Mac maintenance
Mac Security Tips That Aren't Just 'Get Antivirus'
Real Mac security tips beyond antivirus theatre. FileVault, Gatekeeper, XProtect, firewall, secure boot, and the threats that actually matter.
The Mac doesn’t need antivirus the way Windows does. It also isn’t immune. The difference is what attacks actually work on a Mac in 2026 — almost never traditional viruses, almost always phishing, malicious browser extensions, fake “your Mac is infected” pop-ups, and supply-chain compromises in apps you trust. The defenses are mostly about not getting tricked, plus a handful of macOS settings that should be on but often aren’t.
FileVault (do this first if you haven’t)
System Settings, Privacy & Security, FileVault. Turn on if it’s off. This encrypts your entire disk. Without your password, the SSD is unreadable — including by someone who removes it from your Mac.
On Apple silicon, encryption uses the Secure Enclave and is virtually free in performance terms. There’s no good reason to leave it off.
Save the recovery key when prompted. Without your password OR the recovery key, your data is unrecoverable.
Set a strong login password
System Settings, Users & Groups, click your account, Change Password. The basics:
- 12+ characters, mix of types
- Not used on any other service
- Not stored in a password manager that’s also locked behind it (avoid the chicken-and-egg)
Tick “Require password to wake from sleep” in System Settings, Lock Screen. Set “Require password” to “Immediately” or “5 seconds after sleep or screen saver begins.”
Enable Find My Mac
System Settings, your Apple ID, iCloud, Find My, on. If your Mac is stolen:
- Apple silicon Macs lock to your iCloud account — they can be wiped but not used as someone else’s Mac
- You can remote-lock the device with a passcode
- You can remotely erase it
- Last known location appears on iCloud.com or Find My on your iPhone
This is the single most underused security feature on the Mac.
Gatekeeper, XProtect, and what’s already running
macOS ships with several security layers that run silently:
- Gatekeeper: blocks unsigned apps from launching
- XProtect: built-in malware scanner. Apple updates the signatures behind your back, no app required
- MRT (Malware Removal Tool): removes known malware
- System Integrity Protection (SIP): prevents modification of system files even by root
All on by default. Don’t disable any of them unless you have a specific reason.
To verify Gatekeeper is on: Terminal, spctl --status. Should say “assessments enabled.”
To check XProtect’s last update: System Settings, General, About, System Report, Software, Installations. XProtect entries show recent dates.
Don’t disable Gatekeeper to install random apps
When you download an app and macOS says “cannot be opened because the developer cannot be verified,” you have two options:
- Right-click, Open — overrides Gatekeeper for that app, once. Acceptable if you trust the source
- Disable Gatekeeper entirely in Terminal — never do this
Apps from outside the Mac App Store are often legitimately unsigned (open source projects, indie developers). If you trust the project, Right-click, Open is fine. If you don’t, don’t install it.
Apps to be especially careful with
Categories that have produced real Mac malware in recent years:
- Pirated commercial software: a top vector for trojans
- “System cleaners” from pop-up ads: real cleaners exist (Sweep, OnyX). The ones that show up as pop-ups don’t
- Free codec downloads: never legitimate. macOS plays everything QuickTime and IINA support
- Bogus “Flash Player” updates: Flash has been dead since 2020. Anything claiming you need it is malicious
- Fake “your Mac is infected” sites: exit the browser, never click the dialog
When in doubt: search the app’s name plus “malware” before installing. Real apps have weeks-old reviews. Malware has either no presence or fresh reviews from accounts that look bot-generated.
Two-factor authentication on your Apple ID
System Settings, your Apple ID, Sign-In & Security, Two-Factor Authentication. Should be on. Apple makes it nearly mandatory now, but verify.
The same panel: Security Keys (lets you require a physical key for sign-in), Account Recovery, and Recovery Contacts.
Two-factor on every important account
Use a TOTP app, not SMS:
- iCloud Passwords (built into Settings, Passwords): generates and stores TOTP codes, syncs across Apple devices
- 1Password / Bitwarden: cross-platform alternatives
- Authy: dedicated TOTP app
SMS-based 2FA can be defeated by SIM swap attacks. TOTP can’t.
Browser security basics
- Update Safari/Chrome/Brave when they prompt. Most browser exploits target unpatched vulnerabilities
- Don’t install browser extensions you can’t verify. Each extension can read every page you visit. The safe pile: 1Password, Bitwarden, uBlock Origin, your password manager, your VPN
- Turn off Java and Flash — both should already be off, but verify
- Disable JavaScript for high-risk visits (banking, sensitive accounts) — overkill for most users, but possible in Safari Develop menu
Phishing — the actual #1 threat
Almost every successful attack on Mac users in 2026 is phishing or social engineering, not malware. Examples:
- Fake “Apple Support” calls or emails saying your account is compromised
- Texts pretending to be UPS/USPS/FedEx with a tracking link
- “Your iCloud storage is full” emails with malicious links
- LinkedIn or job-hunt phishing aimed at unique, high-value targets
- Fake invoices delivered as PDFs to your email
Defenses:
- Never click links in emails to log into anything. Always navigate to the site directly
- Verify caller identity. Apple does not call you. Microsoft does not call you. Banks rarely call you
- Treat unexpected attachments as suspicious. Don’t open PDFs you weren’t expecting
- Hover before clicking. The displayed URL and the actual destination are different in phishing emails
reportphishing@apple.com (for fake Apple emails), then delete it. Apple's security team monitors that inbox.Don’t reuse passwords
The single most impactful security practice. Every breached site eventually leaks its password database. If you reused that password, every account using it is compromised.
Password manager + unique password per site. iCloud Passwords is free and built into the Mac. Use it.
Backup (it’s a security control too)
Ransomware is rare on Mac but possible. Hardware failures aren’t rare. Time Machine to an external drive plus an offsite backup (Backblaze, iCloud Backup, or a second drive at another location) means a compromised or dead Mac is a 2-hour inconvenience, not a disaster.
System Settings, General, Time Machine. Add a backup disk. Set it and forget it.
Software firewall
System Settings, Network, Firewall. On. Click Options:
- Tick “Block all incoming connections” only if you don’t use Screen Sharing, Remote Login, or AirDrop on your local network
- Tick “Enable stealth mode”
- Tick “Automatically allow built-in software” and “downloaded signed software”
For outbound monitoring, the built-in firewall doesn’t help. LuLu (free) or Little Snitch ($45) show you what’s calling out.
Safari and Mail security settings
Safari, Settings, Security:
- “Warn when visiting a fraudulent website” — on
- “Web push notifications” — only allowed websites I select
Mail, Settings, Privacy:
- “Hide IP Address” — from email senders (blocks tracking pixels)
- “Block All Remote Content” — until you click “Load Remote Content” per email. Stops invisible tracking pixels
When to worry about Mac antivirus
Most Mac users do not need third-party antivirus. The exceptions:
- You’re a high-value target (executive, journalist, activist)
- You handle others’ files routinely (IT support, designers receiving from many clients)
- You frequently install apps from outside the App Store and don’t vet them carefully
- Compliance requires it (some corporate environments mandate AV regardless)
If you fit those, Malwarebytes Premium or Kaspersky for Mac are the usual recommendations. ClamAV (free, open source) for occasional scans.
For everyone else: macOS’s built-in protections plus careful clicking habits cover 95%+ of real risk.
Zero-day risk
Apple silicon Macs have received security updates within days of Apple silicon zero-days being reported. Keep macOS up to date — System Settings, General, Software Update, “Automatic updates” on. The lag between vulnerability and patch is your biggest exposure window.
A 30-minute security baseline
If you do nothing else from this list, do these:
- FileVault on
- Find My Mac on
- Strong unique password, “Require Immediately” on lock screen
- Two-factor on Apple ID and every account
- iCloud Passwords or 1Password for everything else
- Time Machine + an offsite backup
- Software updates set to automatic
- Audit Privacy & Security permissions (Camera, Mic, Screen Recording, Full Disk Access)
- Don’t click suspicious links
That covers the bulk of practical Mac security risk. The rest — VPNs, antivirus, advanced firewall rules — adds incremental protection at increasing cost in friction. Sweep over the list once a quarter, and you’ll be in a meaningfully better position than 90% of Mac users.