Join me on my journey as I share my insights and experiences on all things Apple, Business and Entrepreneurship!
If you're trying to streamline macOS deployments in JAMF, there’s always that moment where you realize: the built-in experience gets you *close*, but not all the way there.
Caches pile up, apps leave behind junk, and disk space slowly disappears. While there are plenty of GUI tools out there, most of them either lack transparency or feel overly bloated.
As a Mac admin, I'm always on the lookout for tools that make my life easier and more efficient. Recently, I stumbled upon Pique - a brilliant Quick Look plugin created by Henry Stamerjohann that allows you to view file contents in a syntax highlighted way.
In this final ABM Warranty 0.4.1 walkthrough, I’m wrapping up the last features I had not covered directly in the earlier videos and then focusing on support, community, and the beta program. I also want to show where the support resources live inside the app so you know where to go if you need help, documentation, or a way to send useful feedback. Additionally, I'll be covering some of the key features that were updated since the previous version, including any bug fixes or improvements made to existing functionality.
In this part of the ABM Warranty 0.4.1 walkthrough series, I'm focusing on managed preferences and the credential packaging workflow. In the last video, I covered multiple credentials inside the app itself. In this one, I'm showing how to package those credentials so they can be deployed securely through MDM. This process is a crucial step in ensuring that your credentials are properly configured and protected within your organization's mobile device management system.
A few days ago I released a review of QuickPKG, a tool I love and use almost daily. What I really love about packaging and QuickPKG is that no matter what Mobile Device Management (MDM) solution I'm working with at any given moment, it provides a universal way to create a quick package to import into JAMF, Mosyle, or any MDM. This consistency is particularly valuable when switching between projects or environments, as the process remains the same regardless of the specific MDM being used.
Today I’m walking through Low Profile, a utility from Nindi Gill that I use when I want to inspect profiles already installed on a Mac and figure out whether those profiles contain issues I need to clean up. The value is that Low Profile gives me a straightforward way to inspect profiles installed on any Mac. This simplicity makes it easy for me to identify and address potential problems, which is especially useful when working with multiple machines or troubleshooting complex profile configurations.
In this part of the ABM Warranty 0.4.1 walkthrough series, I’m focusing on multiple credentials. In the first video, I showed the basic setup and how to add a single credential. Now, I want to explore what happens when I remove a credential, what changes occur when I add more than one, and how the app behaves once there are multiple contexts in play. This will help clarify any potential issues or inconsistencies that may arise with multiple credentials.
I use QuickPKG when I need to turn an application, DMG, or ZIP file into a package quickly without wasting time in a heavier packaging workflow. This post follows the same path as my video: what QuickPKG is, where to get it, how I run it, what a simple packaging example looks like, and where I think admins need to be careful about potential pitfalls that can arise from using this tool.
In this first ABM Warranty 0.4.1 walkthrough, I want to show you what the app actually does before I get into the more specific feature videos. This is the broad introduction. I’m walking through the dashboard, how I think about the warranty cards, how released devices are handled, how the filters work, how to add credentials, where the data is stored locally, and what the logging and security model looks like.
Most of us treat Apple Configurator like a fire extinguisher: break glass, DFU, restore, move on. But it can do a lot more, and when you know the edges, you can turn a bricked morning into a ship-it afternoon. Below are ten things I regularly use (or wish I’d used sooner) that demonstrate its capabilities beyond just emergency recovery.
After passing the CISSP earlier this year, I decided to follow it up with the **Certified Secure Software Lifecycle Professional (CSSLP)** certification. For those unfamiliar, CSSLP is an ISC2 certification that focuses specifically on secure software development practices across the full SDLC—from requirements and design to coding, testing, deployment, and maintenance. My goal in pursuing this certification was to further develop my skills in ensuring the security of software throughout its entire lifecycle.
In today's fast-paced digital world, keeping your computer awake during important tasks is crucial. Enter **Amphetamine**, a powerful utility designed specifically for Mac users. This app ensures that your system remains active, preventing it from going to sleep or activating the screensaver when you need it most. In this article, we will explore the features of Amphetamine, how to use it effectively, and why it’s a must-have for Mac admins and everyday users alike.
It really depends on your company's needs. For example, many companies need to hire 1099 contractors and in such a case they come with their own devices but not the correct security settings or enforcements. Remember BYOD is a security construct. The idea here is that you should be securing the company's sensitive data in all forms. This may involve implementing policies for contractor-owned devices, ensuring that all devices accessing company data meet minimum security standards, and regularly reviewing and updating these standards to stay ahead of emerging threats.
In the world of Mac administration, having the right tools at your disposal is crucial. One of the standout applications that every Mac admin should consider is **Mac Tracker**. This powerful app serves as a comprehensive database of all historical Mac OS versions and Apple accessories, making it an invaluable resource for both seasoned professionals and newcomers alike. In this article, we will explore the features of Mac Tracker, how it can enhance your workflow, and why it deserves a spot in your toolkit.
Passing the CISSP (Certified Information Systems Security Professional) exam is no small feat. It’s known for its breadth, depth, and ability to test not just your knowledge but your practical understanding of cybersecurity. After nine months of intense preparation, I’m thrilled to say I’ve joined the ranks of CISSP-certified professionals! Here's a detailed account of my experience, including the resources I used, some tips that helped me along the way, and what I learned from the process itself.
When inquiring about a demo or starting a 30-day trial, please mention the code JONBROWN to receive an additional 5% discount on your first year of annual service. This offer is exclusive to new customers and can be applied at the time of sign-up. The discount will be automatically reflected in your account upon activation of the annual plan.
Ok so now that we have Portainer up and running, it's running securely so now we are ready to set up SNIPE-IT. Here are the steps to add SNIPE via Portainer. The first step is logging into Portainer. Upon logging into Portainer you will click on "Local" under Environments. This is the default Environment. Next, navigate to the "Stacks" tab and select the option to create a new stack. In this case, we'll be creating a new stack for SNIPE-IT.
When inquiring about a demo or starting a 30-day trial, please mention the code JONBROWN to receive an additional 5% discount on your first year of annual service. This offer is exclusive to new customers and can be applied at the time of sign-up. The discount will be automatically reflected in your account upon activation of the annual plan.
Xcodes is an amazing native application that you can use to switch back and forth between different versions of XCode on your Mac. Why would you need this? Some developers need to test beta versions of XCode and manually switching back and forth is a huge pain. You can only have one active version of XCode if your using the CLI and its hard to remember which one you left activated and which versions are actually installed.
When inquiring about a demo or starting a 30-day trial, please mention the code JONBROWN to receive an additional 5% discount on your first year of annual service. This offer is exclusive to new customers and can be applied at the time of sign-up. The discount will be automatically reflected in your account upon activation of the annual plan.
Here's the expanded paragraph: Ok so I've done a lot of research on reverse proxies and they are great at protecting your internal assets by hiding them from direct access, but there are some inherent security flaws that you have to live with if you want perfect security. Lets face it, there is no such thing as perfect security, but we can get pretty close. In fact, the more secure something is, the more complex and vulnerable it becomes in other ways.
Back in 2016, Hancock was created at the MacAdmins PSU conference during the Hackathon, where it took home the award for "Biggest Time Saver". We'd like to extend our thanks to Jeremy Agostino for developing a great little utility that has since become an essential tool for many.
Expect is an extension to the Tcl scripting language written by Don Libes. The program automates interactions with programs that expose a text terminal interface. Expect, originally written in 1990 for the Unix platform, has since become available for Microsoft Windows and other systems. Its functionality allows users to interact with these programs through scripted commands, eliminating the need for manual input.
Processes, cybersecurity is 99% documentation, writing, that's what it is. If you don't enjoy writing policies and procedures, or enforcing them, be aware that this may lead to conflicts with your coworkers. You'll need to communicate clearly and consistently, which can be a challenge for some people.
At this stage, we are assuming that you are still connected to the Raspberry Pi via a monitor. If you're already SSH'd into the machine, then you're one step ahead. In either case, please ensure that you have a stable connection and can access the terminal or command line interface without any issues.
Platypus is an amazing Mac Admins utility that allows you to take virtually any script and convert it into a GUI Application. Lets take a look at what it is and what it can do.
The first step in setting up SNIPE-IT is to set up the platform that it will run on. Luckily, the best platform and most economical option is a Raspberry Pi. We are using a Raspberry Pi 3 in this case. Before we get too far, we need to pick the operating system that the Raspberry Pi will use. This decision will determine how easily we can install and manage SNIPE-IT's dependencies and requirements.
Show me Your ID v 3.0 a great utility that allows you to as stated on the website "This app will provide you with the Bundle ID, Team ID, and the full code for an application by dragging the application to the Show Me Your ID 3.0 window. You have the option of saving the applications logo to your Desktop. This can be helpful when configuring items in Jamf Self Service as it provides a look and feels similar to the Mac App Store."
SD Notary 2 by Late Night Software developed by Shane Stanley is a valuable tool that has significantly reduced the time I spend on manual notarization tasks for applications, packages, and DMG files. This has been an essential part of my Mac Admin's toolkit, allowing me to streamline processes and focus on other critical tasks.
We all need a hobby, a thing to do as we unwind from a long and sometimes stressful day. Come join me as I rediscover something that I used to do many years ago but never completed and hope to do, create my own font face. In this series I am using the tool https://glyphsapp.com/buy and toggling back and forth between this tool and https://fontforge.org/en-US/ and creating my own font face discovering and sharing technique's along the way.
In the vast landscape of macOS utilities, finding a tool that seamlessly manages application uninstallations while ensuring no residual files clutter your system is invaluable. AppCleaner, developed by FreeMacSoft, emerges as a standout solution, providing users with an intuitive interface and features that extend far beyond ordinary uninstallers. Its simplicity and effectiveness make it a reliable choice for those seeking to declutter their Macs without compromising performance or security.
In an era where cybersecurity is paramount, staying ahead of the curve is essential. For the macOS community, NIST's Security and Compliance Project have opened doors to a new realm of possibilities. In our recent video, we delved deep into this groundbreaking initiative, uncovering the secrets to bolstering macOS security with tailored compliance frameworks.
In today's tech-driven world, virtualization has become indispensable. Join me in exploring UTM, a virtualization tool for Mac, and CrystalFetch, its companion for downloading OS files. This comprehensive walkthrough guides you through setting up Windows 11 and Mac OS virtual machines, providing a glimpse into the future of computing. We'll cover the essential steps to get started with UTM and CrystalFetch, including installation, configuration, and troubleshooting common issues.
In the ever-evolving landscape of software development, staying ahead of the curve is paramount. With Apple's introduction of the Notarization Tool, developers now have a new ally in ensuring the security and integrity of their applications. This guide will walk you through the process of notarizing packages and signing them using this tool, ensuring your applications are compliant with current requirements and ready for future updates.
In today's rapidly evolving tech landscape, efficient management of browser preferences is paramount for IT professionals. Chrome, being a widely used browser, often demands tailored configurations to meet organizational needs. In this comprehensive guide, I'll walk you through the process of managing Chrome preferences using Mobileconfig files, MDM, and open-source tools. By the end of this journey, you'll have a profound understanding of how to streamline Chrome settings effortlessly across multiple devices.
Hello, tech enthusiasts! Today, we embark on a journey into the world of Mac software deployment using the powerful Packages app. Whether you're a seasoned Mac admin or a budding developer, understanding the nuances of software deployment is crucial. In this comprehensive guide, we will walk you through the process step by step, ensuring you grasp every detail. Let's dive in!
In today's tech-driven world, application security is paramount. For macOS developers, understanding the nuances of Package Signing & Notarization is essential. Whether you're a seasoned coder or a curious tech enthusiast, this comprehensive guide will walk you through the intricacies of ensuring your applications are secure, trusted, and ready for distribution. This includes navigating Apple's guidelines and requirements to avoid common pitfalls and ensure seamless submission to the App Store.
Hey everybody! In today's video, I'm excited to introduce you to one of my favorite Apple binary applications - Hear. Hear is an incredible program that allows you to transcribe text using the dictation feature directly from Terminal or convert audio and movie files into text. It utilizes the built-in dictation feature of Mac OS, making transcription tasks easier than ever before. With Hear, you can quickly capture spoken words and turn them into written text, saving you time and effort in your work or personal projects.
In today's tutorial, we'll delve into the essential process of signing mobile configuration files, a crucial step in ensuring the security and integrity of your configurations. Before we dive in, make sure you have the following prerequisites in place: a mobile config file that needs signing, Xcode installed, and an active developer account associated with your Apple ID.
Today, I am thrilled to introduce you to a groundbreaking macOS utility that is reshaping the landscape of Mac administration: MIST. This powerful open-source tool is designed to simplify macOS management tasks, offering an unprecedented level of efficiency and flexibility. In this deep dive, I'll walk you through the intricacies of MIST, providing insights into how it works, where to get it, and how to harness its full potential.
Organizations are faced with the increasing scrutiny of more complex and sophisticated attacks by threat actors against key information systems that are essential to the organization. Complex attacks such as ransomware and data exfiltration are being used against organizations or systems that they encounter or somehow get access to. When an attacker wants to break into a system, they will typically choose the easiest and most direct methods in means in order to access it. The problem is an organization may not have a full understanding of the complex attack...
Cybersecurity risks and threats are issues that all organizations, large and small, must deal with. Whether the issues are information security program related or a technical challenge, organizations need to have the personnel resources to solve the cybersecurity issues as aligned to the business requirements set forth. In an ever-growing cloud-based services industry, information security risk is never greater. Cyberattacks are growing in impact and frequency. Not a week passes without a headline of another cybersecurity attack such as a data breach or a ransomware attack. Cyber criminals are becoming...
Security awareness training is one of the most critical and important security requirements for any size organization to consider implementing within their environment. Arguably, the greatest risk faced by any organization is the danger of insider threat as employees are can be considered a weak link in the chain as they are susceptible to curiosity, greed, envy, etc. To further increase risk, employees may be faced with the threat of social engineering attacks including phishing, baiting, spear phishing, tailgating, scareware, pretexting, quid pro quo, etc. To combat these risks, a...
A cyber security risk assessment is a critical activity performed on your company's security policy, procedures, and infrastructure to reveal potential threats to key corporate assets and vulnerabilities in your current security controls as implemented. This process involves identifying and evaluating the likelihood and potential impact of these risks, allowing you to prioritize mitigation efforts and allocate resources effectively.
The Cybersecurity Maturity Model Certification (CMMC) is the Department of Defense’s (DoD) latest cybersecurity program designed to ensure that cybersecurity controls and processes adequately protect Controlled Unclassified Information (CUI) that resides on Defense Industrial Base (DIB) systems and networks. The DIB consists of all suppliers of DOD related services including primes, subcontractors, consultants, and other entities that provide any type of service on a DOD related contract. This includes companies that manufacture, design, or test products for the DoD, as well as those that provide services such as logistics, maintenance,...
Ever since Apple introduced the Activity app to watchOS, you've been able to adjust your Move goal, which is measured in kilocalories, but your Exercise goal was locked at 30 minutes and the Stand goal at 12 hours. In watchOS 7, you can finally change these last two. In the Activity app on your Apple Watch, scroll to the bottom and tap Change Goals. Then, for each screen, adjust the goal numbers in whatever way will most motivate you. Some people like setting the goals higher than they're likely to...
The App Library in iOS 14 ensures that you can find all the apps installed on your iPhone without having to hunt through Home screens. So if you already have a lot of Home screens that contain a random assemblage of apps, it might be easier to hide those screens than to remove all the apps on them. To do this in iOS 14, touch and hold any empty spot on the Home screen to enter jiggle mode. Then tap the lozenge around the dots that represent your Home screens....
You've long had text messages forwarding from your iPhone to your Mac and iPad, but after you get a new device, it might be a while before you realize that it's not receiving texts sent to your iPhone. It turns out that, when you get a new Apple device, you must manually enable it to receive forwarded texts from your iPhone---the setting is off by default. On your iPhone, go to Settings > Messages > Text Message Forwarding, and flip the switches for the new devices.
We're big fans of column view in Finder windows (choose View > as Columns). You never have to worry about missing icons that are outside the window, everything is sorted alphabetically, and selecting a file shows a preview. But the column widths can be too thin, such that they cut off file and folder names, or too wide, forcing you to scroll unnecessarily. You probably know you can drag the handles at the bottom of the column dividers, but that's fussy when you have lots of columns. Instead, double-click a...
It's all too easy to end up with a boatload of Bluetooth devices connected to your Mac. Apple devices will likely have sensible names, like Magic Mouse 2, but what if someone has given you a device with their name in it? Or you've ended up with a device called something really random like f023cp37. Happily, macOS lets you rename most Bluetooth devices, including pointing devices, keyboards, earbuds, and headphones. Open System Preferences > Bluetooth, Control- or right-click a device, and choose Rename. In the dialog that appears, enter the...
If you're flying, driving, or biking to visit an iPhone-using friend or family member, you can reduce anxiety related to arrival time or pickup plans (and perhaps provide amusement) by sharing your location temporarily so they can watch your progress. The easiest way to do this is to go into a Messages conversation with that person on your iPhone, tap their picture at the top, tap the i button that appears, tap Share My Location, and then tap either Share for One Hour or Share Until End of Day, whichever...
We wanted to make sure that those of you who work on a Mac laptop with an external display know that you can close your laptop's screen and keep working. Apple calls this *closed-clamshell* or *closed-display mode.* Of course, it requires that you connect an external keyboard and mouse or trackpad, via either USB or Bluetooth, and the laptop should be connected to power as well. Apple also recommends putting the Mac to sleep before disconnecting the external display. Why would you want to use closed-display mode? Mostly to conserve...
We've been hearing reports of an uptick in the scam phone calls that claim to be from Apple. If you answer, an automated message tells you that your iCloud account has been breached and asks you to call a provided 1-866 number. **Do not do this!** Apple will never call you unprompted. Unfortunately, the criminals behind this particular phishing attack are spoofing Apple's phone numbers effectively, so the call looks legitimate. Be very careful about which unrecognized phone calls you answer, and if you're ever asked for personal information like...
About a year ago, Fujitsu informed owners of older models of the company's ScanSnap scanners that it wouldn't be updating the necessary ScanSnap Manager app to be 64-bit, effectively preventing those people from using their scanners in macOS 10.15 Catalina. Unexpectedly, Fujitsu has now reversed course, releasing ScanSnap Manager V7 with support for the previously orphaned ScanSnap S1500, S1500M, S1300, and S1100 models. Even though they're not listed as being compatible, ScanSnap Manager V7 also reportedly works with the S300M and S510M, so if you have any older ScanSnap scanner,...
On the Mac, scroll bars are essential for both orienting yourself and navigating within a Web page or document window. But they may not appear unless you hover the pointer over the right spot or start scrolling with a gesture on a trackpad or a turn of a mouse scroll wheel. If that bothers you, go to System Preferences \> General and under Show Scroll Bars, select Always. That way, scroll bars will always be visible without you having to guess where they are or perform some incantation to reveal...
People whose iPhones or iPads have relatively little free space have long struggled with the fact that iOS likes to download updates so they'll be ready for installation. "Who wants to wait for a long download?" Apple thought. Unfortunately, lots of people do. The problem is that if you don't want to update right away, that download consumes precious gigabytes of your free space in the meantime. In iOS 13.6 and iPadOS 13.6, Apple has finally provided a setting you can disable to prevent iOS from downloading updates ahead of...
Sure, you know that the Space bar in the iOS virtual keyboard types a space character. But did you realize that if you tap it twice, it inserts a period? (Probably, but if not, now you do.) That's to make it easier to provide proper punctuation, which will have the added benefit of irritating your kids when you text them. Even better, if you touch and hold the Space bar in iOS 12 or later, that invokes the trackpad mode that lets you move the insertion point around in your...
Every so often, we hear from a Mac user with a seemingly impossible problem: a document window in some app is opening somewhere outside of the screen so it's effectively invisible and they can't work with it in any way. Just closing (with File > Close) and reopening the window, or quitting and relaunching the app, or even restarting the Mac won't usually help because the app will reopen the window in the same off-screen position. The solution is to try various commands in the app's Window menu, such as...
If you have lots of apps on your iPhone or iPad, rearranging their icons on your Home screens by dragging from page to page is tedious. Although the new App Library promised for iOS 14 later this year will help you find apps, rearranging them will still be a manual process. To make organizing your Home screens easier, try using the Dock as a temporary shelf. Touch and hold on any icon and then tap Edit Home Screen (or just start dragging) to start all the icons wiggling. Then, navigate...
Whenever you tap a link to open a Web page on your iPhone or iPad, it automatically opens a new tab. Having hundreds of tabs open won't cause any problems but can make working with tabs clumsy. You can close all tabs---touch and hold the tab button and then tap Close All X Tabs---but you might prefer to prevent them from building up in the first place. To do that in iOS 13, navigate to Settings > Safari > Close Tabs and choose from Manually, After One Day, After One...
Whenever you view a document that's longer than will fit onscreen, a scroll bar appears (often only if you're actively scrolling). That's true whether you're using an iPhone, iPad, or Mac. Inside the scroll bar is a control called a *scroller* that you can drag to scroll more quickly than by swiping or using keyboard keys. But did you know its size and position are useful for orienting yourself within the page? First, the scroller position within the scroll bar reflects how far down the page you are. Second, the...
For many Mac administrators in a variety of sectors, an open source tool called Munki, a patch management tool, is more than prolifically used. Our mantra of being a technology agnostic consultancy agency exposes us to a wide range of Mac tools, which we continually evaluate and assess for our clients' needs. Munki is one that we internally have used for years, having found it to be a reliable and effective solution for managing software updates on Mac devices.
Since iOS 12 and macOS 10.14 Mojave, Apple has supported Group FaceTime, which lets you have a video call with up to 32 people. However, as has become painfully obvious in today's era of non-stop videoconferencing, Group FaceTime has a feature that some find obnoxious: automatic speaking prominence that causes the video tile for the speaker to grow and move around. Happily, Apple finally took the feedback and added options to disable that feature in iOS 13.5, iPadOS 13.5, and macOS 10.15.5 Catalina. In iOS and iPadOS, disable the Speaking...
If you have access to multiple printers, you probably know that you can choose one from the Printer pop-up menu at the top of the Print dialog. But macOS has a feature that should make it so you don't have to switch printers manually as often. Open System Preferences \> Printers & Scanners, and look at the bottom of the Print view. The Default Printer pop-up menu lists all your installed printers, plus an option for Last Printer Used. That last one makes sense if you print a number of...
This isn't about periscopes or mouthwash---when it comes to searching, a *scope* is the area in which a search takes place. When you use the Search field in a Finder window to look for files and folders, you have the choice of two scopes: This Mac or the current folder. You can always switch the scope after starting the search by clicking the other choice near the top of the window, but it's easier to set the default search scope in Finder \> Preferences \> Advanced so it's set right...
The Covid-19 (coronavirus) contact tracing API from Apple & Google has yet to be adopted across the board, with many countries instead choosing to develop their own systems. This approach reflects a desire for control and customization, as well as varying levels of technical expertise and infrastructure among nations. As a result, the global landscape of contact tracing remains fragmented, with different regions implementing distinct solutions.
Tired of typing your admin account password whenever you try to install software or change security settings on your Mac? A new feature in macOS 10.15 Catalina removes that requirement for Apple Watch owners. In System Preferences \> Security & Privacy \> General, select the checkbox for "Use your Apple Watch to unlock apps and your Mac." Then, whenever an app asks for your account credentials, you can instead just double-press the side button on your Apple Watch. Of course, if you forgot to wear it or its battery has...
Tuesday 26th of May, Cupertino stated the bug in Family Sharing that caused apps not to open has been fixed. The bug would cause your iPhone, iPad, or iPod to show a message stating: "This app is no longer shared with you", and requesting that you purchase the app yourself from the App Store. This issue was reportedly affecting users who had previously shared apps through their Family Sharing plan.
When you're writing a blog post or email newsletter, you'll eventually hit the question of how to capitalize words in a title. There is no one right way, but just as with poor spelling and grammar, randomly capitalized titles can reduce reader trust in your knowledge, competence, and expertise. The trick is to pick a capitalization form and style guide to follow. There are two capitalization forms: *title case* (where important words are capitalized) and *sentence case* (which is capitalized like a normal sentence). Then there are a handful of...
If you're plugging your iPhone in regularly but getting low-battery warnings when you shouldn't, consider the possibility that something is preventing your iPhone from charging successfully while plugged in. If there's no lightning bolt badge on the battery icon when the iPhone is plugged in, that's a sure sign that no power is reaching the device. Another hint that failures could be happening intermittently would be a lack of charging in the Last Charge Level graph in Settings \> Battery when you know the iPhone was plugged in. Luckily, the...
If like me, you welcomed Apple's decision to abandon the original 30-pin port in 2012 and adopt the Lightning connector, you likely viewed it as a practical improvement. The Lightning connector is indeed a more user-friendly design, offering a more streamlined connection experience.
Sharing your location works well when you're out with friends or family and want everyone to be able to see where everyone else is. It's easy to enable in various spots in iOS 13---in Messages, in Contacts, in the Find My app, and so on. You can share your location for an hour, until the end of the day, or indefinitely, but beware of this final option. If you're with a group for a weeklong trip, for instance, sharing indefinitely makes sense, but it's easy to forget to turn it...
We work with lots of businesses, all Mac-based businesses. The biggest point of confusion for many Mac-based small businesses is understanding all the business offerings that Apple has to offer. This can be overwhelming due to the sheer number of options and features available, making it difficult to determine which solutions are best suited for their specific needs.
When you're in the Finder, choosing File \> New Finder Window does, as you'd expect, open a new Finder window. But what folder appears in that window? By default, new Finder windows open to Recents, which is a built-in smart folder showing recently opened documents. If you'd prefer to see items in a fixed location on your drive, go to Finder \> Preferences \> General and choose any location from the New Finder Windows Show pop-up menu. We're partial to Desktop or Documents, but you can choose whatever folder makes...
The necessity of working from home is becoming a reality for many workforce members who may not have had this access before. While remote working offers many benefits to employees, such as increased flexibility and work-life balance, many more risks appear as cybercriminals prey on the lax security protocols of the remote worker. It is critical that we as employees treat this access as a privilege, making security our top concern in order to protect ourselves and our organizations from potential threats.
The threat of the Novel Coronavirus has recently been a top concern worldwide. With many conspiracy theories, disinformation, and general curiosity, many citizens are looking for more information on the outbreak from a trusted source. As a result, it's essential to rely on credible sources when seeking updates or guidance on this issue.
FUTUREPROOF IT: A 100% online summit focused on raising awareness about critical IT issues affecting small businesses, while also collecting funds for COVID-19 personal protective equipment (PPE). The event aims to provide a platform for discussion and education on key topics relevant to the industry.
The COVID-19 crisis has forced many organizations and businesses to work from home. Are you aware of the cybersecurity risks to your business with your employees working remotely? With more employees accessing company data and systems from personal devices, there is a higher risk of data breaches and cyber attacks. This shift in work environment requires careful consideration of security measures to protect against these threats.
It's really sad that we live in a time when scammers are still so active in the face of such hardship and adversity. However, it is the environment where people are often at their most vulnerable, struggling to make ends meet or dealing with personal crises, making them an easy target for those looking to take advantage of them.
Today we're going to explore branding and customization of a few popular open source Mac management tools, Munki and Munki Report. Before we dive into the specifics and get into the weeds, it's essential to first recap and review the importance of branding and its role in the IT admin space. Why is branding so key when it comes to our ability to support our users? Effective branding helps establish a consistent identity that resonates with your organization's values and mission, ultimately influencing how users perceive and interact with your...
Earlier this year, Apple announced that its new corporate headquarters, initially referred to as Campus 2, was nearing completion and would be ready to house over 12,000 employees. The project has since been officially renamed Apple Park and is now open for business. Construction continues on adjacent buildings and parklands through the summer, with ongoing work expected to wrap up by the end of the season. View aerial drone footage here.