MacOS is considered quite safe and well protected from viruses. We will tell you if this system really doesn't need antivirus protection.
Many users do not know that macOS already has a pre-installed antivirus scanner. It is called XProtect and runs exclusively in the background. For the majority of threats, it is enough. In addition, there are far fewer viruses for the Apple operating system compared to Windows, so antivirus programs can be installed optionally. But It is not easy to return a MacBook that is stolen by a cunning thief. Yes, MacOS has built-in protection systems, but they do not always save you.
Third-party developers have long offered good software to protect your MacBook from theft and loss.
At the moment, macOS offers the following protection mechanism in case of theft.
Of course, the computer must be connected to the network, and you can't do this without entering a password for authorization.
Even if you ignore the simple security rules and disable the password request at system startup, we will just know the approximate location of the computer.
If the marker points, for example, to a multi-storey building, it will not be possible to find the device in it.
Moreover, you can use a security tool from third-party developers to protect your new Mac, such as MacKeeper, for instance, read the review here about this app.
Go to the service's website and activate theft mode.
Unfortunately, one of the app's features will be useless in some countries. You can create a report on the theft in a couple of clicks and send it along with the received data to law enforcement agencies by email.
The other options will be fully functional. Every few minutes, the utility will update the computer's location data, take screenshots and photos with the front camera, and keep a complete log of data entered from the keyboard.
This way we will get an image of the attacker, the sites they visit, usernames, passwords, and other information. You can take snapshots and screenshots manually.
The location section stores your entire history to accurately track your computer's movement.
The utility may not reveal its presence on the Mac and continue to monitor the attacker, or it may switch to more active actions. This feature is called Plan B.
This option is activated on the corresponding tab in the web version of the service.
There are two options for this mode. In the first case, the utility simply displays a full-screen stub with a message about the theft of the computer and the contact information of the device owner.
You will not be able to close the window or disable the app (of course, no one will protect you from formatting the disk and reinstalling the system).
This mode is designed more for an honest person who has found a lost or forgotten laptop.
The second option is to simulate a malfunction. It should be used if the computer is stolen, to force him to hand over the computer to a service center.
The screen of the device will gradually darken, simulating a malfunction of the laptop matrix.
This is also not intended for our reality, but for countries where the police in search of a device may well start checking service centers and workshops.
As you can imagine, this security system works perfectly if an attacker manages to connect to the network. It is possible to provide several options:
Emma Brighton is a cybersecurity enthusiast and Mac aficionado. She’s passionate about covering topics like Mac cybersecurity, Mac tips & hacks, Mac’s how-to guides. She is a contributor to Cyber Experts and Cybers Guards.