SecureMac, Inc.

The Checklist Podcast

SecureMac presents The Checklist. Each week, Ken Ray and guests hit security topics. From getting an old iPhone, iPad, iPod, Mac, and other Apple gear ready to sell to the first steps to take to secure new hardware, each show contains a set of easy to follow steps meant to keep you safe from identity thieves, hackers, malware, and other digital downfalls. Check in each Thursday for a new Checklist!

The Checklist Podcast by SecureMac

Episode: Checklist 12:Five Tips for Secure Holiday Shopping

Checklist 12:Five Tips for Secure Holiday Shopping

It’s estimated that 120 million people shopped online on Cyber Monday in 2015, and that number is sure to be even higher this year! That’s a lot of gift shopping — and a lot of opportunities for something to go wrong. While shopping online is convenient, it also carries some security risks. On today’s Checklist: Five things you can do to make your online shopping more secure.

Read Listen
Episode: Checklist 11: Traveling Safely with Your Mac and iOS Devices

Checklist 11: Traveling Safely with Your Mac and iOS Devices

Today’s topic: travel. Millions of people travel substantial distances every day, whether it’s for business or pleasure. For the safety of your devices and the security of your data, there are a few things you’ll want to do. Today we’ll look at several ways you can prepare and keep yourself safe on your trip.

Read Listen
Episode: Checklist 10: Demystifying Malware Types and Terminology (Part 2)

Checklist 10: Demystifying Malware Types and Terminology (Part 2)

With malware attacks on the rise, more and more news coverage is devoted to analyzing these threats. On today’s show we’re going to help you make sense of all that security gibberish by demystifying the terminology and acronyms frequently encountered when it comes to malware.

Read Listen
Episode: Checklist 09: Demystifying Malware Types and Terminology (Part 1)

Checklist 09: Demystifying Malware Types and Terminology (Part 1)

On today’s show we’re going to cover what makes a piece of spyware different from a worm, and what makes a keylogger different from adware. Once you can tell the difference between the different types of malware, you’ll be better prepared to understand just how the different types of threats can affect *you*, and which ones are worth losing sleep over!

Read Listen
Episode: Checklist 07: New Security Features in macOS Sierra

Checklist 07: New Security Features in macOS Sierra

On today’s episode, we’re talking about the latest version of Apple’s desktop operating system, the newly rebranded macOS Sierra. Specifically, we’re going to be focusing on some of the new and expanded security features found in macOS 10.12.

Read Listen
Episode: Checklist 06: Identify and avoid online scams in 5 easy steps

Checklist 06: Identify and avoid online scams in 5 easy steps

Internet criminals can be pretty devious, and it’s becoming increasingly harder to determine legitimate sites from fake ones these days. In today’s episode, we’ll go over five ways to identify and avoid online scams, helping to keep your personal data (and the contents of your bank account!) out of the hands of online con-artists.

Read Listen
Episode: Checklist 05: 5 Easy Steps to Prepare your Mac before selling it

Checklist 05: 5 Easy Steps to Prepare your Mac before selling it

On today’s episode, we’re going to run down a checklist of steps to take before selling, donating, or giving away your old Mac. These steps will ensure the secure removal of your personal information and data from your old computer, and help make your transition to a new computer go as smoothly as possible.

Read Listen
Episode: Checklist 03: 10 things to do when setting up your new Mac (Part 1)

Checklist 03: 10 things to do when setting up your new Mac (Part 1)

In this week’s episode of The Checklist, we discuss the first five items on our list of 10 things to do when setting up a new Mac to strengthen your security. Next week, we’ll cover the remaining five items, including specifics on protecting your data and safeguarding your privacy.

Read Listen
1 19 20 21

Get the latest security news and deals