Author Archives: mike

Make Sure Your Home Network Router Is Secure

Securing your home network might seem uninteresting or unimportant—after all, who would bother to target you? The answer is that criminal hackers are interested in your router for a range of disturbing purposes, including attacks on your employer if you connect to a corporate network. It’s time to get serious about home network security, a fact underscored by recent news of hacking by the Russian military.

In April 2026, the U.S. Department of Justice announced Operation Masquerade, which disrupted a campaign by a hacking unit of Russia’s GRU that compromised thousands of home and small-office routers. The attackers exploited known vulnerabilities in TP-Link routers to hijack DNS settings and redirect victims to fake Web pages that harvested passwords, authentication tokens, emails, and other sensitive information.

The attack was opportunistic: the GRU cast a wide net, compromising routers indiscriminately, then filtered for targets of intelligence value. Your data may not be interesting to Russian intelligence, but the same vulnerabilities can be exploited by criminal hackers seeking financial data, credentials for identity theft, or devices to conscript into botnets.

Unlike corporate networks with dedicated IT staff, home routers tend to be installed once and forgotten—sometimes for a decade or more. That old router your AV installer set up with a default password has become a security liability for you, for your employer, and for the world. Here are actions you can take to fix that, in rough order of importance.

Replace Unsupported Routers

Routers can last many years, but manufacturers eventually stop releasing firmware updates. Once that happens, known vulnerabilities go unpatched, and the router becomes ripe for attack. Check your manufacturer’s end-of-life lists (easily found with a search) to see if your model is still supported. If it’s not receiving security updates, replace it regardless of how well it still works.

When shopping for a replacement, look for routers with automatic firmware updates from a well-known manufacturer with a track record of long-term security support, such as Asus, Eero, Google Nest, Netgear, or Ubiquiti. Avoid bargain-basement devices from unknown manufacturers—any initial savings aren’t worth the security risk.

Keep Firmware Updated

Router firmware updates patch security vulnerabilities, and the GRU attack exploited a known vulnerability that had an available fix. Enable automatic firmware updates if your router supports them—many modern routers do. If yours doesn’t support automatic updates, set a monthly reminder to check manually. Because new vulnerabilities are discovered regularly, keeping a router secure is an ongoing process, not a one-time task.

Change Default Passwords

Every router ships with default administrator credentials—often printed on a sticker on the device itself. These defaults are widely known and easily found online. Change the admin password immediately after setup to something strong and unique, and store it in your password manager.

Similarly, change the default Wi-Fi network name (SSID) and password. Use WPA3 for wireless traffic encryption if available; most modern routers support compatibility mode that lets older devices connect while newer ones benefit from stronger security. Never use WEP or leave your network open.

Turn Off Remote Management

Many routers offer a remote login option that allows access to the administrative interface from elsewhere on the Internet (rather than within the router’s own network). Unless you specifically need this capability, deactivate it to reduce your exposure to external attacks. This setting is different from the app-based management provided by some modern routers, which uses a secure account and an outbound connection initiated by the router to enable remote access. App-based management is safe as long as your account password is strong, unique, and protected with two-factor authentication.

Check DNS Settings

As seen in the recent attacks targeting some TP-Link routers, attackers who gain access often change DNS servers to redirect you to malicious websites without your knowledge. Verify that your router’s DNS settings are either obtained automatically from your ISP or point to a reputable service such as Cloudflare (1.1.1.1), Google (8.8.8.8), or Quad9 (9.9.9.9). Unfamiliar IP addresses in these settings are a red flag that your router may have been compromised.

Optional Security Improvements

If you make sure you are using a router that’s still receiving security updates, are installing those updates, and have changed the default admin and Wi-Fi passwords, you’ve achieved an entirely acceptable level of security. With a little more time and effort, you can increase security further:

  • Segment your network: If you have Internet of Things (IoT) devices—such as cameras, smart TVs, or smart home gear—consider creating a separate network for them. If one is compromised, network separation prevents it from accessing your computers or phones. However, some devices need to be set up or controlled by an app on the same network, so you may need to keep such devices on your main network.
  • Consider your ISP gateway: Many ISPs provide gateways that combine the modem and router hardware. If you use an ISP-provided router, make sure you can control the necessary security settings. If you instead prefer to use your own router, make sure to turn off its routing (switch to “bridge mode”) and Wi-Fi features to avoid creating another entry point to your network.
  • Monitor your network: Periodically review which devices are connected to your network if your router’s admin interface or companion app makes that possible. Unfamiliar devices could indicate unauthorized access (though it’s more likely you didn’t realize some device connects to Wi-Fi because they seldom identify themselves well).
  • Back up your network settings: To simplify reconfiguring your router or setting up a new one, create a backup of key settings. It could be as simple as a set of screenshots.

Home network security isn’t complicated, but it does require some thought at setup and occasional attention. If you’d like help with your network or a pointer to the routers we currently recommend, get in touch.

(Featured image by iStock.com/Igor Nikushin)

macOS 26.4 Warns Against Terminal-Based Malware Attacks

We’ve warned before about scams that trick users into pasting malicious commands into Terminal. Attackers create fake CAPTCHA pages—often resembling Cloudflare’s “are you a human” tests—that instruct visitors to open Terminal, paste a command, and press Return. Because the user executes the command themselves, macOS’s security protections are bypassed. Malwarebytes recently documented a macOS infostealer called Infiniti Stealer that spreads this way, stealing Keychain passwords, browser credentials, and cryptocurrency wallets. These attacks have become common enough that Apple has added a warning in macOS 26.4 Tahoe that appears when a user pastes a potentially dangerous command from Safari into Terminal. The protection is still in its early days—in our testing, the warning dialog appeared only once, with subsequent attempts producing only a beep. Worse, if you allow the first paste, Terminal keeps allowing pastes without further warnings. It’s a step in the right direction, but don’t count on it yet. The core advice remains: never paste commands into Terminal from websites unless you trust the site and fully understand what it does. No legitimate CAPTCHA ever requires Terminal commands!

(Featured image by iStock.com/thomaguery)

Intel-Based Apps Will Stop Working in macOS 28

Yes, we know we’re still on macOS 26. In 2025, Apple announced macOS 27 would be the last version to support Rosetta for most Intel-based apps. (Beyond that, Apple will maintain a subset of Rosetta functionality for older, unmaintained gaming titles.) This fact has become relevant because in the just-released macOS 26.4, when you launch apps that rely on Rosetta for Intel compatibility, macOS may start warning you that they won’t open in a future version of macOS. These warnings are just reminders—nothing will change until you upgrade to macOS 28, probably in late 2027 or 2028, giving you plenty of time to find replacements. To identify Intel-based apps now, open System Information from the Utilities folder in your Applications folder, select Applications in the sidebar, and click the Kind column header to sort all your Intel apps together. iMazing’s free Silicon app does the same thing with a nicer interface.

(Featured image based on an original by iStock.com/Kurgenc)

Create AI-Powered Playlists with iOS 26.4’s Playlist Playground

Apple Music subscribers running iOS 26.4 can use the new Playlist Playground feature to create AI-generated playlists tailored to any mood, genre, activity, or era. To try it on your iPhone, open the Music app, tap the Library tab, tap the + button, then tap Create New Playlist. Instead of manually adding songs, tap the search field and enter a natural language description like “songs from a high school dance in the early 1980s” or “positive workout music from after 2010.” Playlist Playground will generate a playlist of songs based on your prompt. You can refine it by giving additional prompts, rearranging songs by dragging the hamburger buttons, or tapping Add Songs at the bottom. When you’re satisfied, tap the checkmark button at the top right to keep the playlist. Playlist Playground requires Sync Library to be enabled in Settings > Apps > Music, and the feature is currently available only in the U.S. and in English.

(Featured image by iStock.com/demaerre)

Understanding New MacBook Battery Charging Features

The just-released macOS 26.4 Tahoe introduced two battery-related features for MacBook users, helping them understand and control MacBook charging. A Slow Charger indicator now appears in the battery status menu and in Battery settings when your Mac is connected to a charger that isn’t delivering the minimum recommended wattage. More significantly, a new Charge Limit feature lets you manually set a ceiling for what the Mac considers a full charge—between 80% and 100%.

These additions are the latest in Apple’s ongoing effort to extend battery lifespan. Understanding how these features work—and when to override them—can reduce frustration and help keep your MacBook battery healthy.

Why Apple Limits Charging

A battery’s lifespan depends on its “chemical age,” which is affected by charging patterns and temperature history. Lithium-ion batteries degrade faster when they spend extended time at full charge or when they generate excess heat during charging. As batteries chemically age, they hold less charge and deliver reduced performance.

Apple’s solution is to reduce the time batteries spend fully charged. This is particularly important for MacBooks that spend most of their time plugged into power at a desk—a scenario that would otherwise keep the battery at 100% and generate heat, both of which shorten battery life.

Optimized Battery Charging

Apple has rolled out optimized battery charging features on the Mac. The Optimized Battery Charging algorithm uses on-device machine learning to learn your daily charging routine, aiming to ensure your Mac is fully charged by the time you actually need to disconnect it from power and leave for the day.

If your MacBook spends most of its time plugged in at your desk, macOS may keep the battery at 80% and charge to full only when it predicts you’ll need to use it away from a power source. When Optimized Battery Charging is holding your battery at 80%, you’ll see Charging On Hold in the battery status menu. (The iPhone, iPad, and Apple Watch have similar features that learn when you typically unplug and delay charging past 80% until shortly before that time.)

The New Charge Limit Feature

Charge Limit in macOS 26.4 takes a different approach. Rather than relying on machine learning to predict when you’ll need a full charge, it lets you explicitly set a maximum charge level. Your Mac will charge to within a few percentage points of your chosen limit, then stop. If the battery drops more than 5% while connected to power, charging resumes until it reaches the limit again.

To set a charge limit, go to System Settings > Battery, click the ⓘ next to Charging, and choose a limit between 80% and 100%. When the limit is active, the battery status menu shows Charged to X% Limit.

Using Charge Limit is ideal if your MacBook rarely leaves your desk. Setting an 80% limit reduces battery wear while ensuring you always have enough charge for brief periods away from power.

When You Need a Full Charge

What about when you want your MacBook’s battery to be at full strength for an unpredictable day away from power, such as for a long flight? You can override both Optimized Battery Charging and Charge Limit when you need maximum battery life:

  • For immediate needs: Click the battery icon in the menu bar and choose Charge to Full Now. Your Mac will charge to 100% regardless of current settings.
  • To disable limits temporarily: In System Settings > Battery, click the ⓘ next to Charging, turn off Optimized Battery Charging, and click the Turn Off Until Tomorrow button when prompted. Also set Charge Limit to 100%.
  • To disable limits permanently: Follow the same steps as the bullet above, but click the Turn Off button in the warning dialog instead. Also set Charge Limit to 100%. Remember, this will likely reduce your battery’s overall lifespan.

(Similar charging limits and workarounds also apply to the iPhone and Apple Watch. On the iPhone, go to Settings > Battery > Charging and turn off Optimized Battery Charging. For the Apple Watch, look in Settings > Battery > Battery Health on the watch itself.)

About That Slow Charger Warning

The new Slow Charger indicator helps explain why your MacBook might be charging slowly or even draining while in use. If the power adapter doesn’t deliver enough wattage for your Mac model, you’ll now see a warning in the battery menu and in System Settings > Battery.

You can check your current power adapter’s wattage by reading the fine print on the charger itself, or by opening the System Information app and checking the AC Charger section in the Power screen. It’s safe to use an adapter with a higher wattage than required, but don’t go below the wattage of Apple’s included adapters.

For optimal charging, use an adapter that delivers at least the minimum wattage recommended for your Mac:

  • MacBook Neo: 20 watts (no fast charging available)
  • 13-inch MacBook Air: 30 or 35 watts standard, 67 watts for fast charging
  • 15-inch MacBook Air: 35 watts standard, 70 watts for fast charging
  • 14-inch MacBook Pro: 70 watts standard (or 96 watts for M4 Pro and M4 Max chips); 96 watts for fast charging
  • 16-inch MacBook Pro: 140 watts for both standard and fast charging

Using your iPhone’s 20W charger with a MacBook Pro might technically work, but you’ll now be warned that it’s not delivering adequate power.

Finding the Right Balance

Apple’s battery optimization features represent a trade-off between immediate convenience and long-term battery health. For most users, leaving Optimized Battery Charging enabled makes sense—it learns your patterns and charges to full when needed. The new Charge Limit feature offers more explicit control for those who prefer it, particularly those whose MacBooks rarely leave the desk and can be locked at 80%.

If you frequently fight these features, you may have an unpredictable schedule that the algorithms can’t anticipate. In that case, consider turning off Optimized Battery Charging or setting a higher Charge Limit. Just remember that keeping your battery at 100% more often will shorten its lifespan—a trade-off that might be acceptable depending on how long you plan to keep your laptop.

(Featured image by iStock.com/shirophoto)

Check Your Input Source If Your Mac Types Unexpected Characters

If your Mac starts typing unexpected characters—or rejects a password you know is correct—check to see if the Input Source menu appears in the upper-right corner of the screen, indicating that your Mac has more than one keyboard layout available for writing in other languages. Accidentally switching from the standard U.S. keyboard (or whatever you regularly use) to another layout—like the French ABC – AZERTY, which swaps the A and Q keys, among others—can cause keystrokes to produce different characters than expected. This key swapping is particularly confusing in password fields, where you can’t see what’s being typed. To fix it, click the Input Source menu and choose your default. To prevent this problem from recurring, go to System Settings > Keyboard, click Edit next to Input Sources, and delete any keyboard layouts you don’t use. You can also change what the Globe key does in System Settings > Keyboard—you can prevent accidental layout changes by switching it from Change Input Source to Show Emoji & Symbols, Start Dictation, or Do Nothing.

Estonia, Tallinn, July 11, 2020. Apple Macbook pro 15 Retina on table

(Featured image based on an original by iStock.com/Armastas)

View Suspicious Documents Safely with Dangerzone

A standard piece of advice for staying safe online is to avoid opening attachments from people you don’t know or attachments that seem suspicious. It’s good advice, since PDFs and office documents can contain JavaScript and macros that present a security risk, or they could be maliciously crafted to take advantage of vulnerabilities in common apps to execute code on your computer.

But in the real world, unless the document is attached to a message that is obviously spam, it’s difficult to know whether you should be worried. If you could just look at the document, you might be able to tell, but how can you do that without opening it?

Enter Dangerzone, an open source app created by the nonprofit Freedom of the Press Foundation. The impetus for creating it came from journalists who need to review attachments from possibly untrustworthy sources while protecting themselves from hacking and retaliation from powerful corporate and government interests.

Dangerzone won’t tell you whether or not a document is safe. Instead, when you drop a document on its window, it creates a PDF image of the document that contains nothing of the original other than the visual representation of its pixels. Think of Dangerzone as a virtual photocopier—it makes a visual copy.

But Dangerzone is a highly sophisticated virtual photocopier, since it has to work with malicious documents without allowing them to cause harm. Behind the scenes, Dangerzone first creates a Linux container to keep the document away from your Mac. Within the container, it then creates a sandbox to protect the Linux kernel. Then it uses open source tools—LibreOffice and PyMuPDF—to convert the original document to a PDF, split that PDF into individual pages, and convert each page to RGB pixels—just colored dots. Then it quits the sandbox since the file has been sanitized, and if possible, it converts the RGB pixel data into a compressed, searchable PDF. Finally, it saves the PDF to the specified folder and archives the original file. You can process only one file or batch of files at a time to ensure that the entire secure conversion environment starts fresh each time.

Here are the document types that Dangerzone can convert into safe PDFs:

  • PDF (.pdf)
  • Microsoft Word (.docx, .doc)
  • Microsoft Excel (.xlsx, .xls)
  • Microsoft PowerPoint (.pptx, .ppt)
  • ODF Text (.odt)
  • ODF Spreadsheet (.ods)
  • ODF Presentation (.odp)
  • ODF Graphics (.odg)
  • EPUB (.epub)
  • JPEG (.jpg, .jpeg)
  • GIF (.gif)
  • PNG (.png)
  • SVG (.svg)
  • TIFF (.tif, .tiff)
  • Other image formats (.bmp, .pnm, .pbm, .ppm)

You won’t want to use Dangerzone on every document you receive in email. There’s no reason to fuss with it for attachments that come from people you know, in contexts where it makes sense that they’re sending you something. But if you get an attachment out of the blue that makes you think, “Why is this person sending me a document?” run the document through Dangerzone to make sure it’s safe.

(Featured image by iStock.com/shironosov)

Make Finder Window Columns Resize to Fit Filenames

Column view in the Finder has an annoying tendency to either show overly wide columns that waste space or truncate long filenames, forcing you to drag a column divider to see more of the name. In macOS 26.1 Tahoe, Apple added an option to the Finder’s View Options window that automatically adjusts column widths to display the longest visible filename in each column. To activate it, choose View > Show View Options with a column-view window frontmost, then select the “Resize columns to fit filenames” checkbox. If you’re running macOS 13 Ventura through macOS 15 Sequoia, this option is hidden, but you can enable it by pasting this command into Terminal: defaults write com.apple.finder _FXEnableColumnAutoSizing -bool YES; killall Finder. (Change YES to NO to revert the change.) Alternatively, the free TinkerTool 10 utility provides a graphical toggle for these older operating systems—look for “Automatically adapt to file name widths in column mode” in the Finder section.

(Featured image by iStock.com/IPGGutenbergUKLtd)

Not All Your Mac’s USB-C Ports Are the Same

We recently helped a client set up an external boot drive on a Mac mini for testing, but the installation kept failing near the end with vague errors. We tried different cables, swapped drives, and more, to no avail. On a hunch, we moved the SSD to a different USB-C port, and the installation completed on the next attempt. But the port wasn’t bad—it was just the wrong port. Here’s what we mean.

All the USB-C ports on a Mac look identical, but they don’t all behave the same way. On Macs with Apple silicon and Intel-based Macs with the T2 chip, Apple designates one port as the DFU (device firmware update) port. Most of the time, this distinction doesn’t matter—you can plug a device into any port, and it’ll work normally. But for certain tasks, using the wrong port can cause mysterious failures that waste hours of troubleshooting time.

Note that we say “USB-C” here, even though in most cases, these are Thunderbolt ports. However, Thunderbolt uses the USB-C connector, and Apple refers to the ports as USB-C ports, so we’re following Apple’s lead.

When It Matters Which Port You Use

The DFU port exists for one specific purpose: reviving or restoring your Mac’s firmware using another Mac and the Apple Configurator app. This recovery procedure requires connecting a USB-C cable (not a Thunderbolt cable!) to the DFU port. It’s extremely uncommon to need to revive a Mac in this way, but it might be necessary if the Mac starts up to an exclamation point in a circle, starts up to a blank screen, shows the status indicator light pattern for firmware recovery mode, or has problems installing macOS.

For most everyday tasks, the DFU port should work like any other USB-C port. However, Apple has documented one notable exception on Macs with Apple silicon: when installing or updating macOS on an external drive, avoid using the DFU port. If your external drive is connected to it during installation, the process may fail partway through, often without a useful error message and certainly without a clear “Connect your drive to a different port” message. You might see vague notifications like “Some updates could not be installed” or cryptic errors like “com.apple.OSInstallerSetup.error 702.” After installation or updating completes, you can connect your external drive to any port, including the DFU port.

We’ve also heard of situations where seemingly inexplicable problems, such as errors from an Apple SuperDrive attached to a Thunderbolt dock, were resolved by switching to a different port. It wasn’t always clear which port was responsible, but it’s always worth trying a different one if you have trouble.

Finding Your Mac’s DFU Port

How do you figure out which USB-C port is the DFU port? Apple maintains a support document describing the DFU port locations for each Mac model. The location varies by model and, within the same model, sometimes by generation. Apple does not explain why a particular port is designated as the DFU port or provide another way to identify it. All you can do is refer to Apple’s documentation.

Unfortunately, users have found errors on that page in the past, so if you’re experiencing unexplained installation failures or other errors, try a different port even if you believe you’re using the correct one.

DFU Port Takeaways

For everyday use—connecting displays, drives, docks, and other peripherals—you shouldn’t need to think about which port you’re using. The only time you must use the DFU port is when reviving or restoring a very unhappy Mac.

However, if you’re setting up an external boot drive or updating macOS on an external drive, take a moment to identify your Mac’s DFU port and plug your drive into a different one. And if a peripheral, even if it’s connected through a dock, behaves inexplicably, treat the port itself as a variable. Before troubleshooting cables, drives, or software, move the connection to another USB-C port. This simple step can save you from frustrating troubleshooting sessions where everything appears to work but ultimately fails.

(Featured image by iStock.com/Milosz Deptula)

Apple’s Focus Is Powerful but Unpredictable

Sometimes you just don’t want your phone to ring, chirp, or even vibrate. Maybe you’re asleep, in an important meeting, having dinner with family, meditating, playing a game, or simply enjoying some quiet time.

Apple’s Focus feature on the iPhone, iPad, and Mac can silence those interruptions, but Focus is considerably more complex than the straightforward Do Not Disturb feature it replaced in 2021. Misconfiguring Focus such that it activates unexpectedly can cause you to miss important calls, messages, and other notifications.

What Focus Does

Focus lets you create customized notification environments that block unwanted interruptions while allowing important ones through. You can have a Focus for different situations—when you’re at work, eating dinner, at the gym, and more—each with its own rules about when it activates and which people and apps can reach you.

When a Focus is active, it can:

  • Silence notifications from selected people and apps
  • Allow specific people and apps to break through
  • Change your Lock Screen appearance
  • Hide certain Home Screen pages
  • Automatically reply to messages explaining you’re unavailable
  • Filter content in apps like Mail, Calendar, and Messages
  • Make a certain profile or tab group active in Safari

Focus can share your settings across all your Apple devices, which saves you from having to configure it on each device but can also create confusing interactions.

The Built-In Focus Modes

Apple provides three essential Focus modes that cover most people’s needs:

  • Do Not Disturb: A general-purpose Focus for when you need to ensure your iPhone doesn’t interrupt you. It’s ideal for doctor appointments, workouts, movies, and similar situations. You can schedule it, but it’s often best to activate it manually from Control Center for a specific amount of time or until you leave the current location.
  • Sleep: This Focus activates according to the Sleep schedule you set on the iPhone (in either Settings > Focus > Sleep or in the Health app) to minimize nighttime interruptions. It lets you choose a specific Lock Screen, Home Screen, and Apple Watch face to limit distractions at night.
  • Driving: Automatically activates when your iPhone connects to a car’s Bluetooth system or detects driving motion. (The Bluetooth connection may be best if you’re frequently a passenger and want to use your iPhone while being driven.) It blocks nearly all notifications to keep your attention on the road and can send custom automatic replies to people who text you.

For further customization, you can create additional Focus modes—Apple suggests modes for Gaming, Mindfulness, Personal, Reading, and Work. For instance, if you take a spin class every Tuesday at noon and yoga on Thursdays at 7 AM, you could create a Focus for Working Out that would automatically activate during those times.

Configuring a Focus

To set up a Focus, go to Settings > Focus on your iPhone or iPad, or System Settings > Focus on your Mac. Select the Focus you want to configure or create a new one, then:

  1. Choose allowed people: Decide whether to allow or silence notifications from specific people. You can also specify whether phone calls from certain groups (Allowed People, Favorites, Contacts, or Contacts groups) can break through.
  2. Choose allowed apps: Similarly, allow or silence specific apps. You can also enable Time Sensitive Notifications, which lets urgent alerts (like delivery notifications or security alerts) come through even from disallowed apps.
  3. Set a schedule: Have the Focus turn on at certain times, locations (on when you arrive, off when you leave), or when using specific apps (but not when apps are in the background). App-based triggers are useful for presentations, live performances, and games. A Smart Activation option on the iPhone can automatically turn on a Focus based on your location, app usage, and time of day.
  4. Add Focus Filters: Customize how Calendar, Mail, Messages, Safari, and others behave when the Focus is active—for example, showing only certain Safari tab groups and your work email accounts during a Professional Focus.
  5. Intelligent Breakthrough & Silencing: If you have Apple Intelligence enabled, this option “intelligently” allows priority notifications to interrupt you and silences others. It doesn’t override your explicit settings for allowing or silencing notifications.

The Complexity Problem

While Focus is powerful, its complexity can create unpredictable behavior. Here are common pitfalls to avoid:

  • Unexpected activation: With automatic schedules based on time, location, and apps, it’s hard to predict when a Focus might turn on. You may not realize notifications are being silenced until you’ve missed something important. This is especially important if your routine is interrupted. Perhaps you normally work out at noon, but today you are at a professional conference or dealing with a family emergency.
  • Cross-device confusion: By default, Focus syncs across all your Apple devices via the Share Across Devices option. Syncing means a Focus activated on your iPhone—such as Sleep—might also silence notifications on your Mac when you’re working late and need to communicate with colleagues. Consider turning off Share Across Devices unless you’re certain you want synchronized behavior.
  • Unpredictable AI: Focus includes two features that rely on machine learning—Smart Activation and Intelligent Breakthrough & Silencing—to make contextual decisions about when Focus should activate and which notifications are important enough to bypass it. We recommend against using them because they make an already unpredictable scenario even more unpredictable.
  • Silenced notifications indicator: When a Focus is active, people who text you in Messages see that your notifications are silenced. While this can be helpful, it can also confuse others when a Focus activates unexpectedly.
  • The forgotten Focus: A Focus that activates automatically when you go to a specific location or open a particular app might remain active longer than you expected. For instance, what if a Focus activates when Mail is your frontmost app, but you have to leave unexpectedly and your Mac doesn’t sleep automatically, so Mail remains the active app over the weekend? That might be particularly confusing when a Focus Filter hides certain accounts or data.

Practical Recommendations

To get the benefits of Focus without the confusion:

  • Keep it simple: Start with Do Not Disturb, Sleep, and Driving. These three cover the needs of most people and have the most predictable behavior. If you created Focus modes you’re not using, delete them.
  • Be conservative with triggers: If you add schedules or triggers based on location or apps, keep them to a minimum. The more triggers you add, the harder it becomes to predict when a Focus will be active.
  • Allow more calls: These days, unexpected calls from people you know well are fairly uncommon, and those that do happen are more likely to be important. So consider allowing calls from family and close friends (perhaps via Favorites or a Contacts group) and enabling Allow Repeated Calls, which lets someone through if they call twice within three minutes.
  • Check Focus status when troubleshooting: If you or someone you know is missing notifications, check whether a Focus is unexpectedly active. The easiest place to check is Control Center.
  • Review Share Across Devices: If you experience unexpected Focus behavior, turn off Share Across Devices and configure each device’s Focus settings independently.
  • Control notifications directly: Rather than rely on Focus, limit notifications to just those that are actually important to you. Many apps are unnecessarily chatty.

Focus is a powerful tool for managing the constant stream of notifications from our devices, but it requires careful configuration. When in doubt, keep it simple: Sleep to protect your sleeping hours, Driving to block distractions in the car, and Do Not Disturb for ad hoc appointments and performances may be all you need.

(Featured image by iStock.com/DragonImages)