What You Should Do to Protect Your Mac

For years, Macs have had a reputation for better security than PCs—but that was due largely to the fact that there simply weren't enough Macs and it just wasn't worth it for malware developers to target such a limited user group. Now, with many more Macs being used at homes and businesses, users are discovering their machines aren't exactly impervious to attack. In fact, our Trend Micro researchers found that Apple's OS X leads all other major computer operating systems for reported vulnerabilities in the first three months of 2012.

If you're a Mac user, what do you need to do to protect yourself?

1. Stay up to date on patches. PC users are used to installing security updates often. For Mac users, security updates can be an afterthought. And unfortunately, Apple hasn't always been quick on its feet when it comes to addressing security flaws. This means that users have to be self-motivated and stay on top of security updates.

2. Don't rely solely on built-in software. The security that comes with Macs just checks for malicious files that are already known. In order to detect new threats "in the wild," you need third-party software that follows and blocks threats as they develop. For maximum security, look for cloud-based protection that updates automatically and blocks threats dynamically.

3. Stay vigilant. Complacency is always the enemy when it comes to computer security. The right software is important, but sensible behavior on the Web is equally important.

4. Stay informed. Be aware of the latest scams cyber criminals and hackers are using to infect your Mac and steal your personal information.

To help you stay informed, we created a guide to the latest Mac outbreaks and how Trend Micro™ Smart Surfing for Mac can help protect your computer from malware attacks and other exploits.

Download the Mac Outbreak Guide >

< Back to main page


Trend Micro Mobile Security

See why it's important to protect your Android Smartphone from malicious applications. Play now >

© 2012 by Trend Micro Incorporated. All rights reserved. www.trendmicro.com