ve had since college. And note that many power strips offer no surge protection at all.

First off, why are power fluctuations problematic? There are two scenarios:

  • Too little power: Sags and brownouts are drops in voltage; a sag is a short-term dip, whereas brownouts last longer. Blackouts are complete power outages. Although they’re less damaging than surges, sags and brownouts can cause electronic devices to behave erratically or crash, and the fluctuation in voltage—particularly when coming back from an outage—can stress components. Losing power entirely will cause you to lose any unsaved work and possibly end up with document or even drive corruption.
  • Too much power: Spikes and surges are sudden, brief increases in voltage; the difference is that spikes are shorter than surges. Either way, the excessive power can degrade or damage sensitive electronic components, reducing lifespan or causing immediate failures.

The best solution to these scenarios is an uninterruptible power supply (UPS). Put simply, a UPS is a big battery into which you plug your Mac and other peripherals. It then plugs into a wall outlet and monitors the incoming power. If the power surges, falls below a certain threshold, or fails outright, the UPS switches the power source to its internal battery. This happens so quickly that your Mac never even notices.

If your gear is plugged into a UPS when a blackout hits, you get some time to save your work and shut down gracefully, ensuring that you don’t lose data or flirt with drive corruption. A UPS also protects against spikes and surges, filtering out the excess voltage so it can’t harm the devices plugged into it. The downsides to UPSes are that they’re an extra expense, their batteries need replacing every few years, and they take up space under your desk. For a home or small office UPS, consult Wirecutter’s recommendations. For larger installations, contact us.

If power outages are rare in your location, you may prefer to rely on a surge protector instead of a UPS. As the name implies, surge protectors filter out voltage spikes and surges so they won’t damage your gear. Surge protectors are smaller and less expensive than UPSes, and while they don’t have batteries to fail, their protection circuitry degrades over time, so they should be replaced every few years as well. Better surge protectors alert you or stop working entirely when they can no longer provide protection. Again, Wirecutter has good recommendations.

If most of your expensive tech gear is battery-powered, you could forgo even a surge protector. Outages aren’t an issue, and a MacBook or iPhone power adapter will protect against most sags, brownouts, spikes, and surges. The power adapter may incur damage, but it’s inexpensive to replace.

One final thought. No UPS, surge protector, or power adapter can protect against a direct lightning strike. Lightning is too fast and too powerful—it’s millions or even hundreds of millions of volts. Even turning your equipment off isn’t sufficient because lightning that has traveled miles through the air to hit the ground can easily jump across an open switch. If lightning strikes are common in your area, unplug your most expensive devices entirely during severe storms.

To sum up:

  • For a desktop Mac and peripherals, a UPS is a worthwhile investment if you ever suffer from power outages. Also, consider a UPS for essential networking gear—cable modems, routers, switches, and network-attached storage.
  • If power outages are extremely rare, or for equipment that doesn’t need to remain on during an outage, get a good surge protector. If it doesn’t automatically disable itself when it’s no longer effective, write the date on the bottom and replace it in a few years.
  • Although there’s no harm in doing so, it’s not necessary to plug battery-powered device chargers into a surge protector or UPS. A spike or surge may damage them, but they’ll probably sacrifice themselves to protect your gear.
  • When in doubt during severe storms, unplug your most valuable equipment to protect against a direct lightning strike.

(Featured image by iStock.com/HardRockShotz)


Social Media: How can you protect your tech gear from unexpected power fluctuations? A UPS is best in some scenarios, but a not-too-old surge protector is often sufficient.  You can also let your Apple chargers do their job without worrying about what they are plugged into.

The Hardware You’ll Need to Run Apple’s 2023 Operating Systems

At Apple’s Worldwide Developer Conference in June, the company unveiled the upcoming versions of its operating systems: macOS 14 Sonoma, iOS 17, iPadOS 17, watchOS 10, and tvOS 17. They won’t be available until September or October of 2023, and even once they ship, we recommend waiting a few weeks before upgrading your smaller Apple devices and holding off on macOS upgrades for a couple of months.

Regardless, it’s worth considering how these operating systems might impact your plans to buy new hardware in the next six months. Any Apple device you purchase now—or have bought in the last five years—can run the new operating systems. But some devices that can run the current macOS 13 Ventura, iOS 16, and iPadOS 16 won’t be upgradable to their replacements later this year. More importantly, some older devices that can be upgraded won’t support all the new features.

Here’s what you’ll need and compatibility gotchas to keep in mind.

macOS 14 Sonoma

For macOS 14 Sonoma, Apple has dropped support for Mac models released before 2018. That works out to five models across the iMac, MacBook Pro, and MacBook product lines. If you rely on one of those Macs and want to run Sonoma, think about when it would make sense to buy a new Mac, perhaps in early 2024. By then, all new Macs will likely ship with Sonoma. These Macs can run Sonoma:

  • iMac: 2018 and later
  • iMac Pro: 2017
  • MacBook: None
  • MacBook Air: 2018 and later
  • MacBook Pro: 2018 and later
  • Mac mini: 2018 and later
  • Mac Pro: 2019 and later
  • Mac Studio: 2022 and later

The specific 2017 Mac models that are stuck at Ventura are:

  • iMac: 21.5-inch and 27-inch
  • MacBook Pro: 13-inch and 15-inch
  • MacBook: 12-inch

Unsurprisingly, some new features in Sonoma require sufficient processing power that they work only on Macs with Apple silicon—one of the M1 or M2 chips.

  • Game Mode: This special mode automatically gives games top priority on the CPU and GPU, lowering usage for background tasks. It also reduces latency for wireless accessories, like game controllers and AirPods, for improved responsiveness.
  • Just “Siri”: Although dropping “Hey” from the “Hey Siri” trigger phrase works on all iPhones with iOS 17 and iPads with iPadOS 17, it requires a Mac with Apple silicon or when using the AirPods Pro (2nd generation).
  • Made for iPhone hearing aids: Apple-compatible hearing aids can now be paired directly with Macs, but only those with an M1 Pro, M1 Max, M1 Ultra, or M2. That works out to the MacBook Pro (14-inch, 2021), MacBook Pro (16-inch, 2021), Mac Studio (2022), and all Macs with the M2.
  • Presenter Overlay: You can keep your image visible while sharing your screen on a video call, either in front of the shared screen or in a small movable bubble.
  • React with your hands: During video calls, 3D augmented-reality reaction effects like hearts, confetti, and fireworks can be triggered with hand gestures, but only on Macs with Apple silicon or when using Continuity Camera with an iPhone 12 or later.
  • Screen Sharing performance improvements: Apple has radically improved the performance of the Screen Sharing app over high-bandwidth connections, but it requires the advanced media engine in Apple silicon.

If you’re unsure which Mac you have, choose About This Mac from the Apple menu.

iOS 17

With iOS 17, Apple has maintained the same cutoff date as Sonoma, supporting all iPhone models released in 2018 and later. That means you’ll be able to run iOS 17 on these iPhones:

  • iPhone 14/Plus/Pro/Pro Max
  • iPhone 13/mini/Pro/Pro Max
  • iPhone 12/mini/Pro/Pro Max
  • iPhone 11/Pro/Pro Max
  • iPhone SE (2nd generation or later)
  • iPhone XR/XS/XS Max

Practically speaking, these iOS 16-compatible devices won’t be able to upgrade to iOS 17:

  • iPhone X
  • iPhone 8/8 Plus

Several new iOS 17 features have more restrictive system requirements.

  • Enhanced autocorrect: iOS 17 enhances autocorrect so it works better (and yes, it will let you use curse words), and it temporarily underlines autocorrected words so you can see which ones were changed. It requires an iPhone 12 or later.
  • Inline predictions: Similarly, inline predictions of what you’re going to type—so you can just accept the suggestion rather than tapping out all those letters—require an iPhone 12 or later.
  • Point and Speak: Those with vision disabilities might appreciate the Point and Speak feature that makes it easier to interact with physical objects that have text labels, but it works only on the Pro models of the iPhone 12, iPhone 13, and iPhone 14.
  • React with your hands: The hand-triggered video call reactions require an iPhone 12 or later.

If you can’t remember which iPhone model you have, go to Settings > General > About and look next to Model Name. This works for the iPad, too.

iPadOS 17

It’s more involved to determine whether your iPad can upgrade to iPadOS 17 because there are four different iPad model types with varying capabilities. These models can run iPadOS 17:

  • iPad Pro 12.9-inch (2nd–6th generation)
  • iPad Pro 11-inch (1st–3rd generation)
  • iPad Pro 10.5-inch
  • iPad Air (3rd–5th generation)
  • iPad (6th–10th generation)
  • iPad mini (5th & 6th generation)

While that list encompasses a lot of iPads, a simpler way to look at it is that only three iPad models that can run iOS 16 won’t be able to upgrade to iOS 17:

  • iPad Pro 12.9-inch (1st generation)
  • iPad Pro 9.7-inch
  • iPad (5th generation)

Because Apple extended overall iPadOS 17 compatibility somewhat further back than it did with iOS 17 and macOS Sonoma, quite a few iPadOS 17 features work only on select models:

  • Back-to-back Siri requests: Although all iPhones will let you issue multiple requests to Siri without reactivating it, on the iPad, the feature works only on an iPad Pro 12.9-inch (3rd generation and later), iPad Pro 11-inch (1st generation and later), iPad Air (3rd generation and later), iPad mini (5th generation and later), or iPad (8th generation and later).
  • Enhanced autocorrect: This improvement to typing requires an iPad Pro 12.9-inch (5th generation and later), iPad Pro 11-inch (3rd generation and later), iPad (10th generation), iPad Air (4th generation and later), or iPad mini (6th generation).
  • External display cameras: If you want to take advantage of an external display’s camera while it’s attached to the iPad, you’ll need an iPad Pro 12.9-inch (3rd generation and later), iPad Pro 11-inch (1st generation and later), iPad (10th generation), iPad Air (4th generation and later), or iPad mini (6th generation).
  • FaceTime with Apple TV: Using an iPad’s mic and camera for FaceTime on an Apple TV 4K (2nd generation) requires an iPad Pro 12.9-inch (3rd generation and later), iPad Pro 11-inch (1st generation and later), iPad (8th generation and later), iPad Air (3rd generation and later), or iPad mini (5th generation and later).
  • Inline predictions: Getting suggestions about what to type next on the iPad requires an iPad Pro 12.9-inch (5th generation and later), iPad Pro 11-inch (3rd generation and later), iPad (10th generation), iPad Air (4th generation and later), or iPad mini (6th generation).
  • PDF AutoFill: iPadOS 17 will use machine learning to analyze PDFs, and if it detects a form, you can fill it out automatically using your contact information. But only if you’re using an iPad Pro 12.9-inch (3rd generation and later), iPad Pro 11-inch (1st generation and later), iPad Air (3rd generation and later), iPad mini (5th generation and later), or iPad (8th generation and later).
  • React with your hands: As with the iPhone and Mac, only some models let you trigger reactions with gestures: the iPad Pro 12.9-inch (5th generation and later), iPad Pro 11-inch (3rd generation and later), iPad (10th generation), iPad Air (4th generation and later), and iPad mini (6th generation).
  • Screen Distance: This health-related feature is supposed to encourage kids to hold the iPad farther away to reduce the likelihood of developing myopia. But how many kids read on an iPad Pro 12.9-inch (3rd generation and later) or iPad Pro 11-inch (3rd generation and later)?

watchOS 10

The Apple Watch has a simple upgrade story: every model compatible with watchOS 9 can also run watchOS 10. That means everything from the Apple Watch Series 4 up through the Apple Watch Ultra, including the Apple Watch SE. (Look in the Watch app on your iPhone if you can’t remember which model you have.)

Two of the new features promised for watchOS 10 work only on specific models:

  • The NameDrop feature that lets you transfer contact information wirelessly with just proximity works with all iOS 17-compatible iPhones, but it can communicate only with an Apple Watch SE, Apple Watch Series 6 or later, or Apple Watch Ultra.
  • The Time in Daylight feature that helps parents track whether their kids are spending the recommended 80–120 minutes per day outside requires an Apple Watch SE (2nd generation), Apple Watch Series 6 or later, or Apple Watch Ultra.

tvOS 17

As with the Apple Watch, the Apple TV upgrade situation is easy to understand: tvOS 17 will run on the Apple TV HD and Apple TV 4K (1st and 2nd generation), just as with tvOS 16.

However, note that the promised option to let you use the mic and camera from an iPhone or iPad for FaceTime calls on the Apple TV works only if you have an Apple TV 4K (2nd generation). That might be the first real reason to upgrade from an older Apple TV.

(Featured image by Apple)


Social Media: Later this year, Apple will release macOS 14 Sonoma, iOS 17, iPadOS 17, watchOS 10, and tvOS 17. Here’s the hardware you’ll need to run these operating systems—and to support some of the whizzier features.

Apple Starts Releasing Rapid Security Responses for the iPhone, iPad, and Mac

By now, you’ve probably seen a new form of update for iOS, iPadOS, and macOS: the Rapid Security Response. Early in May, Apple released the first instances of these updates, which the company had promised for iOS 16, iPadOS 16, and macOS 13 Ventura when those operating systems were first announced. Let’s answer some of the questions we’ve been hearing.

What are Rapid Security Responses?

Rapid Security Responses are security updates that Apple wants to distribute as quickly and broadly as possible. Users often delay installing standard operating system updates because they’re huge downloads, interrupt work for a long time while installing, and occasionally cause new problems.

To address these concerns, Rapid Security Responses are much smaller, install far more quickly (sometimes without a restart), and can easily be removed if they cause problems.

What security vulnerabilities do Rapid Security Responses address?

Apple released no security notes for its first set of Rapid Security Responses, and we don’t anticipate that changing for future releases. The point of a Rapid Security Response is to block a serious vulnerability that’s likely being exploited in the wild, and Apple doesn’t describe such fixes until it has patched vulnerable operating systems, including older versions, tvOS, and watchOS, none of which can take advantage of Rapid Security Responses. If this last set of updates is any indication, Apple will identify the Rapid Security Response fixes in security notes for the next full operating system update, which will also include the same fixes.

How do I install a Rapid Security Response?

Rapid Security Responses use the same software update mechanism as Apple’s other operating system updates. You can and generally should let Rapid Security Responses install automatically. That’s the default, but check to make sure.

  • iOS/iPadOS: Go to Settings > General > Software Update > Automatic Updates, and look at “Security Responses & System Files.”
  • macOS: Go to System Settings > General > Software Update, and click the ⓘ next to Automatic Updates. Then look at “Install Security Responses and system files.”

On recent iPhones and Macs, the installation time was quick, with the device being ready to use again within 2–4 minutes, including a restart. Older devices took longer, and future Rapid Security Responses may take more or less time.

How can I revert if a Rapid Security Response causes a problem?

Apple makes this easy in both iOS/iPadOS and macOS, with the amount of time being roughly similar to how long the Rapid Security Response took to install:

  • iOS/iPadOS: Go to Settings > General > About > iOS/iPadOS Version, tap Remove Security Response, and confirm the action.
  • macOS: Go to System Settings > General > About, click the ⓘ next to the macOS version, click Remove & Restart, and confirm the action.

How can I tell if I’m running a Rapid Security Response?

With this first Rapid Security Response, iOS and iPadOS both posted a notification informing the user of the update; macOS did not.

More generally, devices updated with a Rapid Security Response will have a letter after their version number, such as 16.4.1 (a), and the letter will disappear with the next full update, such as iOS 16.5. To determine what version your devices are running:

  • iOS/iPadOS: Go to Settings > General > About, and look at the iOS/iPadOS Version line.
  • macOS: Choose About This Mac from the Apple menu, and look at the macOS line.

Given what we know now, we recommend that everyone install Rapid Security Responses as soon as they’re available. If you notice a problem afterward, you can remove it. The only caveat is that if your employer manages your device, they may prefer to delay the Rapid Security Response installation until they’re comfortable with the changes.

(Featured image by iStock.com/champpixs)


Social Media: In an effort to protect users from security vulnerabilities that are being actively exploited, Apple has introduced Rapid Security Responses, which are security updates that are quick to download, quick to install, and easily removed if necessary.

Make Sure to Back Up iPhone Photos on Your Mac

If your iPhone were to be stolen or suffer an unfortunate accident, would you lose all your precious photos? Those using iCloud Photos are probably shaking their heads smugly, thinking that all those baby and vacation photos are backed up securely in iCloud. iCloud Photos does indeed store a copy of all your photos, but you shouldn’t assume that everything in it is completely protected. Although it’s extremely unlikely that Apple’s systems would fail so that you’d lose anything, the contents of your iCloud account aren’t as safe as would be ideal.

An Aside to Explain Why iCloud Isn’t Perfectly Secure

Recently, Wall Street Journal reporters Joanna Stern and Nicole Nguyen covered a troubling form of crime aimed at iPhone users in an article (paywalled) and accompanying video. Thieves hang out in bars, looking for users who tap in their passcodes instead of using Face ID or Touch ID. Once they’ve learned someone’s passcode with surreptitious shoulder surfing, they grab the iPhone and run. As soon as they’re clear, they use the passcode to change the user’s Apple ID password and enable or reset a recovery key, which prevents the user from employing Find My to locate and lock the iPhone. Worse, with the passcode, they can make purchases with Apple Pay, access all passwords in iCloud Keychain, and use other information on the iPhone to facilitate identity theft. It’s a disaster.

But it gets worse, as the reporters detail in a new Wall Street Journal article (paywalled) and video. By enabling a recovery key, the thief disables Apple’s normal account recovery process for resetting the Apple ID password. In other words, if this were to happen to you, along with all the financial losses and headaches, you would lose access to your iCloud account, possibly forever, and with it, all your photos in iCloud. With luck, Apple will block this attack soon.

For now, follow this commonsense advice to reduce the chances of being victimized:

  • Pay attention to your iPhone’s physical security in public.
  • Always use Face ID or Touch ID in public.
  • If you must enter your passcode in public, conceal it from anyone nearby.
  • Never share your passcode beyond highly trusted family members.

Backing Up Your iPhone Photos

As with so many other modern ills, good backups go a long way toward minimizing the pain of problems. They won’t prevent someone from stealing your iPhone or locking you out of your account, but if that were to happen, at least you won’t lose all your photos!

There are two possible backup scenarios. Using iCloud Photos and downloading originals to your Mac is easiest but requires that you pay Apple for more storage if you have more than a handful of photos. If you don’t use iCloud Photos, you can just back up your iPhone to your Mac or, better yet, import images into Photos on the Mac and then sync them back. It’s more work and fussier, but doesn’t cost anything.

  • iCloud Photos: When using iCloud Photos, the trick to protecting your pictures is to sync the originals with your Mac. In Photos > Settings/Preferences > iCloud, select Download Originals to this Mac. The only downside of this approach is that you need enough disk space on your Mac to hold them all; if that’s not the case, you may need to move your system Photos Library to an external hard drive.
  • iPhone-only photos: If you aren’t using iCloud Photos, the best approach is to connect your iPhone to your Mac using a USB-to-Lightning cable or Wi-Fi and then import new snapshots into Photos on your Mac manually (select the iPhone in the Photos sidebar). It’s helpful to remove the original photos from the iPhone with the Delete Items checkbox after importing so you can manage them solely on the Mac.

    Then you can sync all the photos (or just desired ones, if your iPhone is low on space) back to your iPhone using the Finder. First, select the iPhone in a Finder window’s sidebar. Then click Photos in the button bar at the top, and select “Sync photos to your device from Photos” along with “All photos and albums” and “Include videos” in the options below. Finally, click Apply or Sync.

    Technically speaking, backing up your iPhone to your Mac without syncing to Photos also backs up your photos, but the only way to get them back is to restore a backup onto an iPhone. It’s much better to have all the photos accessible in Photos too.

Either way, once the photos are on your Mac, you should back up all your data using Time Machine, an Internet service like Backblaze, or a third-party app like Carbon Copy Cloner or SuperDuper. If you’re concerned about the quality of your backups for preserving photos, contact us for advice.

(Featured image by iStock.com/metamorworks)


Social Media: With new reports of iPhone theft victims being locked out of their iCloud accounts, it’s all the more important that you copy your iPhone photos to a Mac and then back up that Mac.

How Often Should Macs Be Replaced?

It’s a question as old as the personal computer. When should you replace your current Mac with a new model that’s faster and more capable? If money were no object, the answer would be easy—whenever you feel like it. For the rest of us, and particularly for organizations with multiple Macs and limited budgets, the question is harder to answer. But answer it we must because most of us can’t do our jobs without a Mac.

Let’s first look at some of the things that might encourage you to upgrade:

  • Performance and resale value: Many companies and large organizations swap out their Macs every 3 to 5 years. That’s considered the sweet spot where performance starts to decline, but resale value remains relatively high. Plus, Macs of that age start to have more problems that may require repair, resulting in lost productivity due to downtime.
  • Hardware limitations: At some point, you might feel your Mac is too slow—you’re seeing the spinning beachball frequently, or tasks are taking too long to complete. Another common concern crops up when you frequently have to shuffle files around to deal with low disk space on the startup drive. Or perhaps the battery life of a Mac laptop isn’t always sufficient for your needs—losing hours of productivity while on an airplane without seat power can be problematic.
  • macOS support: Although there’s no requirement that you run the latest version of macOS, being unable to upgrade is a hint that your Mac is getting older. Apple provides security updates for the two versions of macOS before the current one, so if your Mac can’t stay within that update circle, it will become more vulnerable to security exploits.
  • Physical damage: Macs are fairly durable, which often keeps them running even when the screen is cracked, a key sticks sometimes, or the case has been dented. The more damage your Mac has, the more likely it is that something else will go wrong, potentially at an inconvenient time.
  • General flakiness: It’s hard to quantify this, but an older Mac might start to feel slow, crash more often, or act weirdly. Sometimes those problems can be resolved by reinstalling macOS and apps from scratch, but that’s a lot of work and far from guaranteed.
  • Repair support: Apple guarantees that it will provide parts and service for all products within 5 years of when Apple last distributed them for sale. After that, Apple considers the products “vintage” for the next 2 years and will repair them subject to parts availability. Apple considers products pulled from the market more than 7 years before to be “obsolete” and won’t repair them apart from Mac laptops that are eligible for an additional battery-only repair period.
  • Shiny new Mac: Sometimes, it’s easy to delay a new Mac purchase because none of the Macs seem quite right. At other times, however, the exact Mac you want will be released just when you need it, making for an easy decision.

With those variables in mind, let us offer recommendations for different audiences:

  • Large-fleet organizations: It’s probably not worth the time to consider the needs of every employee in the context of what Mac they have. Instead, create a policy for replacing Macs on a 3- to-5-year schedule you can build into your annual budget. When it’s time to replace a particular Mac, swap it out for a comparable new model and send the old one to a resale organization.
  • Small-fleet organizations: For companies and nonprofits with a smaller number of Macs and a smaller budget, stick with the same 3- to 5-year schedule, but instead of automatically replacing each Mac as its number comes up, use it as an opportunity to evaluate the user’s needs and then either replace the Mac or set the next evaluation date. You may end up replacing Macs slightly less often, perhaps every 4 to 6 years. It’s also more likely that old Macs will be handed down rather than resold.
  • Creatives and freelancers: If you live and die by the work you can accomplish on your Mac, pay regular attention to whether your Mac is meeting your needs. You’ll probably start to notice issues in 3 to 5 years, and as soon as you do, start watching Apple’s releases to see what new Mac might be the best replacement. Also, consider saving a small amount per month with the idea that you’ll have enough to buy your new Mac about the time the old one noticeably starts to cut into your productivity.
  • Home users: As long as the Mac meets your needs and can run a version of macOS that’s receiving security updates, there’s no harm in continuing to use it for 8 years or more. However, if it starts to need hardware repairs and repeated consultant visits, that’s an indication that you should spend the money on a new Mac instead. Once it can no longer run a supported version of macOS, it’s time for a replacement.
  • Fixed budgets: We get it—sometimes there’s no money for a new Mac. Assuming you can accomplish what you need to do and avoid sketchy parts of the Internet, go ahead and run your current Mac into the ground. It could last 10 years or more. And when it comes time to replace it, there’s no shame in looking to the used market—all those Macs that others are replacing often come up for sale at bargain prices.

We hope this has given you some structure for thinking about replacing Macs, whether you’re worried about the Mac on your desk or all those in the entire design department. And, of course, feel free to contact us for help putting together a replacement schedule.

(Featured image by iStock.com/Prykhodov)


Social Media: When should you replace the Mac on your desk—or your organization’s Macs? There is no single answer, but we run down some variables that play into the decision and make recommendations for different use cases.