Meta Intelligence - Cyber Intelligence and Security
  • Home
  • Cyber Intelligence / Digital Risk Management
  • Courses
  • About Us/Contact
  • Blog

BigEye Cyber Edition

Knowledge is power

Configuration for Apple Computers

11/22/2016

0 Comments

 
​Heavy online shopping season is upon us and most of your computers are configured in such a way that are vulnerable to many maladies floating in the Internet. I hope this short and simple blog encourages you stop what you are doing and upon reading this blog, open the System Preferences and make the changes that will guard your privacy and enhance the security of your system and the nation at large. Remember that each one of your devices, regardless of the content, can be used as a stepping stone to commit a cybercrime. So securing your technology is not only about you and your safety. It is about the safety of the nation at large.  
 
How to upgrade the Apple OS?
Although the latest operating system for Apple is Sierra, I recommend El Capitan as a most stable system. If you have any operating system lower than 10.11 (El Capitan), you need to backup your data and upgrade to El Capitan.
 
How do I backup and upgrade?
Using a WD Passport external hard drive that you can buy at any computer store or online, go to System Preferences and select Time Machine.
Connect the external hard drive to your computer, select On in the Time Machine window, and select the WD Passport as your destination. Once the backup is completed, you can take your laptop at any Apple store’s Genie bar and they will upgrade your computer to El Capitan for free.
Then, you can restore your data from the backup.
 
How do I configure my computer?
Go to System Preferences and follow the screen shots below.
Picture
​Open the General tab and select Google Chrome as your default browser. Then, go back to the main menu and select Security & Privacy. You will see four tabs: General, FileVault, Firewall and Privacy.  Under FileVault, Apple gives you the beautiful feature of encrypting your entire hard drive. Use it!
Still under Security and Privacy – Firewall Tab, select Firewall Options and put a check mark on Enable stealth mode. And under the Privacy tab, disabled Location Services, and Diagnostic & Usage. 
​I understand that many, many are Bluetooth dependent but it is one of the most vulnerable points of technology because of it spread spectrum and hopping frequency. A laptop can be compromised via Bluetooth within 100 meters, and there are plenty of Bluetooth scanners in the market. If you insist on having the Bluetooth on, at least remove the check mark on these options so your Bluetooth will not be so easily discovered. 
Picture
​That is all for now. Thank you for reading!
 
Meta brings the courses Risk Management When Online and Open Source Intelligence (OSINT) Collection and Analysis to your organization regardless of where you are located. Watch this short clip: https://www.youtube.com/watch?v=aRXazQuPzFs Then call us to schedule training for your team or organization.
0 Comments

    About the Blog

    This blog is updated on a bi-weekly basis and it will address a variety of topics concerning cybertechnology, privacy and ethics in the cyberspace domain.
    ​
    About The Author
    Cecilia Anastos holds a Master’s Degree in Strategic Intelligence w/sp in Middle East Issues, a Graduate Certificate in Cybercrime, and a B.A. in Criminal Justice w/sp in Psychology.  In 2005, Ms. Anastos founded Meta Enterprises, LLC (Meta-Intelligence.com) where she works as Chief Intel Analyst – OSINT, Cybercrime and Instructor.  Fluent in five languages, she is a pioneer in the utilization of digitized open source and publicly available information to create actionable intelligence, and in the reduction of digital signatures in the cyberspace domain; and has designed many of the cyber programs currently used at the US Navy Special Operation Forces, police departments, and private sector. She is also an avid reader and a source of knowledge in foreign policy, political affairs, demographic trends, socio-cultural dynamics, transnational gangs, indigenous groups, conflict resolution, and cultures in Latin America, Africa, Europe, and Eurasia, as well as in creating strategic models and analysis of predictability for countries and non-state organizations.

    View my profile on LinkedIn

    Archives

    February 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016

    Categories

    All

    RSS Feed

Home

About

Services

Menu

Contact

Copyright © 2017 Meta Intelligence/Meta Enterprises, LLC proprietary information
  • Home
  • Cyber Intelligence / Digital Risk Management
  • Courses
  • About Us/Contact
  • Blog