Guide to Mac Security and Privacy Settings

  • By David Lukic
  • Published: Nov 03, 2020
  • Last Updated: Mar 18, 2022

Apple is a master at creating hardware and software that works together beautifully. The tech world recognizes that Apple products are more secure because of this tight integration. However, some users may take that for granted and never review the security and privacy settings on Mac. When the daily news boasts of hackers, data breaches, and ransomware attacks, you cannot be too careful when securing your Mac and addressing your privacy while online. Below is a complete guide to all the security and privacy settings on Mac so you can be as well prepared as ever!

Internet Security for Mac

internet security for Mac

Threats to your security and privacy typically come from hackers over the internet, anyone who has physical access to your computer, and email breaches. To protect yourself against all of these threats, you can institute some best practice habits to reduce or eliminate the possibility of intrusion. A few basic things to keep in mind are: 

  • Always keep your macOS updated to the latest version. 

  • Install strong antivirus/anti-malware software and run deep scans often.

  • Never click on links in email or download attachments, even if it looks like it’s from a legitimate source.

  • Don’t share passwords with anyone.

  • Never provide remote access to your computer while on the phone with a technician. 

  • Keep all your security settings at the maximum level.

  • Enable two-factor authentication on all accounts, especially your iCloud account.

  • Tighten up your privacy settings on mac on all devices and in web browsers.

Mac Security & Privacy Settings

Mac settings

Apple makes it easy to find the security and privacy settings in macOS. They are located in a centralized location: System Preferences > Security & Privacy. You can access System Preferences either from the Apple at the top left of your screen or using Launchpad and clicking the gear icon. Once in there, you’ll see four tabs: General, FileVault, Firewall, and Privacy. Let’s explore each one in detail.

*Before making changes to any of these settings, click the padlock at the bottom-left of the window and enter your Mac username and password to unlock it. 

General

On the General tab, you can change your password and set a timer, so the screen requires a password login after a specific number of minutes. You can also choose to display a message on the screen when it is locked. If you have an Apple Watch, you can choose to unlock your Mac that way if you check off the box. 

Be sure you keep the box labeled Require password… checked off; this is a critical security setting. Choose either Immediately or 5 seconds. 

Also, be sure to use a strong Mac password. If you have iCloud Keychain turned on you don’t even have to remember your secure password, the Mac will do it for you and automatically generate strong passwords when you need them. If you don’t want to use iCloud Keychain, consider using another password manager app. 

The bottom section of this tab is about allowing apps to be downloaded from the internet. Security experts advise only using apps from the App Store or downloading from trusted vendors where you know the program will be free of malware or other viruses. Choose this setting accordingly. 

FileVault

Another important setting and valuable security asset in the Mac suite of tools is FileVault. With FileVault turned on, all your files are encrypted. The encryption makes it much harder for anyone to steal and access your data. Turn this on to be as secure as possible. You can easily unencrypt the files with your password or key. 

Firewall

The third tab controls the firewall. The firewall is a major security guardian, and you will want to be sure to turn it on. It is set to off by default. If your firewall is off, click this tab and then unlock the padlock below to turn it on. You will see a green dot next to it once it is on and activated. Once on, you will see a button to turn the firewall off and a button labeled Firewall Options.

At the bottom, check off the box labeled Enable stealth mode. This setting will make your Mac invisible to the outside world and on public networks. Leave the other settings as-is unless the box at the top has apps in it. Then you will want to review which apps are allowed to receive incoming connections. 

Privacy 

Mac Security

Another extensive area within the Security & Privacy section is the Privacy tab. Once you click that tab, you will see a number of settings on the left and their configuration on the right. 

Location

Privacy settings on Mac

The first choice is Location Services. You can allow or refuse to let apps use your location. The only one you should ensure is checked off is Find my Mac. It is less secure but up to you if you want things like Siri, Safari, Maps, or other apps to use your location. Fine-tune your settings here before moving on.

Contacts

Next, check the Contacts section to see which apps have access to your contacts. You can turn them off for each one in here. Do the same for Calendar, Reminders, and Photos. 

Camera & Microphone 

Both your camera and microphone are built-in areas of vulnerability. You will want to closely monitor what apps request and have access to these pieces of hardware. Uncheck any that you don’t want to have access to.

Full Disk Access 

Another critical area in there to check is Full Disk Access. Only security and antivirus type programs should have full access. Uncheck everything else. Regular programs don’t need this. 

Files and Folders 

Mac firewall

Carefully review which apps have access to both files and folders in here. You may have an extensive list if you installed a lot of apps. Do the same for the Screen and Recording section. 

Analytics and Improvements

When you install macOS, you are asked if you want to provide feedback on how you use the apps and hardware to improve the platform better. If you did provide access and no longer want to, click this section and uncheck all four boxes. 

Advertising

In the Advertising section, check off the box labeled “Limit Ad Tracking,” and this will help control tracking of your online activities and feeding you targeted ads. You might want to also clear out the data by clicking the Reset Advertising Identifier button. 

System Preferences & Apple ID Settings

System Preferences & Apple ID Settings

Now that you have tightened up those settings, you should check a few more things. Go into System Preferences and click the Apple ID button. Since macOS Catalina, a lot of settings have been consolidated here. At the top, you will see iCloud. Click the details button next to it to review which apps you want to save data in the cloud. The less data saved online, the better in terms of security. However, it may not be as convenient. 

Notifications

If you don’t want notifications showing up in your sidebar (where others could see them). Turn them off by going to System Preferences > Notifications. Each app has its own settings for this. Uncheck notifications for any apps that show sensitive or private information.

Wallet and Apple Pay

Only set up the bare minimum information in Wallet and Apple Pay on your computer. 

Touch ID

If your Mac has Touch ID, set it up. It’s a great way to keep things private using your own individual fingerprint. 

Sharing

Go into the Sharing section of System Preferences and make sure nothing is shared in there except what you want on your network and with the world. Be extra careful about checking the Remote Login and Remote Management areas. Also, review the Internet Sharing area to be sure those are not left wide open. 

Other Mac Settings to Adjust for Optimal Mac Security

Some other things to adjust, if you want to really cover your security and privacy bases are:

Safari Privacy and Security

Let’s not forget Safari, which is your web browser that ships with macOS. There are some security and privacy settings in Safari as well that we should tighten up.

  1. Open Safari.

  2. Go to Preferences.

  3. First, go to Security and check off the top box that reads “Warn when visiting a fraudulent website.” 

  4. You can choose whether or not to allow JavaScript.

  5. Click the Privacy tab. 

  6. Check off Prevent cross-site tracking.

  7. Under Cookies, click the Manage Website Data button to see the cookies saved on your machine. You can delete or manage them from there. It is safer not to allow cookies, but they make the web browsing process easier if left on.

  8. Uncheck the box next to Allow websites to check for Apple Pay and Apple Card. You don’t need websites collecting that information. 

Whenever you want to cruise the internet privately in Safari, go to File > New Private Window, and you will have a secure, private window to begin browsing. Internet privacy & security is crucial since most of breaches happen through the internet.

Once you adjust all these settings your Mac will be as bulletproof as possible.

About the Author
IDStrong Logo

Related Articles

Secure Wi-Fi and Wireless Technology Security Tips

Your Wi-Fi network is another handy access point that hackers use to infiltrate your computers, st ... Read More

How Does a VPN Work and How to Choose one

VPN stands for virtual private network. It allows you to hide your public IP address and browse pr ... Read More

Complete Guide to Android Security

The Android platform offers a ton of flexibility and customization for users. However, all that fr ... Read More

Increase Your Google Privacy Settings in 4 Easy Steps

In this time of digital transparency and data breaches, it’s more important than ever to fee ... Read More

Instagram Privacy Policy: What You Should Know?

Instagram is a great place to share your best photos and messages with your followers, but have yo ... Read More

Latest Articles

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

What Are Pretexting Attacks: Scam Types and Security Tips?

What Are Pretexting Attacks: Scam Types and Security Tips?

Have you ever received a text from someone you do not know? Did you become alarmed by the message? Did the message contain information about you and the people you know?

What is a Time-based One-time Password (TOTP)?

What is a Time-based One-time Password (TOTP)?

Authentication is the process that verifies the user's identity to control access to resources, prevent unauthorized users from gaining access to the system, and record user activities (to hold them accountable for their activities).

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close