In Times of Uncertainty, Increase Your Digital Privacy and Security

With so many troubling things happening in the world, some clients have inquired about ways to enhance their security. While we don’t want to encourage paranoia, there are many legitimate threats, and everyone will have their own levels of worry about each one.

The effort and inconvenience that different people are willing to endure also vary. Higher levels of security often necessitate significant effort and inconvenience. We have divided our list of suggestions—roughly organized from easiest to hardest—into two sections: actions we believe everyone should take and security measures mainly for those most concerned and willing to tolerate some fuss.

Before we delve into the details, it is important to remember that privacy and security are not the same thing. Privacy refers to the proper collection, use, and governance of personal data. Security, conversely, is concerned with protecting data from unauthorized access and malicious threats. It entails defending data against external dangers, while privacy ensures that the management and use of that data adhere to agreed-upon standards.

Security Improvements for Everyone

These actions are generally beneficial for most users. They don’t require much technical knowledge and can often be accomplished with easily accessible tools and settings:

  • Keep apps and operating systems up to date: Nearly every operating system update from Apple addresses numerous security vulnerabilities, and the same is often true for major apps. Always ensure you’re running current versions to take advantage of all those security improvements.
  • Enable FileVault: While all data on the internal SSDs of Macs with Apple silicon and Intel-based Macs with the T2 chip is automatically encrypted to prevent unauthorized access if the SSD is removed, it is automatically decrypted whenever the Mac boots, even before you log in. To link decryption to your user account, which makes your login password necessary to decrypt all data, enable FileVault in System Settings > Privacy & Security > FileVault. There are essentially no drawbacks.
  • Improve your passcode: For nearly a decade, it has been easy to set a six-digit passcode on the iPhone and iPad, greatly enhancing security compared to the previous standard four-digit passcode (1 million possible combinations versus only 10,000). If you still use four digits, consider switching to six digits, a custom number of digits, or a custom alphanumeric passcode in Settings > Face ID/Touch ID & Passcode > Change Passcode > Passcode Options. Alphanumeric passcodes offer the highest level of security but are more challenging to type.
  • Turn on biometric authentication and Stolen Device Protection: If you aren’t already using Face ID or Touch ID on your iPhone or iPad, that’s a mistake. Both provide significantly stronger security than repeatedly entering your passcode, which could be observed. Turn on biometric authentication and Apple’s Stolen Device Protection in Settings > Face/Touch ID & Passcode.
  • Adopt strong password habits: If security matters at all to you, you must use a strong, unique password for each online account and never reuse a password. It’s easy and secure as long as you create and store passwords with a password manager like Apple’s Passwords or 1Password.
  • Enable MFA whenever it’s available: Multi-factor authentication greatly enhances security, safeguarding you even if your password is compromised in a breach. It typically requires entering a six-digit code that you retrieve from an app or receive via text message. Apple’s Passwords and 1Password can both automatically enter MFA codes for many websites.
  • Use an ad blocker: Much of today’s surveillance society relies on ads to track you. Anything you can do to block ads will enhance your privacy, so use ad blockers whenever possible. Highly regarded options include 1Blocker, AdGuard, NextDNS, and uBlock Origin.
  • Enable privacy and security features in Web browsers: Safari can prevent cross-site tracking and hide your IP address, along with other privacy and security features. In Safari > Settings, review all the options in the Privacy and Security screens and enable those that are appropriate. (Keep cookies and JavaScript enabled; many sites won’t function properly without them.) If you don’t use Safari, choose Brave or Firefox instead of Google Chrome.
  • Utilize secure DNS services: To enhance browsing privacy and protect against DNS leaks, configure your devices to use a privacy-focused DNS service like Cloudflare’s 1.1.1.1 or Quad9’s 9.9.9.9.
  • Minimize app exposure: Be vigilant about iPhone or iPad apps that might be sharing information about you with data brokers without your knowledge. Specifically:
    • Turn off Settings > Privacy & Security > Tracking > Allow Apps to Request to Track.
    • Rescind location tracking permissions for all apps except those that require it, such as navigation or weather apps, in Settings > Privacy & Security > Location Services.
    • Delete apps you’re not using to prevent them from spying on you.

Security Improvements for the Particularly Concerned

Implementing these actions may require extra steps, specialized knowledge, or significant changes in habits. They’re primarily for those with heightened concerns or those at greater risk, such as journalists, activists, and individuals handling sensitive data:

  • Use independent search engines: Google and Microsoft are known for collecting information about their users. To keep your searches private, use a search engine that prioritizes privacy, such as DuckDuckGo, Brave Search, Kagi, or Startpage.
  • Protect network traffic: While we used to recommend ensuring you were using secure HTTP (HTTPS) connections, that’s now the bare minimum. For greater privacy while browsing the Web with Safari, turn on iCloud Private Relay in Settings/System Settings > Your Name > iCloud > Private Relay. (This requires an iCloud+ subscription and won’t encrypt traffic from most non-Apple apps.) More broadly, you can safeguard all your traffic by using a trusted VPN service like Mullvad VPN, NordVPN, or ProtonVPN.
  • Activate Advanced Data Protection: End-to-end encryption (E2EE) keeps your online data private from everyone, including cloud providers. However, it requires you to manage your encryption keys, which means no one can help recover your data if you lose those keys. You can enable E2EE with Apple services using Advanced Data Protection; turn it on in Settings/System Settings > Your Name > iCloud > Advanced Data Protection.
  • Use encrypted messaging: The iMessage system used by Apple’s Messages app for blue bubble conversations is highly secure, particularly with Advanced Data Protection enabled. However, for the most secure messaging with E2EE, look to Signal. While WhatsApp also offers E2EE, its backups might not be encrypted, and its parent company, Meta, is one of the most egregious privacy abusers on the planet.
  • Regularly review and revoke permissions: Periodically check and manage app permissions on your device to ensure that no apps have unnecessary access to sensitive information, such as your contacts or location. Work through the options in Settings/System Settings > Privacy & Security and revoke permissions for anything that seems inappropriate. Apps that require additional permissions will always prompt you again.
  • Encrypt cloud-stored data: To ensure that cloud storage services like Box, Dropbox, Google Drive, and OneDrive cannot read your data, use the free and open source Cryptomator to encrypt it first.
  • Use encrypted email: While it’s impossible to ensure that email will remain private because you can’t control your recipients’ actions, the most privacy-focused email services are ProtonMail and Tuta Mail. They employ E2EE for emails sent to other users of the same service and allow the encryption of email messages sent to any external recipient.
  • Reduce reliance on cloud services: If you have general concerns about cloud services, consider exploring peer-to-peer alternatives that remove the need for a central provider. You can find peer-to-peer solutions for file storage, file sharing, chat and messaging, videoconferencing, collaborative documents, cloud-based notes, and more.
  • Avoid social media: Posting on social media, especially on platforms owned by large corporations, allows those companies to create a comprehensive profile of you that is shared with advertisers and is vulnerable to data breaches. Further, any information you disclose about yourself could be exploited by hackers in social engineering attacks targeting your accounts. Consider replacing social media with independent forums devoted to your interests and private messaging spaces for friends and family.

Ultimately, enhancing privacy and security is your responsibility. Apple and other companies may offer tools to assist, but it’s up to you to implement them and stay vigilant against new threats. We’re also happy to provide advice and assistance.

(Featured image by iStock.com/andreusK)


Social Media: If world events have you worried about your online privacy and security, you may be interested in minimizing your exposure. We recommend some simple steps that everyone can take and other actions for those who are especially concerned.

Similar Posts

  • B.B. King – The King of the Blues

    For more than half a century, Riley B. King – better known as B.B. King – defined the blues for a worldwide audience. Since he started recording in the 1940s, he has released over fifty albums, many of them classics. He was born September 16, 1925, on a plantation in Itta Bena, Mississippi, near Indianola. In his youth, he played on street corners for dimes, and would sometimes play in as many as four towns a night. In 1947, he hitchhiked to Memphis, TN to pursue his music career. Memphis was where every important musician of The South gravitated, and it supported a large musical community where every style of African American music could be found. B.B. stayed with his cousin Bukka White, one of the most celebrated blues performers of his time, who schooled B.B. further in the art of the blues.

    B.B.’s first big break came in 1948 when he performed on Sonny Boy Williamson’s radio program on KWEM out of West Memphis. This led to steady engagements at the Sixteenth Avenue Grill in West Memphis, and later to a ten-minute spot on black-staffed and managed Memphis radio station WDIA. “King’s Spot,” became so popular, it was expanded and became the “Sepia Swing Club.” Soon B.B. needed a catchy radio name. What started out as Beale Street Blues Boy was shortened to Blues Boy King, and eventually B.B. King.

    In the mid-1950s, while B.B. was performing at a dance in Twist, Arkansas, a few fans became unruly. Two men got into a fight and knocked over a kerosene stove, setting fire to the hall. B.B. raced outdoors to safety with everyone else, then realized that he left his beloved $30 acoustic guitar inside, so he rushed back inside the burning building to retrieve it, narrowly escaping death. When he later found out that the fight had been over a woman named Lucille, he decided to give the name to his guitar to remind him never to do a crazy thing like fight over a woman. Ever since, each one of B.B.’s trademark Gibson guitars has been called Lucille.

    B.B. was inducted into the Blues Foundation Hall of Fame in 1984 and into the Rock and Roll Hall of Fame in 1987. He received NARAS’ Lifetime Achievement Grammy Award in 1987, and has received honorary doctorates from Tougaloo(MS) College in 1973; Yale University in 1977; Berklee College of Music in 1982; Rhodes College of Memphis in 1990; Mississippi Valley State University in 2002 and Brown University in 2007. In 1992, he received the National Award of Distinction from the University of Mississippi.

    B.B. King came to Vermont many times and I had the pleasure of being at several of his concerts. He died last year at the age of 90 and was performing to sold out crowds right up until he died. B.B. King is gone but the –The Thrill is Gone- lives forever.

  • Emily's Favorite Mac Accessories

    I am the kind of gal that admittedly likes gadgets and accessories just because they are cool, I don’t even need to have a use for them to make me want one! If there is a new iPad case, a new speaker, a new product announcement from Apple, I want it. This has resulted in a vast collection over the years of all kinds of gadgets, gizmos and some stuff that I just hang onto for no good reason other than I might need it one day. Some things have been a bit of a fad, others have stood the test of time. Over the years I have found that I few items in my collection of gadgets that have either become invaluable or the kind of item that really stands the test of time.

    p{text-align: center;}. !http://blog.smalldog.com/images/4651.jpg!

    My first must have and favorite gadgets are portable bluetooth speakers, and I have had several over the years. The battery powered speakers from Skullcandy I had were one of my most favorite pocket sized speakers! It took up little room in my bag and I could have my music wherever I wanted. You never realize how much you miss having music wherever you go until you start to use these kinds of speakers and then suddenly don’t have them! I eventually outgrew my little Skullcandy speakers and upgraded to a larger but still portable Altec system. This speaker system went everywhere with us. In fact, it still travels with us in our camper even though it features a 30 pin connection for our phones. What I loved most about this set up was that it had a rechargeable battery, so unlike my little Skullcandy speakers I didn’t need to worry about carrying around spare AA batteries. It also allows me to use a 3.5mm headphone cable and an FM radio. I recently started to use the “**Outdoortech Turtle Shell**”:http://www.smalldog.com/product/85338/outdoor-tech-turtle-shell-2-0-rugged-wireless-boombox-electric-blue speakers to replace the old Skullcandy speakers for immediate portable sound, and as a huge bonus this speaker is bluetooth, something none of my previous portable units had. I will admit, I still haven’t found a better replacement for my aging Altec portable speaker as far as sound quality goes, but I will also admit finding a newer solution would require my having to let go!

    My second must-have gadget is an airport express base station. You might be surprised that it is not the Airport Extreme. Why do I love the “**airport express**”:http://www.smalldog.com/product/80932/apple-airport-express-base-station-802-11n-wi-fi so much? Well part of it might be a bit nostaglic. It was my first introduction into wireless speakers. How cool was it to plug in my Harmon Kardon speakers, simply tap my iPhone while sitting on the couch, and my speakers came to life like magic? But the great features don’t stop there. It’s a really powerful and inexpensive wireless router. For many, we don’t have huge areas we need to cover with wireless. Maybe it’s just a small apartment, or perhaps your house just isn’t that big. When I first started to use the airport express the one draw back was that the only ethernet port had to be designed (in most cases) for your internet modem, but in recent years Apple has added a second ethernet port allowing for more flexibility and versatility with this little gem.

    p{text-align: center;}. !http://blog.smalldog.com/images/4650.jpg!

    iPad and iPhone cases are another huge weakness of mine. I probably have no less then five cases for my phone and for my iPad. You could say I collected cases like some girls collect shoes! But on a serious note, this is a very important accessory for your iPhone or your iPad. Some folks prefer form fitting and minimal, others prefer a more rugged case. I have come to prefer several cases. However, I think cases that combine both slim form factor and serious protection are the “**Lifeproof**”:http://www.smalldog.com/wag900002119 cases. I have one for my phone and one for my iPad. What I love most of them is that they come off easily! I don’t always want a heavy duty case on my devices, but have found that many cases that offer greater levels of protection end up being very difficult to take off your device.

  • Hey Dora, Follow Orders!

    Last week we talked about how to activate and use dictation to write emails and documents but there is a lot more that you can do. I keep thinking about Scotty from Star Trek when he went back in time and was “**confronted with a Mac Plus**”:https://youtu.be/LkqiDu1BQXY?t=1m8s. He picked up the mouse as natural as can be and said “computer…”. That time is coming and Dictation Commands are already built into your operating system.

    Once you have dictation activated you can activate dictation commands by going to the Accessibility system preference.

    * Choose Accessibility from System Preferences.

    * Choose Dictation from the list on the left side of the Accessibility pane.

    * Click the Dictation Commands button. You can see a list of available commands in the Dictation Commands sheet.

    * A starting set of commands are enabled by default. Additional speakable items like “Open document” and “Click item” are available by enabling advanced commands using these next steps:

    * Select (check) the option to “Enable advanced commands” in the Dictation Commands sheet that appears.

    * Click Done.

    p{text-align: center;}. !http://blog.smalldog.com/images/4710.png!

    After you have enabled advanced commands, you can also create your own commands by clicking the Add Command (+) button. This lets you link a spoken phrase to an app, a menu item, a keyboard shortcut, or an Automator workflow.

    You have enabled Dictation Commands and now you can speak any of the items in this list to perform the related action. Press the Fn key twice, then say a command to make it happen, such as “Search Spotlight for the Cubs score” or “select sentence” or “new document”. Give it a try and pretty soon you will be just like Scotty and the Mac Plus.

    As a shortcut, you can speak the command “Show commands” to see a list of the commands you can say.