Blogs

The latest in thought leadership from our experts

Recent Posts:

vulnerability scan

What is a Vulnerability Scan?

***LIMITED TIME OFFER*** Contact MC Services by February 29, 2024 to schedule a FREE vulnerability scan…
Mother of All Breachespasswords

After “Mother of All Breaches,” Update Your Passwords

In last month’s security news, you likely heard about the “Mother of All Breaches”: the release…
GooglePrivacySearch Engine

Concerned by Google Search? Try These Other Search Engines

Google Search generated $225 billion in revenue in 2022, thanks in part to being the default…
Safariweb apps

Turn Your Most-Used Sites into Safari Web Apps in macOS 14 Sonoma

In macOS 14 Sonoma, Safari introduced Web apps (also known as site-specific browsers) that allow you…
2024digital securityphishingscams

Improve Your Digital Security in 2024 with New Year’s Resolutions

Happy New Year and welcome to 2024! Starting a new year often means reflecting on fresh…
macOS 14 Sonomaupgrade

Feel Free to Upgrade to macOS 14 Sonoma

We proceed with caution when recommending people upgrade to the latest major release of macOS—but we…
file sharingmoving data

Nine Ways of Moving Data From One Mac to Another

When you want to copy a file from one Mac to another Mac, the best way…
Apple WatchiPhoneNameDrop

NameDrop in iOS 17 Is Not a Privacy Concern: How To Use It

One of the prominent new features in iOS 17.1 and watchOS 10.1 is NameDrop, which makes…
macOS 14 Sonomatroubleshooting

Four Solutions to Gotchas in macOS 14 Sonoma

As an increasing number of people switch to macOS 14 Sonoma, some of its new default…
iospasscode reset

Forget Your Just-Changed Passcode? iOS 17’s Passcode Reset Can Help

While there is usually no reason to change your iPhone or iPad passcode, the hardest time…
M3 chipsMacBookupgrades

New M3 Chip Powers MacBook Pros and 24-inch iMac

Last month, Apple unveiled its next-generation Apple silicon chips for Macs: the M3, M3 Pro, and…
2FAtwo-factor authentication

Faster Copying of Two-Factor Authentication Codes From Messages

As a convenient time-saver, Safari will automatically detect and fill SMS-based two-factor authentication codes received in…
phishingransomwarevishingvoice phishing

Voice Phishing Used in Ransomware Attacks

Phishing is no longer a scam that is limited to emails and texts—recently, “voice phishing,” or…
passwordsPDFsSecurity

Want to Password-Protect a PDF? Follow These Best Practices

Password-protecting a PDF can be helpful when you want to ensure a PDF that contains sensitive…
2FA2SVauthentication codeshackersscams

What To Do About an Authentication Code You Didn’t Request?

Two-factor authentication (2FA) or two-step verification (2SV) should be used with online accounts whenever possible. After…

Is Your IT Team Stretched Too Thin?

Let them focus on core business functions, and let us take care of the technicalities!

This will close in 0 seconds