Author Archives: mike

Beware Domain Name Renewal Phishing Attacks

Most phishing attacks are easy to identify, but we’ve just seen one that’s more likely to evade detection. Those who own personal or business Internet domain names—to personalize their email or provide an online presence for their website—may receive fake messages claiming that a domain has been deactivated due to a payment issue. Because scammers can determine when domain names are due to expire and the name of the company hosting the domain, the urgency triggered by a message that appears to be from the domain host and arriving near the renewal date may cause someone to click a link they shouldn’t. This particular one wasn’t even that well crafted and still caused the recipient brief concern until they manually went to DreamHost and verified that nothing was wrong with their domain payment. Stay alert out there!

(Featured image by iStock.com/weerapatkiatdumrong)

Consider Business Cyber Insurance

When discussing digital security, we typically focus on preventive measures, such as using strong passwords with a password manager, enabling multi-factor authentication, keeping systems up to date, maintaining regular backups, and training employees to recognize potential security threats. While these practices are essential, they don’t guarantee complete protection.

No one is immune to online attacks—the most security-conscious organizations and individuals can still become victims. Even security experts occasionally click something they shouldn’t have or forget to keep a little-used system up to date. A single employee opening a convincing phishing email, a momentary lapse in judgment, or a zero-day vulnerability can lead to devastating consequences.

According to the FBI’s Internet Crime Complaint Center (IC3), cybercrime-related losses from 2020 through 2024 are estimated at $50.5 billion, with IC3 receiving 4.2 million complaints. Most concerning is the rising trend in the frequency and severity of these attacks.

Given these statistics and the reality that perfect security is impossible, many are looking to protect themselves from possible financial losses. Just as fires and accidents make home and auto insurance necessary, these ever-increasing threats from phishing, malware, and other forms of digital attack make cyber insurance an important consideration for both companies and individuals. We’ll focus on businesses here and explore personal cyber insurance in a future article.

What Is Business Cyber Insurance

Cyber insurance for businesses helps companies recover from security breaches and online attacks. Unlike traditional business insurance policies, cyber insurance focuses on the risks of using technology to operate or to store sensitive data online. Businesses of all sizes are vulnerable, but small and medium-sized businesses are often targeted because they lack the robust security infrastructure of larger enterprises.

Industries that are especially at risk include healthcare, financial services, retail, and professional services, but no sector is immune. You may have cause for additional concern if your company collects customer information, processes payments, or maintains a significant online presence, but realistically, every business that uses email or conducts online banking is vulnerable.

What’s Covered

A business cyber policy typically includes two core types of coverage:

  • First-party coverage: This coverage responds to direct costs incurred by your company, including legal expenses, data breach response and notification costs, ransomware payments and recovery expenses, business interruption losses, data restoration, system replacement, and crisis management.
  • Third-party coverage: Also known as liability insurance, this coverage protects you against claims from others affected by the breach, including legal defense costs, settlements, regulatory fines and penalties, and PCI-related fines associated with credit card processing.

What’s Not Covered

However, it’s essential to be aware of common exclusions to business cyber insurance, the most important of which are:

  • Weak security processes: Insurance doesn’t exempt you from maintaining a strong security stance—if you aren’t requiring strong passwords, providing security training, and correcting known vulnerabilities, the policy won’t cover you. Insurers will likely require verification of minimum cybersecurity practices before providing coverage.
  • Prior breaches: Just as health insurance may not cover pre-existing conditions, cyber insurance typically does not cover events that occurred before the policy was taken out.
  • Insider attacks or misconduct: Deliberate or fraudulent acts by company leadership or employees generally aren’t covered. Employees are a company’s greatest resource, but they can also be its greatest weakness.

Shopping for Business Cyber Insurance

How much will business cyber insurance cost? It varies based on your company size and revenue, industry sector, type and amount of sensitive data stored, security practices, coverage limits and deductibles, and claims history. That said, small businesses with yearly revenues under $1 million typically have annual premiums ranging from $500 to $2,000. Mid-sized firms often pay between $2,000 and $10,000, and large companies can expect premiums in the tens of thousands.

It’s common—and entirely understandable—to hesitate to purchase cyber insurance due to concerns about the cost. However, the potential financial impact of an incident is often significant. IBM’s 2024 Cost of Data Breach Report found that the average cost of a data breach was $4.9 million globally, but $9.4 million in the United States. Although IBM doesn’t break out costs by company size, those costs are likely for larger companies. Nonetheless, a Financial Times report notes that users at small and medium-sized businesses were twice as likely to encounter threats as those at large companies.

Choosing the right cyber insurance broker is as important as selecting the policy itself, and you’ll want to involve your security team in the search. Look for someone specializing in cyber coverage who has technical expertise in cybersecurity practices, strong relationships with underwriters, and a track record of providing active claims support. A good broker will not only find competitive pricing but also help tailor coverage to your specific risks and ensure you’re prepared to meet underwriting requirements.

When comparing cyber insurance options, pay attention to the details. Confirm that the policy addresses risks specific to your situation and provides sufficient financial protection for your potential exposure. Pay close attention to exclusions—there will be more than those listed above. Research the insurer’s claims process and reputation for responsiveness, as timely support during an incident is crucial. Finally, inquire about additional risk management services offered by the insurer that may provide valuable preventative resources to complement your coverage.

Start Researching Cyber Insurance Now

Unfortunately, the frequency and risk of cyber attacks are on the rise. Proactive security measures are key, but a single mistake or oversight could have dire outcomes. Cyber insurance provides an important safety net in the event of a breach or attack that evades your best efforts.

We won’t pretend that finding and purchasing cyber insurance is simple, but we can help with finding a good cyber insurance broker, evaluating the policy, answering application questions, and ensuring that your company meets the necessary security requirements.

(Featured image by iStock.com/Who_I_am)

At WWDC 2025, Apple Unveils Liquid Glass and Previews New OS Features

Apple’s Worldwide Developer Conference keynote was a lightning-fast 92-minute tour of Apple’s vision for how we’ll use its products in the next year. Apple wove two themes through the presentation: the new Liquid Glass design language will provide a consistent look and feel across all its platforms, and Apple Intelligence-powered features will continue to appear throughout the ecosystem. The other overarching news is that Apple is adopting a new annual versioning approach, similar to car model years, so the version number for each operating system will be 26.

Apple previewed numerous features during the keynote and listed even more on its website afterward. Below, we’ll focus on those we think will make the most difference to your Apple experience, but we also encourage you to read Apple’s pages for each platform to learn more about what’s coming. Those are linked here, along with basic hardware requirements, so you can determine if your devices will be eligible to upgrade this fall:

  • macOS 26 Tahoe: MacBook Air with Apple silicon (2020 and later), MacBook Pro with Apple silicon (2020 and later), MacBook Pro (16‑inch, 2019), MacBook Pro (13‑inch, 2020, four Thunderbolt 3 ports), iMac (2020 and later), Mac mini (2020 and later), Mac Studio (2022 and later), Mac Pro (2019 and later)
  • iOS 26: iPhone SE (2nd generation), iPhone 11, and later
  • iPadOS 26: iPad (8th generation and later), iPad mini (5th generation and later), iPad Air (3rd generation and later), iPad Pro 11‑inch (1st generation and later), iPad Pro 12.9‑inch (3rd generation and later), and iPad Pro (M4)
  • watchOS 26: Apple Watch SE (2nd generation), Apple Watch Series 6 and later, and Apple Watch Ultra and later
  • visionOS 26: All Vision Pro headsets
  • tvOS 26: Apple TV 4K

First, let’s look at Liquid Glass, after which we’ll examine a handful of changes we think Apple users will find most interesting.

Liquid Glass Gives Apple’s Platforms a Fresh Look

Apple’s last major interface redesign occurred in 2013 with the release of iOS 7. Since then, the company’s hardware and graphics technologies have advanced significantly, enabling the new Liquid Glass interface design. It brings to life a new glass-like “material” for interface elements that blurs the line between the physical and the virtual. Liquid Glass is both translucent and malleable, allowing background content to refract through the controls, which can morph, flex, and illuminate in response to user interaction.

Liquid Glass encompasses all of Apple’s platforms and extends to every aspect of the interface, including controls, navigation bars, tabs and sidebars, alerts, widgets, icons, the menu bar, and the Dock. Functionally, Apple has taken the opportunity to improve some interactions, so alerts appear from where you tap rather than taking over the entire display, and context menus expand into scannable lists rather than requiring awkward horizontal scrolling. When you interact with toolbars or other controls, they expand and become more prominent, but as soon as you’re done, they minimize themselves to let you focus on the content. Watch Apple’s intro video to get a feel for it.

The main concern with Liquid Glass is that it may lack contrast and be difficult to read for those whose vision isn’t perfect. In the past, Apple has provided a Reduce Transparency option in the Accessibility settings for macOS, iOS, and iPadOS to eliminate any color bleeding through translucent menus and dialogs; we’ll see if such an option proves necessary for some.

iPadOS 26 Takes Lessons from macOS

Ever since the introduction of the iPad, people have been frustrated by the extent to which it was a larger iPhone rather than a smaller, touch-sensitive Mac. Apple took small steps toward enhancing productivity by adding features like Slide Over and Split View, but they were fussy to use and never achieved widespread acceptance. With iPadOS 26, Apple has finally acknowledged that the iPad should just work more like a Mac. To that end, iPadOS 26 will offer Mac-like features in the following areas:

  • Window management: Every app can now be transformed into a standalone window that you can move and resize freely. Windows remember their size and position, and you can tile them flexibly, with options to split the screen into two, three, or four sections. The familiar traffic light window controls from the Mac reappear along with the macOS Move & Resize and Fill & Arrange options. Swiping up invokes Exposé, allowing you to view all windows and switch to your desired one easily.
  • Menu bar and Dock: iPadOS gains a menu bar that looks and works like the one on the Mac, but it only appears when you swipe down from the top of the screen. You can also put folders in the Dock and access their contents in much the same way docked folders appear as a stack on the Mac.
  • Filesystem access: The Files app resembles a Finder window much more now, thanks to the addition of collapsible folders and resizable columns. It allows you to select which apps will open specific document types and even modify the defaults. Additionally, you can customize folders with colors and icons.
  • Preview makes the move: One of the core Mac apps, Preview, is coming to the iPad. Just as on the Mac, you can use Preview for viewing and editing images and PDFs, and it offers full support for the Apple Pencil.
  • Background processing: Computationally intensive processes and other activities that take a long time, like exporting edited videos and downloading large files, can now run in the background while you engage in other tasks.

Apple Intelligence Expands Across the Ecosystem

Apple Intelligence has been far from a rousing success, with Apple’s failure to deliver last year’s promised update to Siri being the most prominent misstep. But Apple isn’t giving up and will be tapping into Apple Intelligence in many more places across all its operating systems and apps.

Even more important, the company announced that it is opening Apple Intelligence to developers, so we can expect to see features powered by Apple’s on-device large language models appearing in third-party apps this fall. That’s a big deal because Apple’s models provide fast response times, prioritize privacy, and incur no per-prompt costs.

Some of the new and expanded uses of Apple Intelligence include:

  • Visual Intelligence: You can now use Visual Intelligence to learn more about and act on information displayed on your iPhone screen. You could research a piece of clothing you see while browsing, or create a calendar event based on a social media banner. You can also ask ChatGPT about anything you see on screen.
  • Shortcuts gets Apple Intelligence: New intelligence actions in Shortcuts enable you to leverage Apple Intelligence to summarize text, create images, and more. Interestingly, shortcuts can even access Apple Intelligence’s Private Cloud Compute for more power-intensive tasks.
  • Image Playground & ChatGPT: When using Image Playground, you can create images in a wider variety of styles with ChatGPT.
  • Combine emoji for Genmoji: Previously, you could use text descriptions to create custom Genmoji; now, you can make them by combining existing emoji.
  • Messages backgrounds: Chats in Messages will offer shared backgrounds, and users can create custom backgrounds with Image Playground.
  • Messages polls: Group chats in Messages will gain polls—where should we go for dinner tonight?—and Apple Intelligence will automatically detect when a poll might be helpful and suggest one.
  • Wallet order details: With Apple Intelligence, the Wallet app can identify and summarize order details, including tracking information.
  • Workout Buddy: In the watchOS 26 Workout app, Apple Intelligence powers a virtual workout buddy that talks to you while you exercise, offering motivation, real-time stats, and post-workout feedback.

These new applications of Apple Intelligence may not rock your world, but together, they offer some appreciated enhancements. We also look forward to seeing how developers leverage Apple Intelligence models in innovative ways.

Live Translation Edges Toward the Universal Translator

Perhaps the most significant additional feature driven by Apple Intelligence in the new operating systems is Live Translation. It’s integrated into the Phone, FaceTime, and Messages apps. In the Phone app, you get spoken translations between supported languages. In FaceTime, you see the other person’s translated text as a caption, and Messages translates their text. Live Translations may prove to be a lifesaver on your next international trip.

Spotlight Gains Enhanced Capabilities

Whenever you do a search on the Mac, you’re using Spotlight. It can also search within apps like Contacts and Calendar, access various online sources, open documents, launch apps, and more. Despite that, Spotlight has paled in comparison to launchers like Alfred, LaunchBar, and Raycast. No more.

In Apple’s new operating systems, Spotlight will enable users to perform hundreds of actions across various apps. It will also be capable of understanding what you’re working on and suggesting relevant files, apps, or actions. For instance, you’ll be able to start a timer, create calendar events, generate a new email message with pre-filled fields, play a podcast episode, and more.

Spotlight also introduces the concept of “quick keys,” which are short, custom mnemonics for specific actions. For instance, you might type sm to trigger Spotlight to send a message or ar to add a reminder.

In addition, Spotlight becomes a clipboard manager, providing access to recently copied items, including text, images, and links. You can browse, search, and insert previous clipboard entries directly through Spotlight.

Phone App Introduces Call Screening and Hold Assist

Phone calls may not be the primary use of the iPhone for many people, but they remain a fact of life. With iOS 26, Apple has introduced two features that, if they work as promised, will alleviate two common pain points associated with calls.

Call Screening builds on the Live Voicemail feature by automatically answering calls from unknown numbers, without even alerting you. Once the caller provides their name and the reason for their call, the Phone app rings and presents information to help you decide whether to answer.

The other new feature is Hold Assist, which automatically detects hold music and asks if you want it to wait on hold for you, allowing you to attend to other tasks. When someone on the other end picks up, it informs them that you’ll be there shortly and notifies you that it’s time to return to the call.

Although we think of using the Phone app exclusively on the iPhone, Apple is also bringing it to macOS 26 and iPadOS 26, thanks to Continuity. Once you upgrade, you’ll be able to take advantage of these features—and Live Translation—on those platforms as well.

Dismiss Notifications with the Flick of a Wrist

Finally, watchOS 26 introduces a new gesture that we believe will be popular: the wrist flick. Whenever a notification appears on screen, you can quickly rotate your wrist away from you to dismiss it. This feature is a great little addition to the Apple Watch interaction model.

If none of these changes seem earthshaking to you, we agree. With six operating systems and billions of users, Apple can’t move as quickly as smaller companies. While Liquid Glass will dramatically change the look of our Apple devices, the other new features shouldn’t require us to learn completely new methods of interaction.

(Featured image by Apple)

Why Passkeys Are Better than Passwords (And How to Use Them)

No one likes passwords. Users find managing them annoying, and website managers worry about login credentials being stolen in a data breach. The industry has developed a better solution: passkeys.

Passwords versus Passkeys

Traditional multi-factor authentication involves three methods of authentication, at least two of which are required for protection. They include something you know (a password), something you have (usually a code from an authenticator app or text message), and something you are (biometric authentication). Most systems primarily use the first two, but that leaves room for attack because someone could acquire your password and an authentication code through nefarious means.

Passkeys change the model. Instead of how passwords and codes use words and numbers that can be copied and shared, passkeys are pairs of cryptographic keys: a public key and a private key. Websites keep the public key, and the private key is stored securely within an encrypted vault, such as in iCloud Keychain or a 1Password vault. Authenticating with a website requires providing the private key that matches the account’s public key, something that Apple users with modern devices can usually initiate with Touch ID or Face ID.

Instead of generating security with something you have and something you know, passkeys rely on possession (do you have the device?) and presence (are you physically in front of the device?). This approach is fundamentally more secure than passwords because the private key can’t be phished, copied, or used remotely, and you must be physically present to unlock your device. Nor can you be tricked into providing a passkey to a malicious website. (Neither approach protects against physical coercion.)

Where Can You Use Passkeys?

In practice, since you use passkeys primarily to sign into websites, passkeys are stored alongside account details in your password manager. For Apple users, Safari (in iOS 16 or macOS 13 Ventura and later) with Apple’s Passwords app provides the most integrated passkey experience. However, most independent password managers, such as 1Password, Bitwarden, and Dashlane, also enable you to store, share, and enter passkeys and can take over for or work alongside Apple’s Passwords. They provide consistent passkey functionality across all major Web browsers, although experiences may vary slightly due to differences in how they handle authentication prompts and platform integration.

You’ll also find robust support in the Password Manager built into Google Chrome and other Chromium-based browsers, including Arc, Brave, Edge, Opera, and Vivaldi. Firefox’s native passkey support is more limited, but third-party password managers work well with Firefox. 

Although website support for passkeys was initially slow, an increasing number of sites now support them. That includes the big three of Apple, Google, and Microsoft, of course, as well as Amazon, Best Buy, Discord, eBay, GitHub, Intuit, Netflix, Notion, PayPal, Robinhood, Stripe, Target, Walmart, and WhatsApp.

Setting Up Passkeys

The process of setting up passkeys varies a little by website, but is generally remarkably easy. You may be prompted to create a passkey while signing in, or you may need to navigate to the security options associated with your account.

Google offers both approaches. Setting up a passkey for a Google Account can be as simple as agreeing to do so while logging in. If you’re already logged in, Google’s Passkeys and security keys page lets you make one. Once you click Create a Passkey, you’ll be prompted to save it in either Apple’s Passwords or another password manager like 1Password. That’s it.

Note that if you use both Passwords and another password manager, you can save the passkey in only one, and only that one can use it to sign in later. However, most sites that support passkeys let you add multiple passkeys, so you could save separate passkeys in different password managers.

Signing in with Passkeys

Similarly, using a passkey to sign in is trivially simple. You navigate to the website’s login page, enter your username, choose the passkey sign-in option if necessary, and then authenticate.

Exactly how you authenticate depends on the device you’re using and your password manager. On the Mac, Passwords will ask you to use Touch ID if available (above) or a dialog otherwise (below, left). 1Password, once unlocked for the session, presents a dialog with a Sign In button (below right).

On the iPhone and iPad, an authentication dialog appears at the bottom of the screen asking if you want to sign in with your passkey. Tap Continue and authenticate with Face ID or Touch ID (with a fallback to your passcode if necessary).

Unsurprisingly, Apple makes it particularly easy to sign in to Apple websites like iCloud.com using a passkey. As soon as you navigate to such a site in Safari, the device prompts you to sign in using your current Apple Account username and an implicit passkey.

When using other browsers or another Mac that lacks access to your passkey, selecting the passkey sign-in option displays a QR code that you need to scan with an iPhone or iPad that has the passkey stored on it.

Managing and Sharing Passkeys

As noted, passkeys are stored in accounts managed by a password manager. In fact, passkeys are currently stored alongside passwords in each account. There’s nothing to see or edit, although you can delete passkeys like any other data. Although deleting the passkey on your device guarantees that it can’t be used to sign in again, it’s best to also delete the passkey at the website where you created it to avoid confusion.

Passkeys are automatically synced among all your devices by the password manager so you can take advantage of them everywhere, but note that syncing is specific to just one password manager—for instance, iCloud Keychain doesn’t sync with 1Password or other third-party managers. The authentication method varies by device, but the overall experience remains the same. 

You can also share passkeys with other people in your family or workgroup, just as you would with password-only accounts. They can log in to your passkey-protected accounts because they can prove possession (they have the passkey) and presence (they’re authenticating). In essence, you’re saying, “This person is authorized to act as the account holder.”

Passkey Concerns

Although passkeys are a big step forward in usability and security compared to passwords, they’re not without limitations or concerns, which have slowed adoption:

  • Account recoverability: Because passkeys are tied to devices, if a user loses all their devices and doesn’t have a cloud backup option (such as registering a new iPhone to an existing Apple Account or adding a new device to a 1Password account), it’s impossible to recover an account. This is primarily a concern for those who have only a single device and no one with whom to share.
  • Sharing hurdles: If you want to give someone else passkey access to an account—perhaps a shared bank account—you must log in on their device and then create an additional passkey that is stored on their device. 
  • Lack of portability: Although passkeys can be synced between devices using the same platform (iCloud Keychain, 1Password account, etc.), there’s no way to export a passkey from one platform and import it into another. You have to recreate passkeys from scratch for each platform. Vendors are working on the problem, but as you can imagine, enabling export/import opens up security concerns. 
  • User confusion: People are, understandably, still unfamiliar with passkeys, leading many to avoid them on principle. It hasn’t helped that using passkeys is slightly different on every website. The industry is working to standardize the user experience, but we’re not there yet.
  • Passwords still exist: No major websites allow passkey-only accounts. Since all accounts still have passwords that can be stolen, passkeys aren’t increasing security nearly as much as they could.
  • Enterprise support: Large organizations want to know if a passkey was generated on a secure device, if it can be revoked or rotated, and if the user employing the passkey has truly been verified. Support for these requirements is still evolving.
  • Digital inheritance: When passkey-only accounts become commonplace in the future, passkeys may be more challenging to manage in situations involving the user’s death. For now, the solution is to share passkey-protected accounts with family members in advance using a password manager. The industry would do well to establish standards around this inevitability.

Nonetheless, the perfect shouldn’t be the enemy of the good. Passkeys improve on passwords in both usability and security, and the best way to get to an easier, more secure future is to start using passkeys wherever possible today.

(Featured image by iStock.com/tanit boonruen)

Make Sure to Check Settings on Multiple Devices

We recently helped someone having trouble with 1Password requesting their password repeatedly on their iPad, but not on their iPhone. Since 1Password’s data syncs between devices, this person didn’t realize they needed to configure the app’s security settings separately for each device. It’s appropriate for 1Password to separate security settings—one device could be used in a much more sensitive environment than another—but it’s also easy to see how a user might be confused about the difference in behavior. All this is to say that if you are annoyed by an app or operating system behaving differently depending on the device you’re using, compare the settings and ensure they’re set appropriately for each device.

(Featured image based on an original by iStock.com/towfiqu ahamed)

Why Every Business Needs an AI Policy

Are employees at your company surreptitiously using artificial intelligence tools like ChatGPT, Claude, Copilot, and Gemini for everyday business tasks? It’s likely. An October 2024 Software AG study found that half of all employees use “shadow AI” tools to enhance their productivity, and most would continue using them even if explicitly banned by their employer.

Increased productivity is a good thing, but unsanctioned and unregulated AI use poses risks. A February 2025 TELUS Digital survey found that 57% of enterprise employees admit to entering high-risk information into publicly available chatbots. This includes personal data about employees or customers, product or project details, and confidential financial information like revenues, profit margins, budgets, and forecasts.

A clear AI policy will help a business minimize the risks of using AI tools. These risks include leaks of confidential information, compliance failures, accidental copyright violations, and reputational damage. As AI becomes a routine part of knowledge work, every business—even small firms—must establish an AI policy to maximize the benefits of using AI while safeguarding the company, its employees, and its clients.

Risks Addressed by a Formal AI Policy

Unauthorized AI use can create several types of problems:

  • Data security: Employees routinely paste sensitive data—including customer information, financial records, and unreleased products—into public AI tools, thereby losing control over how that data is used. That can make security audits nearly impossible and drive IT staff crazy. Notably, the free versions of ChatGPT (by default, it can be turned off) and Google’s Gemini can incorporate user data into their training models, making it possible that the information could be included in a discussion with someone else.
  • Legal and compliance risks: Sharing protected information with non-compliant AI systems could result in penalties during regulatory audits, even if no actual data breach or harm occurs. For instance, using such systems to summarize patient records could violate HIPAA, while using them to analyze customer data could run afoul of the California Consumer Privacy Act (CCPA).
  • Unintentional discrimination: Without clear guidelines, the use of AI can lead to unintentional discrimination in hiring, customer service, and decision-making. This may violate ethical standards and expose the company to legal liability.
  • Employee confusion: The lack of a coherent AI policy leads to inconsistent practices and uncertainty about acceptable tools and proper procedures, resulting in reduced productivity and increased anxiety about AI use.

Essential Elements of an AI Policy

The specifics of an AI policy vary by the type and size of company, but at minimum, most AI policies should include the following:

  • Permitted AI uses and tools: Clear guidelines on the types of tasks employees may undertake with AI assistance and a list of approved AI platforms for business activities
  • Data privacy and legal compliance: Rules for safeguarding confidential, personal, and proprietary information when using AI, coupled with rules that ensure adherence to relevant industry-specific regulations and privacy laws
  • Human oversight and transparency: Requirements that employees thoroughly review AI-generated content before use and disclose AI involvement when appropriate in client-facing or public materials
  • Risk reporting and incident response: Clear instructions for reporting AI-related errors, security incidents, or potential misuses
  • Ownership and intellectual property clarifications: Statements affirming that work products created with AI assistance belong to the company. These statements should also address any intellectual property considerations.

Building Your AI Policy

If your company doesn’t already have an established process for generating policies, AI tools can themselves provide a starting point when used thoughtfully. Here’s an approach:

  1. Prompt an AI tool like ChatGPT or Claude to generate a basic AI policy template. Be explicit about your company’s size, industry, and other relevant details, and be sure to specify that it must cover the elements listed above—you can paste them in. Iterate as necessary until the template has all the required sections.
  2. Review the generated template carefully, removing generic content and noting areas that need company-specific details.
  3. Ask for feedback on the draft from key stakeholders, including:
    • Leadership to align with company goals and values
    • IT team to verify technical feasibility and security measures
    • Legal counsel to ensure compliance with relevant regulations
    • Department heads to confirm that it will be practical to implement the policy
  4. Incorporate the feedback to create a policy that reflects your company’s specific needs while maintaining necessary protections.

Remember: An AI-generated template is for starting the conversation. The final policy must be tailored to your organization’s specific needs and thoroughly vetted by relevant stakeholders.

The rise of AI tools in the workplace isn’t just a trend—it’s a fundamental shift in how work gets done. Whether your employees are already using AI tools without oversight or are hesitant to use them due to uncertainty, now is the time to establish a formal AI policy. Start with the template approach outlined above, engage your stakeholders, and develop guidelines that work for your organization. A well-crafted AI policy will help your business harness the benefits of AI while minimizing its risks.

(Featured image by iStock.com/girafchik123)

With iOS 18.2 and Later, You Can Share the Location of Lost Items in Find My

In iOS 18.2, Apple enhanced the Find My app, enabling you to create a temporary Web page that shares the location of a lost AirTag or other Find My-tracked item. You don’t need to know the person’s email address or share any other information, and the link automatically expires after a week. It’s a great way to enlist others in the search for a lost item, but the big win is sharing with an airline to help them track the location of misdirected luggage. It’s easy: open the Find My app, tap Items, select the desired AirTag or other item, tap Share Item Location, and then share the provided link via text message, email, or any other method. The item’s location automatically stops being shared if it’s reunited with you, or you can end sharing manually.

(Featured image by iStock.com/yacobchuk)

Security Precautions to Take While Traveling

When we think about digital and device security, we mostly think about the fixed locations where people spend most of their time—home, school, and work. But what about when you’re traveling? Some security concerns remain the same when you’re on the road, but new ones crop up.

We’ll assume that you already keep your devices up to date, use FileVault on Macs, have at least a six-digit iOS passcode, have strong password habits, and use multi-factor authentication wherever possible. Other options are more specific to travel.

As with our more general article about increasing security last month, we’ve divided our list of suggestions into two parts: things that everyone should do and measures that only people who worry about being specifically targeted should employ.

Sensible Travel Security Precautions for Everyone

These suggestions are appropriate for everyone who travels, and they’re aimed primarily at avoiding relatively common problems: loss, theft, data loss, and generalized snooping:

  • Focus on physical security: As a tourist, you may be targeted by thieves, so it’s important to keep your iPhone in a secure pocket whenever you’re not using it. Carry an iPad or laptop in a bag that can’t be snatched, or leave them locked or at least concealed in your hotel room.
  • Enable Find My for all your devices: You should have already done this, but if not, enable Find My to improve your chances of finding a device you lose or accidentally leave behind. It might help if the device is stolen, but local police cooperation for recovering stolen items can vary widely. Don’t attempt to recover a stolen device yourself.
  • Put AirTags in your luggage and laptop bags: AirTags can help you track down lost luggage—you can now share their locations with airlines—and prevent you from accidentally leaving bags behind. An AirTag may also help with locating a stolen item, but always work with local law enforcement.
  • Enable biometric authentication and Stolen Device Protection: Using Face ID or Touch ID wherever possible and having Stolen Device Protection enabled on your iPhone in Settings > Face/Touch ID & Passcode is even more important when traveling.
  • Use a VPN or iCloud Private Relay: Because you may be using Wi-Fi networks whose security you know nothing about, it’s best to use a VPN like Mullvad VPN, NordVPN, or ProtonVPN to encrypt all your traffic. At a minimum, use iCloud Private Relay, which requires an iCloud+ subscription and won’t encrypt traffic from most non-Apple apps.
  • Use iCloud Photos or another backup option: To ensure you don’t lose precious vacation photos, use iCloud Photos so all your photos are uploaded to the cloud whenever you have access. This will almost certainly require an iCloud+ subscription for sufficient storage space. If Wi-Fi and cellular are too slow or unavailable, consider an external SSD to which you can manually export photos and videos for backup. To speed up the process, you could create a shortcut that automatically copies all photos taken that day.
  • Use iCloud Backup: It’s best to use iCloud Backup to back up your entire iPhone every night. That way, if your iPhone is lost or destroyed, you may be able to buy a replacement and restore from backup in relatively little time. You will probably need an iCloud+ subscription to have enough backup space.
  • Practice dealing with a lost or stolen device: If the worst happens and you lose one of your devices while traveling, you need to know what to do. Immediately go to Find My on another device or iCloud.com and mark the device as lost. If there’s a chance of getting it back, stop there. However, if you believe the device was stolen, your data is at risk, and tracking it is no longer useful, use Erase This Device in Find My to wipe it. Activation Lock will remain enabled to prevent anyone from reusing the device.

Increasing Travel Security for People Who May Be Targeted

Not all travel is fondue and gamelans. If you’re a journalist, activist, government employee, or corporate executive with access to sensitive data, you could be a target while traveling. This is particularly true if you are headed to countries like China, Russia, or others with authoritarian governments and powerful intelligence agencies. Along with the suggestions above, we recommend:

  • Be aware of local laws and government practices: It’s important to read up on regional laws regarding data access and potential government capabilities at your destination. Knowing what to expect can help you reduce your risks and take appropriate precautions.
  • Use caution with cellular access: Even if your carrier allows roaming, consider using a dedicated eSIM for international travel, separate from your personal one. That way, you can use local cellular networks without revealing your home number. Be aware that your traffic may be monitored.
  • Enable Lockdown Mode: If you’re concerned about your iPhone or iPad being targeted by local law enforcement or government intelligence agencies, turn on Lockdown Mode in Settings > Privacy & Security > Lockdown Mode. To increase security, it blocks most attachment types in Messages, complex Web technologies, incoming FaceTime calls from unknown callers, non-secure Wi-Fi network connections, and incoming invitations to Apple services. Plus, it excludes location information from shared photos, requires approval to connect accessories, and more.
  • Reduce and protect your use of cloud services: While using a VPN is essential, you should still avoid using cloud services much if government entities might have access to stored files. If you need to upload files, encrypt them first using the free and open-source Cryptomator.
  • Know how to disable Face ID and Touch ID: If you find yourself in a situation where you believe you may be compelled to unlock your iPhone or iPad with your face or fingerprint, press and hold the side or top button and either volume button to display the power off slider. This temporarily disables biometric authentication, requiring your passcode for the next unlock.
  • Use dedicated travel devices and accounts: If you’re traveling to a potentially hostile part of the world, we strongly recommend carrying only devices—preferably iPhones or iPads, which are more secure than Macs—configured to contain none of your personal data or regular accounts. Keep them with you at all times, assume they could be confiscated, and be aware you might be compelled to share passcodes or other account information. Create a separate Apple Account for such devices.

Best of luck in your travels! With just a little preparation, you can reduce the chances that something bad will happen during a vacation. If you’re traveling on business to somewhere more concerning, putting in additional effort could prevent truly problematic things from happening.

(Featured image by iStock.com/metamorworks)

Apple Says More Personalized Siri Will Be Delayed

As we’ve been covering Apple’s staged rollout of Apple Intelligence, one announced feature that has remained tantalizingly in the future is the enhanced version of Siri that would have onscreen awareness, understand your personal context, and be able to interact with apps. The company has quietly admitted that this new version of Siri isn’t ready yet and now says it anticipates rolling it out in the coming year. That probably means in conjunction with some version of iOS 19 and macOS 16, expected to debut in September 2025 and receive updates through early 2026. In short, don’t expect this new Siri anytime soon. We’d prefer to see Apple get Siri to succeed at all the tasks it’s supposed to handle now—too many of the things we try to do with Siri fail.

(Featured image based on an original by iStock.com/Bogdan Malizkiy)

A Few of Our Favorite Things: Tech Edition

We’re asked to recommend tech gear year-round. Here are some recommendations if you’re looking for a geeky gift for that special someone or need to supplement your tech toolkit with new or updated equipment. We don’t have personal experience with all these items, and there are undoubtedly many worthy alternatives—next time we chat, let us know about peripherals you’ve particularly liked. Where possible, we provide links to the manufacturer’s product page and to Amazon, where prices are sometimes lower.

External SSD

All Macs now use solid-state storage internally, and the pricing of external solid-state drives now makes them attractive for both additional storage and silent backups. SSDs also provide the ultimate performance for demanding workflows. The Samsung and Crucial SSDs are good general-purpose drives; look at the OWC Envoy Pro FX for high-performance tasks.

External Hard Disk Drive

For extensive backups and massive archives, you need a large external hard drive. They come in sizes up to 20 TB, and you can pay less than $20 per terabyte, although $20–$30 per terabyte is more common. It’s impossible to recommend specific models without knowing how much storage you need, but check out products from these manufacturers. Because hard drive prices fluctuate wildly, visit diskprices.com to identify current deals on new drives.

  • Seagate: Seagate offers a collection of desktop and portable drives under its own name and the LaCie brand. Apart from some of the larger LaCie drives, most are aimed at consumers.
  • Western Digital: Although some suggest that Western Digital drives are less reliable than Seagate’s, many people like the company’s wide variety of external hard drives.
  • OWC: Other World Computing sells desktop and portable drives with an emphasis on RAID storage and professional uses. OWC also offers enclosures into which you can install bare drives purchased elsewhere, which can save money if you want to upgrade the drive over time.

External Displays

You can find a wide array of displays that work with a Mac, with Apple’s Studio Display leading the pack in both features and price. It’s a 5K display that provides unparalleled sharpness at its standard pixel-doubled resolution of 2560×1440. There’s little direct competition—LG offers the main 5K display that’s cheaper. If that still exceeds your budget, check out the 27-inch 4K displays from Alogic and Asus, which connect via USB-C. Dell and BenQ also make high-quality screens that connect using Thunderbolt. Note that these third-party displays don’t include webcams and generally feature subpar speakers compared to the Apple Studio Display, so building a comparable display would require a separate webcam (or an iPhone using Continuity Camera) and speakers.

Laptop Chargers

Although all MacBooks come with a power adapter, you might want additional chargers that stay plugged in wherever you work or take up less space in your laptop bag. Plus, Apple’s chargers, though high quality, are expensive and large. Consider these alternatives, keeping in mind that fast charging requires higher wattages than standard charging (70W for the M3 MacBook Air, 96W for the 14-inch MacBook Pro, and 140W for the 16-inch MacBook Pro). Extra ports are often welcome, and the OneAdaptr chargers work in 200 countries.

USB Hubs

There are lots of reasons to want a USB hub, and your needs will push you toward one product or another. We chose three options: the Anker 555 provides many different types of ports, the Anker 10-port hub provides numerous USB Type-A ports, and the Satechi 4-port hub offers USB-C ports.

Thunderbolt Docks

USB hubs are sufficient for many situations, but for more demanding setups, you’ll want a Thunderbolt dock that enables you to connect multiple external displays, hard drives, and Gigabit Ethernet, all while using high-wattage charging. The Sonnet and CalDigit docks boast the most ports in horizontal and vertical form factors, respectively, and the OWC dock trades some ports for portability.

Non-Apple Pointing Devices

Some people dislike trackpads, and others aren’t fond of Apple’s Magic Mouse. Luckily, there are plenty of alternatives. Although most Bluetooth mice will work with the Mac, additional software may be necessary to control tracking speed, extra buttons, or scroll wheels. Unusual pointing devices like the Kensington trackball and Contour RollerMouse may be appreciated by those suffering from hand or wrist pain from mousing.

Non-Apple Mac Keyboards

All Macs other than the Mac mini come with a keyboard, of course, but if you’re not a fan of the feel and minimal key travel of Apple’s keyboards, you might consider an alternative. You’ll need to decide if you want a full-size keyboard with a numeric keypad or a compact keyboard that takes up less space on your desk—there are also various sizes in between. Also, keyboards use different switches under their keycaps, so it may require experimentation to find what you like best. It’s worth buying a keyboard aimed at the Mac market to ensure it has or can be configured with the correct keys. The recommendations below should get you started; also check out other products from these manufacturers.

iPad Keyboards

Apple makes some of the best keyboards for the iPad, but they don’t work with all older models. The company makes the Magic Keyboard for the M4 iPad Pro models, the Magic Keyboard that works with the iPad Air and earlier iPad Pro models, and the Magic Keyboard Folio for the 10th-generation iPad. If you want to spend less, leave out the trackpad, or have a different case design, look into the alternatives.

Small Device External Batteries

Although Apple continuously works to improve battery life for the iPhone, iPad, Apple Watch, and AirPods, there will always be situations—travel, camping, non-stop use—where an external battery is a lifesaver. That’s especially true for older devices whose batteries don’t last as long as they used to.

MagSafe Chargers for the iPhone

Wired charging will always be faster and more efficient than wireless charging, but the convenience of MagSafe charging for the iPhone is compelling. As a bonus, MagSafe chargers can also power wireless charging cases for the AirPods Pro, and some, like the KUXIU X55, feature a puck for recharging the Apple Watch.

Let us leave you with a final piece of advice. For many of these product categories, you’ll find a dizzying array of alternatives at bargain basement prices from no-name Chinese manufacturers. While it’s impossible to make blanket assertions, we recommend sticking with reputable companies that have been serving Apple users for years. Even if their products are somewhat more expensive, they’re less likely to cut corners on manufacturing quality and safety and more likely to provide support in the event of problems.

(Featured image by iStock.com/Gatot Adriansyah)