{"id":88310,"date":"2024-02-07T13:45:00","date_gmt":"2024-02-07T19:45:00","guid":{"rendered":"https:\/\/eshop.macsales.com\/blog\/?p=88310"},"modified":"2024-06-17T15:36:54","modified_gmt":"2024-06-17T20:36:54","slug":"computer-security-7-rules-to-keep-hackers-at-bay","status":"publish","type":"post","link":"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/","title":{"rendered":"Computer Security: 7 Rules to Keep Hackers at Bay"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2024\/02\/security-hero-macbook-chained-to-desk.png\" alt=\"\" class=\"wp-image-89646\" srcset=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2024\/02\/security-hero-macbook-chained-to-desk.png 1920w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2024\/02\/security-hero-macbook-chained-to-desk-213x120.png 213w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2024\/02\/security-hero-macbook-chained-to-desk-284x160.png 284w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2024\/02\/security-hero-macbook-chained-to-desk-190x107.png 190w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2024\/02\/security-hero-macbook-chained-to-desk-1536x864.png 1536w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2024\/02\/security-hero-macbook-chained-to-desk-1400x787.png 1400w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2024\/02\/security-hero-macbook-chained-to-desk-750x421.png 750w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2024\/02\/security-hero-macbook-chained-to-desk-548x308.png 548w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2024\/02\/security-hero-macbook-chained-to-desk-364x204.png 364w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2024\/02\/security-hero-macbook-chained-to-desk-230x129.png 230w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2024\/02\/security-hero-macbook-chained-to-desk-100x56.png 100w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2024\/02\/security-hero-macbook-chained-to-desk-213x120@2x.png 426w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2024\/02\/security-hero-macbook-chained-to-desk-284x160@2x.png 568w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2024\/02\/security-hero-macbook-chained-to-desk-190x107@2x.png 380w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><\/figure>\n\n\n\n<p>This post builds on my previous post: <a href=\"https:\/\/eshop.macsales.com\/blog\/88542-how-corporate-security-sloppiness-threatens-your-online-life-and-how-you-can-reduce-your-risk\/?utm_source=diglloyd&amp;utm_content=_a_%7Ediglloyd%40blog_2024_20240130_1300_OWCBlog_HowCorporateSecuritySloppinessPutsYouAtRisk\" data-type=\"URL\" data-id=\"https:\/\/eshop.macsales.com\/blog\/88542-how-corporate-security-sloppiness-threatens-your-online-life-and-how-you-can-reduce-your-risk\/?utm_source=diglloyd&amp;utm_content=_a_%7Ediglloyd%40blog_2024_20240130_1300_OWCBlog_HowCorporateSecuritySloppinessPutsYouAtRisk\">How Corporate Security Sloppiness Threatens Your Online Life and How You Can Reduce Your Risk<\/a>.<\/p>\n\n\n\n<p>A fact of life is that security is extremely hard\u2014not for technical reasons, but for people reasons.<\/p>\n\n\n\n<p>When I was working as an engineering manager in the computer security field, the top issue was never the security itself, but how to make things as secure as possible <em>while keeping things usable<\/em>. Endless discussions lasting hours. <strong>Security is as weak as its weakest link, and today that is almost always the people involved<\/strong>.<\/p>\n\n\n\n<p>Thus any approach that is \u201cbest\u201d is <em>ludicrous<\/em> when people cannot use it and\/or understand it and\/or <em>make mistakes<\/em> with it. People start doing seriously risky things when security is too hard to use. Security <em>always<\/em> involves some kind of tradeoff vs. complexity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-risk-management\">Risk management<\/h3>\n\n\n\n<p><strong>Bad to terrible outcomes<\/strong>: too many people have been subject to security hacks that have cost them dearly, with problems that take years to clean up. Some breaches are <strong>irreversible<\/strong> (eg. financial loss), some are <strong>longterm headaches<\/strong> (e.g. ruined credit rating), some are <strong>embarrassing<\/strong> (e.g. blackmail), some are <strong>life threatening<\/strong> (e.g. false arrest due to stolen identity). Don\u2019t join this unlucky club!<\/p>\n\n\n\n<p>Risk management starts with understanding the simplest things <strong>you<\/strong> can do to protect yourself with <strong>your own best practices<\/strong>. Just as with walking down a city street, <strong>it\u2019s on you to have situational awareness<\/strong>. Even big companies with strict policies have problems with security, which means individuals absolutely have them as well. <\/p>\n\n\n\n<p>After all, it\u2019s a mine field out there. Legislative uselessness driven by corporate disinterest is to blame for much of the danger because their priorities are not your security. This dangerous ground is not likely to change any time soon, in spite of lip service given to it. There are of course islands of good practices here and there, but the total environment remains risky.  And security rests on the weakest link.<\/p>\n\n\n\n<p>And not just from hackers, but also from  the <a rel=\"noreferrer noopener\" href=\"https:\/\/macperformanceguide.com\/blog\/2023\/20231220_1630-security-ComcastDataBreach36Million.html\" data-type=\"URL\" data-id=\"https:\/\/macperformanceguide.com\/blog\/2023\/20231220_1630-security-ComcastDataBreach36Million.html\" target=\"_blank\">reckless practices even today of many big companies<\/a>, who have little to lose when security breaches happen. You will <em>not<\/em> be compensated for their mistakes. You may be blameless, but you will pay the price, <em>not<\/em> that company whose failings led to it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-can-t-a-password-manager-just-fix-it-all\">Can\u2019t a password manager just fix it all?<\/h3>\n\n\n\n<p>Password managers are all the rage and for good reason, but they are no panacea. And IMO, among other problems, they have become overburdened with complexity and frequently fail to work with some web sites. The overall recommendation is solid, but it is the most glib and context-free recommendation you\u2019ll hear today. Yes, <em>use one<\/em>, but not everyone can grok one, and it is not without risk itself.<\/p>\n\n\n\n<p>For example, my own father finds a password manager too complicated\/confusing, and that is not going to improve as he ages. Can <em>you<\/em> teach grandma how to use one? <\/p>\n\n\n\n<p>Here in 2024, my favorite password manager has become such a hassle to setup on a new computer that I have to revisit the directions and jump through multiple hoops and <em>compromise a required secret code<\/em> (eg. store it on my computer) for fear of losing everything. A <em>terrible<\/em> design for a password manager. All because that vendor forced a move to cloud-only and their new architecture prioritizes <em>their<\/em> needs, not mine.<\/p>\n\n\n\n<p>Before, it was far simpler and without that secret key risk\u2014far better for me. Just not for the vendor. That vendor will surely argue otherwise, but as a software engineer writing code for 40 years, I beg to differ. <\/p>\n\n\n\n<p>So, where does this all leave a non-engineer when it comes to protecting themselves?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-rules\">Rules<\/h2>\n\n\n\n<p>Let\u2019s look at the basics of protecting yourself. This is not a complete list, but it is a start down the right path.  And to my regret, it\u2019s not all that simple. Alas, that is digital life today.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-security-rule-0-trust-is-the-opposite-of-security\">Security Rule #0: Trust is the opposite of security<\/h3>\n\n\n\n<p>All the other rules that follow become useless if you willingly give up sensitive information. Whether it is by phone call or text or email or in person, giving up sensitive information is your ticket to disaster. Always independently verify the identity of  every request for information, and provide as little information as possible.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Do not assume a phone call is legitimate. Look up the phone number yourself, and call back. I have been called <em>by myself<\/em> according to caller ID!<\/li><li>Never click on links in email. Never.<\/li><li>Voices can be faked to near perfection\u2014the caller might be an AI voice.<\/li><li>Never \u201chelp someone out\u201d with security information.<\/li><li>Even simple things like where you live, birthday, etc. can be used to get into one of your accounts. <\/li><li>The list is endless.<\/li><\/ul>\n\n\n\n<p>All such social engineering practices rely on social norms. Learn to resist the pressure and violate (appropriately) social norms of courtesy and trust in all security situations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-security-rule-1-never-use-the-same-password-more-than-once\">Security Rule #1: Never use the same password more than once<\/h3>\n\n\n\n<p><strong>Rating<\/strong>: essential<\/p>\n\n\n\n<p>So convenient isn\u2019t it?  Same password for your iPhone, iPad, Mac, and maybe some online sites. <strong>You might as well walk around with a T-shirt reading \u201ceasy mark, steal my stuff please\u201d<\/strong>. <\/p>\n\n\n\n<p>When a hacker obtains a password, that hacker now can access <strong>all<\/strong> of the accounts that share the password. And possibly reset other accounts via password-reset mechanisms, using the compromised accounts as leverage (e.g. one account such as mail can be used to confirm a reset for another). Or guess other similar passwords&#8230; a snowballing effect. All automated and essentially instantaneous.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Using the same password for your Mac as for iCloud or your phone is a terrible practice.  <\/li><li>Your email password should be especially high security, since email is usually the key to compromising all your other stuff (e.g. password reset). Therefore, <strong>your email password should never be shared for anything else<\/strong>, or be in any way similar.<\/li><li>Do not use passwords that vary only in minor ways. Hackers will quickly try variants and additions.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-security-rule-2-use-a-strong-passphrase\">Security Rule #2: Use a Strong PassPHRASE<\/h3>\n\n\n\n<p><strong>Rating<\/strong>: essential, but in limited contexts<\/p>\n\n\n\n<p>Due to the hassle and errors in entering a long sequence, this rule is really only practical for unlocking really important stuff e.g. unlocking the vault of a password manager. <\/p>\n\n\n\n<p><em>The more important something is, the stronger the passphrase should be<\/em>.<\/p>\n\n\n\n<p>Random-character gobbledygook passphrases at least 16 characters long are best, but using them de facto requires a password manager, barring some perfect memory and perfect typing skills. Therefore&#8230;<\/p>\n\n\n\n<p>Think pass<strong>phrase<\/strong>, not pass<strong>word<\/strong>\u2014as in <strong>multiple words<\/strong>. If you\u2019re me, you can probably remember \u201c<em>My Cat <a rel=\"noreferrer noopener\" href=\"https:\/\/diglloyd.com\/\/Tigger\" data-type=\"URL\" data-id=\"https:\/\/diglloyd.com\/\/Tigger\" target=\"_blank\">Tigger<\/a> Loves Rats and Gophers 24&#215;7\u201d<\/em>.  It\u2019s never going to be hacked\/guessed, and now I can never use it. Substitute a few numbers and punctuation instead of letters (invent your own personal rules), and you\u2019re golden.<\/p>\n\n\n\n<p>Summarizing, this is a classic \u201cusable vs. secure\u201d tradeoff: it\u2019s inconvenient and error-prone to enter a high-quality passphrase, so you choose a short and easy one. Use it when feasible. Indeed, Apple makes this much worse by making  it nearly impossible to enter correctly because what has been typed is hidden from you with bullet chars\u2014your typos are hidden from you (yes, this happens to me a LOT). It is why I loathe entering my iCloud or App Store password\u2014pretty soon I am getting the \u201c<em>too many errors you are about to be locked-out<\/em>\u201d thing.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-security-rule-3-learn-to-use-a-password-manager\">Security Rule #3: Learn to use a password manager<\/h3>\n\n\n\n<p><strong>Rating<\/strong>: strongly advised, but might be too hard for some.<\/p>\n\n\n\n<p>That spreadsheet or text file or scrap of paper on your desk with all your passwords on your computer is a <em>massive<\/em> risk. Yeah, I &#8216;get&#8217; that you need some means of remembering them all, but think about what it means if someone gets to it. That includes in your backups, everywhere they are. For such an approach, at least get things onto an <a rel=\"noreferrer noopener\" href=\"https:\/\/eshop.macsales.com\/blog\/87721-another-use-for-speedy-camera-memory-cards-encrypted-ultraportable-backups-of-critical-data\/\" data-type=\"URL\" data-id=\"https:\/\/eshop.macsales.com\/blog\/87721-another-use-for-speedy-camera-memory-cards-encrypted-ultraportable-backups-of-critical-data\/\" target=\"_blank\">encrypted thumb drive<\/a> that can be removed and locked up. And make sure that every backup containing that sensitive stuff is encrypted.<\/p>\n\n\n\n<p>I use a <a rel=\"noreferrer noopener\" href=\"https:\/\/macperformanceguide.com\/password manager\" data-type=\"URL\" data-id=\"https:\/\/macperformanceguide.com\/password manager\" target=\"_blank\">password manager<\/a>, and could not work efficiently without one. A password manager is a huge time-saver and comes with some less than obvious benefits, plus some risks:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Once unlocked, a password manager can not only fill in logins (with varying success), it can fill in name\/address\/credit card\/etc. This saves a ton of time.<\/li><li>You no longer have to remember your passwords, so that they can be long and messy and different for every login.<\/li><li>Securely store notes, special information, etc.<\/li><li>I don\u2019t even know most of my passphrases now. Which means deniability e.g. if someone wants to force you to reveal a particular password (think border crossings, thieves, etc.) On the flip side, if your PM password is compromised, the entire vault is open for everything inside it.<\/li><li>RISK: if you compromise your vault password, all your passwords are compromised. See Rule #2 on strong passphrases and what happens on phone, tablet, computer.<\/li><\/ul>\n\n\n\n<p>A password manager eliminates the keep-it-short + enter-into-spreadsheet doom loop.  However, <strong>a password manager is an \u201call eggs in one basket\u201d approach, and so the passphrase for this \u201cvault\u201d must be strong and never compromised<\/strong>.  And you must consider its risks on phone and tablet and computer. For such reasons, I use it only on my computer\u2014I just do not want to deal with it on iOS.<\/p>\n\n\n\n<p>With a password manager, have an <strong>outstanding high-quality password for unlocking it, and be extraordinarily careful about where you type that in<\/strong>. That one master password unlocks your <em>world<\/em>. And that is the only serious downside of a password manager, assuming it is engineered properly. Nothing is without risk, but a password manager is vastly superior to a text file or spreadsheet. Finally, consider what happens when you die and make sure that your heirs know the password manager  passphrase.<\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/macperformanceguide.com\/1Password\" data-type=\"URL\" data-id=\"https:\/\/macperformanceguide.com\/1Password\" target=\"_blank\">Password managers<\/a> have been breached before. The only one I am prepared to recommend is <a rel=\"noreferrer noopener\" href=\"https:\/\/macperformanceguide.com\/1Password\" data-type=\"URL\" data-id=\"https:\/\/macperformanceguide.com\/1Password\" target=\"_blank\">1Password<\/a> because they appear to do everything \u201cright\u201d from a security perspective, and I say that based on years of engineering experience with encryption. Which is not to say I like the increasing complexity of a do-it-all app\u2014the earlier versions were easier for me to understand and manage.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-security-rule-4-require-a-2nd-confirmation-for-login-2fa\">Security Rule #4: Require a 2nd confirmation for login (2FA)<\/h3>\n\n\n\n<p><strong>Rating<\/strong>: essential for anything important<\/p>\n\n\n\n<p><strong>2FA means \u201c2 factor authentication<\/strong>\u201d. One <strong>factor<\/strong> is your traditional login e.g. name + password. The other <strong>factor<\/strong> is something else, such as a one-time code sent to your device, or biometrics, or a separate device.  <\/p>\n\n\n\n<p>2FA greatly enhances security because all items must be compromised. And there <em>are<\/em> ways to defeat this, such as phone-number porting (convincing the phone company to switch your phone number to another phone), so it\u2019s not perfect.<\/p>\n\n\n\n<p>Many if not most web sites now allow pairing a login requirement along with a one-time code to complete the login. Some allow bypassing this for your computer (check a box to skip), which might be reasonable when at home. Or might not\u2014consider people who have access to your home..<\/p>\n\n\n\n<p><strong>Phone\/tablet-based one-time access codes are the simplest and best form of 2FA<\/strong>. Very high value vs. not having it. <\/p>\n\n\n\n<p>However, there are schemes to compromise phones (steal your number). These are outside our scope here, but make sure such accounts themselves are as locked down as the provider allows.<\/p>\n\n\n\n<p>The <strong>best 2FA<\/strong> involves the use of a hardware device you can keep with you, such as on your keyring. These emit a new code every minute or so.   Sadly,  the number of sites supporting such devices is so few and so different that in practice they are a non-solution. That said, if your bank or brokerage or similar offers them, that is your very best choice.<\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-Schwab-ConfirmYourIdentity-2.png\" alt=\"\" class=\"wp-image-88528\" width=\"846\" height=\"474\" srcset=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-Schwab-ConfirmYourIdentity-2.png 1692w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-Schwab-ConfirmYourIdentity-2-214x120.png 214w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-Schwab-ConfirmYourIdentity-2-284x159.png 284w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-Schwab-ConfirmYourIdentity-2-190x106.png 190w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-Schwab-ConfirmYourIdentity-2-1536x861.png 1536w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-Schwab-ConfirmYourIdentity-2-750x421.png 750w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-Schwab-ConfirmYourIdentity-2-548x308.png 548w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-Schwab-ConfirmYourIdentity-2-364x204.png 364w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-Schwab-ConfirmYourIdentity-2-230x129.png 230w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-Schwab-ConfirmYourIdentity-2-100x56.png 100w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-Schwab-ConfirmYourIdentity-2-214x120@2x.png 428w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-Schwab-ConfirmYourIdentity-2-284x159@2x.png 568w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-Schwab-ConfirmYourIdentity-2-190x106@2x.png 380w\" sizes=\"auto, (max-width: 846px) 100vw, 846px\" \/><figcaption>2FA authentication as one-time code sent via SMS text message<\/figcaption><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-security-rule-5-never-click-on-links-in-emails\">Security Rule #5: Never click on links in emails<\/h3>\n\n\n\n<p><strong>Rating<\/strong>: strongly recommended (bad habits become automatic)<\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/macperformanceguide.com\/phishing\" data-type=\"URL\" data-id=\"https:\/\/macperformanceguide.com\/phishing\" target=\"_blank\">Phishing<\/a> links in emails are a top way to breach security. This is why companies train and\/or forbid employees from clicking on such links or even remove them entirely. Unless you are certain that an email is legitimate (are you an expert?), <strong>never click on a link in an email.<\/strong> And <strong>definitely NOT from your friends or associates\u2014think fake or unwitting emails<\/strong>.  Not \u201ccheck this out\u201d emails. Not from Apple, not from the IRS, not from your family\u2014what if their email had been compromised?<\/p>\n\n\n\n<p><strong>Not from anyone<\/strong>. That is the only safe way to operate. You may make exceptions as I do, but only in specific circumstances. The problem is that once you break a rule\/habit, you WILL break it that one time when you should not have.<\/p>\n\n\n\n<p>Unfortunately, many companies persist in sending emails with messages that essentially look like phishing emails: \u201c<em>click here to do this useful thing<\/em>\u201d. How can you possibly know if these are legitimate? I can do so 99.9% of the time, but what about you, and what about the average computer user?<\/p>\n\n\n\n<p>The first group of hackers that makes phishing emails look 100% legitimate (easy to do) is going to have a much higher hit rate. Usually there are obvious errors.<\/p>\n\n\n\n<p>Currently, most phishing scams like the one shown below are obviously fake when examined. But <strong>at a glance, many a person is fooled<\/strong>, making it a profitable scheme. And a glance is all most people do, most of the time. For that reason, <strong><span class=\"has-inline-color has-vivid-red-color\">never ever click on links from anything that looks like it is from a financially related company<\/span><\/strong>. <\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/macperformanceguide.com\/images\/securityExamples\/2016-0618-security-PayPal-phishing.png\" alt=\"\" width=\"750\" height=\"854\"\/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-security-rule-6-no-promiscuous-web-browsing\">Security Rule #6: No promiscuous web browsing<\/h3>\n\n\n\n<p>First, never visit insecure sites (plain <strong>http<\/strong> not https); your browser should warn you when visiting a non-secure site, albeit maybe poorly. Strikingly, there are still a lot of legitimate web sites out there that have such poor security that they either have no https (encrypted form) or allow either http or https connections. Such sites should be strictly avoided, used only in the greatest need, since such reckless configuration also suggests web site compromise as a strong possibility.<\/p>\n\n\n\n<p>\u201c<strong>Promiscuous web browsing<\/strong>\u201d. There are several forms of this, and my wife does them all, which drives me crazy, though I am slowly training her as to the dangers. So many juicy enticing salacious links to click on!<\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-red-color\">Sooner or later, one of these will lead you to a compromised website with malware<\/span><\/strong>. Or less toxic but still a scam, it tmay take over your computer screen with a scary warning about how it is infected and to <em>click here to pay and get it fixed<\/em>. In which case you get some nasty crapware that if it is not outright malware will crash your machine or demand an upgrade or some such. This happened to a relative of mine, an otherwise highly intelligent person.<\/p>\n\n\n\n<p>Similarly, any click-bait web site can rapidly lead you to dark corners. You might like that salacious \u201cnews\u201d site, but you will end up paying the price.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-security-rule-7-non-administrator-login-on-your-mac\">Security Rule #7: Non-administrator login on your Mac<\/h3>\n\n\n\n<p>This might or might not protect you, since Apple itself has had so many \u201czero day\u201d problems in the past few years. But you can only do what you can do.<\/p>\n\n\n\n<p>Consider adding a <strong>non<\/strong>-administrator account in <strong>System Settings =&gt; Users and Groups<\/strong>. You will have to add another account, and unfortunately Apple does not make it simple to move your stuff between accounts. For this reason, it is best done when setting up a new Mac.<\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-SystemSettings-AdministratorAccount.png\" alt=\"\" class=\"wp-image-88506\" width=\"715\" height=\"532\" srcset=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-SystemSettings-AdministratorAccount.png 1430w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-SystemSettings-AdministratorAccount-161x120.png 161w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-SystemSettings-AdministratorAccount-284x211.png 284w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-SystemSettings-AdministratorAccount-190x141.png 190w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-SystemSettings-AdministratorAccount-161x120@2x.png 322w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-SystemSettings-AdministratorAccount-284x211@2x.png 568w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2023\/12\/2023-1221-SystemSettings-AdministratorAccount-190x141@2x.png 380w\" sizes=\"auto, (max-width: 715px) 100vw, 715px\" \/><figcaption>Administrator accounts have more access<\/figcaption><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-conclusions\">Conclusions<\/h3>\n\n\n\n<p>Certain improvements in security can be had with relatively little effort. You cannot control for bad practices or security bugs, but by following at least some of these rules, you can greatly reduce the risks that you <em>can<\/em> control. Proceed in stages, with the easiest things first, and go from there.<\/p>\n\n\n\n<p>Did I keep things reasonably simple? Not to my satisfaction. Security is a very hard nut to crack, and simplified advice usually ends up being simplistic. Still, I hope that by touching on each of these areas, a broader viewpoint may help you may smarter  choices.<\/p>\n\n\n\n<p>This article was an overview, not a how-to. Please leave a comment as to which item(s) would be helpful as to how to do certain things.<\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"alignright size-large is-resized\"><a href=\"https:\/\/diglloyd.com\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/diglloyd.com\/gfx\/flag.diglloyd.png?dglyOWCB=Security_7RulesToKeepHackersAtBay\" alt=\"\" width=\"125\" height=\"70\"\/><\/a><\/figure><\/div>\n\n\n\n<p style=\"font-size:12px\">Author\u2019s background: besides a <a rel=\"noreferrer noopener\" href=\"https:\/\/diglloyd.com\/aboutlc.html\" data-type=\"URL\" data-id=\"https:\/\/diglloyd.com\/aboutlc.html\" target=\"_blank\">degree in mathematics and computational science<\/a>, and six different startup companies and Staff Engineer at Sun Microsystems and Oracle,  Lloyd worked in the security (encryption) industry for several years as both an engineer and engineering manager, namely at Pretty Good Privacy (PGP).  Lloyd was also responsible for application server security at NetDynamics, later acquired by Sun Microsystems.<\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/diglloyd.com\/OWC articles by Lloyd\" target=\"_blank\">View all posts by Lloyd Chambers\u2026<\/a> Lloyd\u2019s photo web site is <a rel=\"noreferrer noopener\" href=\"https:\/\/diglloyd.com\" target=\"_blank\">diglloyd.com<\/a>, computers is <a rel=\"noreferrer noopener\" href=\"https:\/\/macperformanceguide.com\" target=\"_blank\">MacPerformanceGuide.<\/a>com, cycling and health at <a rel=\"noreferrer noopener\" href=\"https:\/\/windinmyface.com\" target=\"_blank\">WindInMyFace.com<\/a>, software tools including disk testing and <a rel=\"noreferrer noopener\" href=\"https:\/\/macperformanceguide.com\/autoTopic.html?dglyTP=data+integrity\" target=\"_blank\">data integrity validation<\/a> at <a rel=\"noreferrer noopener\" href=\"https:\/\/diglloydtools.com\" target=\"_blank\">diglloydTools.com<\/a>. <a rel=\"noreferrer noopener\" href=\"https:\/\/www.patreon.com\/diglloyd\/collections\" target=\"_blank\">Patreon page<\/a>. <a rel=\"noreferrer noopener\" href=\"https:\/\/macperformanceguide.com\/consulting.html\" target=\"_blank\">Lloyd also offers consulting<\/a> on camera systems and lenses, professional setups for photography\/videography and backup.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized is-style-default\"><a href=\"https:\/\/diglloyd.com\/blog\/2023\/20231121_1046-FujifilmGFX100_II-FujifilmGF55f1_7-MtConness.html\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/diglloyd.com\/articles\/OWC\/2023-1008-_DGA0156s5-ViewFromMtConnessTowardsMtDanaDistantRainclouds-RGB,2880x2160.jpg\" alt=\"\" width=\"720\" height=\"540\"\/><\/a><figcaption>View from Mt Conness to Mt Dana<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Computer security is hard\u2014not for technical reasons, but for people reasons. But by following at least some of these rules, you can greatly reduce the risks that you can control. <\/p>\n","protected":false},"author":298,"featured_media":89646,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"spay_email":"","footnotes":""},"categories":[7626,4],"class_list":["post-88310","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-and-privacy","category-tech-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.2 (Yoast SEO v20.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Computer Security: 7 Rules to Keep Hackers at Bay<\/title>\n<meta name=\"description\" content=\"Computer security is hard\u2014not for technical reasons, but for people reasons. But by following at least some of these rules, you can greatly reduce the risks that you can control.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer Security: 7 Rules to Keep Hackers at Bay\" \/>\n<meta property=\"og:description\" content=\"Computer security is hard\u2014not for technical reasons, but for people reasons. But by following at least some of these rules, you can greatly reduce the risks that you can control.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/\" \/>\n<meta property=\"og:site_name\" content=\"Rocket Yard\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-07T19:45:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-17T20:36:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2024\/02\/security-hero-macbook-chained-to-desk.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"diglloyd\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@diglloyd\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"diglloyd\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/\"},\"author\":{\"name\":\"diglloyd\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/858d98ed8e2b5e234b205140097b33cd\"},\"headline\":\"Computer Security: 7 Rules to Keep Hackers at Bay\",\"datePublished\":\"2024-02-07T19:45:00+00:00\",\"dateModified\":\"2024-06-17T20:36:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/\"},\"wordCount\":2849,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#organization\"},\"articleSection\":[\"security and privacy\",\"Tech Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/\",\"url\":\"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/\",\"name\":\"Computer Security: 7 Rules to Keep Hackers at Bay\",\"isPartOf\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#website\"},\"datePublished\":\"2024-02-07T19:45:00+00:00\",\"dateModified\":\"2024-06-17T20:36:54+00:00\",\"description\":\"Computer security is hard\u2014not for technical reasons, but for people reasons. But by following at least some of these rules, you can greatly reduce the risks that you can control.\",\"breadcrumb\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/eshop.macsales.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer Security: 7 Rules to Keep Hackers at Bay\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#website\",\"url\":\"https:\/\/eshop.macsales.com\/blog\/\",\"name\":\"Rocket Yard\",\"description\":\"Your source for expert tips, special deals, commentary, reviews, and the latest tech news.\",\"publisher\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/eshop.macsales.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#organization\",\"name\":\"OWC\",\"url\":\"https:\/\/eshop.macsales.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2020\/06\/rocket-yard-logo-round.png\",\"contentUrl\":\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2020\/06\/rocket-yard-logo-round.png\",\"width\":1024,\"height\":1024,\"caption\":\"OWC\"},\"image\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/858d98ed8e2b5e234b205140097b33cd\",\"name\":\"diglloyd\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/58e86a1188eb99c36dd6e1337d88892dfc7d75f057b5dc9308b2b38586c218b2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/58e86a1188eb99c36dd6e1337d88892dfc7d75f057b5dc9308b2b38586c218b2?s=96&d=mm&r=g\",\"caption\":\"diglloyd\"},\"sameAs\":[\"https:\/\/diglloyd.com\",\"https:\/\/twitter.com\/diglloyd\",\"https:\/\/www.youtube.com\/diglloyd\"],\"url\":\"https:\/\/eshop.macsales.com\/blog\/author\/lloydchambers\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Computer Security: 7 Rules to Keep Hackers at Bay","description":"Computer security is hard\u2014not for technical reasons, but for people reasons. But by following at least some of these rules, you can greatly reduce the risks that you can control.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/","og_locale":"en_US","og_type":"article","og_title":"Computer Security: 7 Rules to Keep Hackers at Bay","og_description":"Computer security is hard\u2014not for technical reasons, but for people reasons. But by following at least some of these rules, you can greatly reduce the risks that you can control.","og_url":"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/","og_site_name":"Rocket Yard","article_published_time":"2024-02-07T19:45:00+00:00","article_modified_time":"2024-06-17T20:36:54+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2024\/02\/security-hero-macbook-chained-to-desk.png","type":"image\/png"}],"author":"diglloyd","twitter_card":"summary_large_image","twitter_creator":"@diglloyd","twitter_misc":{"Written by":"diglloyd","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/#article","isPartOf":{"@id":"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/"},"author":{"name":"diglloyd","@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/858d98ed8e2b5e234b205140097b33cd"},"headline":"Computer Security: 7 Rules to Keep Hackers at Bay","datePublished":"2024-02-07T19:45:00+00:00","dateModified":"2024-06-17T20:36:54+00:00","mainEntityOfPage":{"@id":"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/"},"wordCount":2849,"commentCount":0,"publisher":{"@id":"https:\/\/eshop.macsales.com\/blog\/#organization"},"articleSection":["security and privacy","Tech Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/","url":"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/","name":"Computer Security: 7 Rules to Keep Hackers at Bay","isPartOf":{"@id":"https:\/\/eshop.macsales.com\/blog\/#website"},"datePublished":"2024-02-07T19:45:00+00:00","dateModified":"2024-06-17T20:36:54+00:00","description":"Computer security is hard\u2014not for technical reasons, but for people reasons. But by following at least some of these rules, you can greatly reduce the risks that you can control.","breadcrumb":{"@id":"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/eshop.macsales.com\/blog\/88310-computer-security-7-rules-to-keep-hackers-at-bay\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/eshop.macsales.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Computer Security: 7 Rules to Keep Hackers at Bay"}]},{"@type":"WebSite","@id":"https:\/\/eshop.macsales.com\/blog\/#website","url":"https:\/\/eshop.macsales.com\/blog\/","name":"Rocket Yard","description":"Your source for expert tips, special deals, commentary, reviews, and the latest tech news.","publisher":{"@id":"https:\/\/eshop.macsales.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eshop.macsales.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eshop.macsales.com\/blog\/#organization","name":"OWC","url":"https:\/\/eshop.macsales.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2020\/06\/rocket-yard-logo-round.png","contentUrl":"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2020\/06\/rocket-yard-logo-round.png","width":1024,"height":1024,"caption":"OWC"},"image":{"@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/858d98ed8e2b5e234b205140097b33cd","name":"diglloyd","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/58e86a1188eb99c36dd6e1337d88892dfc7d75f057b5dc9308b2b38586c218b2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/58e86a1188eb99c36dd6e1337d88892dfc7d75f057b5dc9308b2b38586c218b2?s=96&d=mm&r=g","caption":"diglloyd"},"sameAs":["https:\/\/diglloyd.com","https:\/\/twitter.com\/diglloyd","https:\/\/www.youtube.com\/diglloyd"],"url":"https:\/\/eshop.macsales.com\/blog\/author\/lloydchambers\/"}]}},"jetpack_featured_media_url":"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2024\/02\/security-hero-macbook-chained-to-desk.png","jetpack_shortlink":"https:\/\/wp.me\/pmPaT-mYm","_links":{"self":[{"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/posts\/88310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/users\/298"}],"replies":[{"embeddable":true,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/comments?post=88310"}],"version-history":[{"count":345,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/posts\/88310\/revisions"}],"predecessor-version":[{"id":93801,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/posts\/88310\/revisions\/93801"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/media\/89646"}],"wp:attachment":[{"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/media?parent=88310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/categories?post=88310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}