How to set up a new Mac securely and update an older one

Glenn Fleishman
28 June, 2016
View more articles fromthe author

FileVault 2, os x, security, macworld australiaWhen you get a new Mac, how can you make sure you’ve set it up to be as secure as possible? If you walk through a completely fresh installation process, Apple tries to guide you into making the most secure choices among alternatives, but it’s probably the worst time to try to sort out the options available and make those decisions.

A reader asked for advice for the next time they start from scratch, and I can offer that in this column. However, all of my suggestions can work just as well as later additions, whether you’re reinstalling OS X, installing and then migrating from a different Mac, or just continuing to use an existing installation. It’s better to set this up first, but it’s never to late to add layers.

Say yes to FileVault 2

FileVault 2, introduced in OS X 10.7 Lion, is Apple’s name for full-disk encryption (FDE). With FileVault 2 enabled, OS X starts up using the OS X Recovery partition instead of boosting directly from your startup volume, which presents an account login selection screen. OS X uses that to unlock an encryption key, which is in turn used to decrypt your startup volume in real time, and the regular boot proceeds. When powered down, the entire contents of your drive are strongly encrypted.

privatei set up filevault copy

There’s a secondary advantage with SSDs, which distribute writing new data to avoid excessive wear on specific flash memory cells, as flash eventually degrades. Without FileVault 2 enabled, there’s no absolutely secure way to delete data permanently on an SSD; with it enabled, fragments scattered around an SSD are encrypted, making recovery effectively impossible.

With a new system. Starting with OS X 10.10 Yosemite, Apple enables FileVault 2 during the setup or upgrade process unless you uncheck the ‘Turn on FileVault Encryption’ box during that stage of setup. You can choose between using iCloud as a backup method to unlock the disk; if the iCloud option is unchecked, create a recovery key. If you forget your password, either iCloud or the recovery key will be your only way to unlock the disk – the data is otherwise lost forever.

With an existing installation. Follow these steps:

  1. Open the Security & Privacy system preferences pane.
  2. Click the FileVault tab.
  3. Click Turn On FileVault.
  4. Decide whether you want to use iCloud or a Recovery Key as a backup if you can’t recall your password.
  5. Select which accounts can start up a Mac from being shut down, and unlock the startup volume.
  6. Click Restart to begin the process.

The FileVault process can’t be halted once it’s underway, and it can slow down normal system performance. Start it on a Friday afternoon so it can run for hours or days. (You can disable FileVault, however, which requires another restart and a long period of time for decryption.)

Make routine clones and backups

This may not seem like a security issue, but having a reversion position in case your system is compromised is all about security. Macs have largely, but not entirely, escaped malware, and the fact that most attackers can’t get their claws into OS X or Safari to spread an attack widely doesn’t mean it won’t happen. Ransomware has such a high rate of financial return that criminals have started to try to infect Mac users; they don’t need to comprise millions of people, only thousands or tens of thousands.

Apple will prompt you about setting up Time Machine while finishing up OS X’s installation, as it will every time you attach a new disk to your Mac if Time Machine remains enabled. If you’re not ready to get another backup solution in place, take Apple’s advice. You can get extremely inexpensive, fast, USB 3.0-compatible multi-terabyte portable and AC-powered hard-disk drives from a number of sources, so there’s no excuse to not be backing up from the get-go.

If at all possible, I recommend a three-pronged attack:

  • Use SuperDuper or Carbon Copy Cloner to create regular, even nightly clones of your startup volume. This lets you get back in business right away, even if you have to wipe your entire startup drive. I’d recommend always using a clone in addition to or instead of Time Machine.
  • Cycle clones to an off-site location, like a safe-deposit box. Even if you can’t do this regularly, it’s still another insurance policy.
  • Back up documents to encrypted cloud-hosted storage, preferring a service that lets you set a passphrase in such a way that the service never has access to it, such as CrashPlan or Backblaze. This prevents employees of the company, hackers and warrant-free government intrusion of your files.

Should you get infected, in the worst case, you can roll back to a clone or copies of document in cloud storage, or an earlier Time Machine snapshot.

Two-factor authentication with your Apple ID

Enabling two-factor authentication (2FA) for the Apple ID or IDs you use with your computer and iOS devices is a must in the current cracking climate. Seemingly every day, passwords are exposed from major online networks and retailers. If you’ve ever reused your Apple ID password, its exposure with a crack could let someone gain access to your account.

Someone could also potentially gain remote access to a Mac if you have Back to My Mac enabled and allow your iCloud login to be used with it. That attacker would use your Apple ID credentials on another Mac, see the Mac show up in the list of available devices in the Finder, and then log in with the same Apple ID.

Apple’s 2FA is an update to its older two-step system, but it still relies on trusted devices to verify that you’re a legitimate person using a password to use an Apple ID for any online purpose.

In El Capitan, Apple doesn’t yet prompt you during setup to enable 2FA. When I set up a macOS Sierra system from scratch, I already had 2FA enabled, so had to provide confirmation, but couldn’t see whether you’re prompted if you don’t have it turned on yet. If you’re using two-step authentication, you have to disable it first in order to turn on 2FA. (iOS will, however, prompt you while setting up a new device or after erasing a device and setting it up from scratch.)

In OS X:

  1. Open the iCloud system preference pane, and click Account Details.
  2. Click Security.
  3. Click Turn on Two-Factor Authentication.

Follow the steps to add a trusted phone number or trusted devices.

I’ve had Apple’s 2FA enabled for months, and it’s such a relief every time I get the notification on multiple devices when I log into an Apple Web site or set up a new device – it reminds me positively that Apple is keeping track.

Consider installing some limited monitoring software

As a post-installation consideration, you might enable OS X’s firewall (in the Security & Privacy system preference pane), which offers some reasonable but very limited baseline behaviour, or install third-party software that’s more extensive and customisable. Something like Little Snitch is a good idea – the software monitors incoming and outgoing connections, and lets you approve or deny them.

firewall settings os x copy

Little Snitch and similar software don’t prevent malicious activity, but if you’re paying attention as it asks you what’s acceptable and what’s not, you may notice if something awful has inserted itself into your system. You’ll also be able to control the ‘phone home’ behaviour of legitimate apps that you don’t want to connect back to the mothership to report information about you – even if that information is benign.

While network-monitoring software makes sense, I’ve been down on the anti-virus category for the Mac for many years, because by the time an app is capable of identifying and removing malware, it’s generally too late to be of any good. Apple updates its silent Gatekeeper in OS X to add malware signatures to prevent them from running, and that’s seemed to forestall any widespread attacks.

However, if you regularly exchange documents with people on other platforms or use multiple platforms yourself, or run Boot Camp or virtualised instances of Windows and other OSes, it’s worth not just installing virus-detection software on those platforms, but also on a Mac as long as it detects cross-platform viruses. Macro-based viruses that don’t activate in OS X software as well as payloads in documents you might transfer to Windows could turn you into a carrier. Intego Internet Security X9 combines application networking access and anti-virus software, including recognising Windows malware, into a single bundle.


2 people were compelled to have their say. We encourage you to do the same..

  1. Jamie says:

    I would heartily recommend AGAINST full disk encryption.

    Over the years that I’ve worked in IT I’ve seen my fair share of customers who forget or lose their passwords only to have their entire system unrecoverable.

    It’s times like this you say, we can recover from your backup, only to be told that they either don’t have a backup or the backup itself is protected by a password that they cannot remember or locate.

    By all means encrypt sensitive files (remembering that these also become useless if you no longer have the password) but I strongly recommend against full disk encryption.

  2. Macworld Australia Staff says:

    Interesting feedback.

    I encrypt using FileVault. I’ve got a copy of the master password stored securely, away from my computer, just in case.

Leave a Comment

Please keep your comments friendly on the topic.

Contact us