Category Archives: Apple

Consider Personal Cyber Insurance

As digital threats become increasingly sophisticated, individuals need protection just as much as businesses do. According to the Federal Trade Commission, Americans lost $12 billion to fraud in 2024, with a significant portion coming from digital scams. While we’d all like to think we’re too savvy to fall for such schemes, even security experts can become victims: Troy Hunt, creator of the Have I Been Pwned site that tracks data breaches, recently fell prey to a sophisticated phishing attack.

As cyber threats evolve and become more convincing, personal cyber insurance is becoming increasingly common, either as a standalone policy or as an add-on to a standard homeowner’s or renter’s policy. It can help you recover from cyberattacks, online fraud, ransomware, identity theft, social media hijacking, cyberbullying, and similar threats.

The financial impact of these incidents can be significant. The average loss from identity theft is between $500 and $1,500; however, sophisticated scams can result in far greater damages. For example, an individual lost $30,000 to a “pig-butchering” scheme, though they fortunately recovered $25,000 through their cyber insurance policy.

What Personal Cyber Insurance Covers

Although the specifics vary by policy, personal cyber insurance typically protects in three key areas:

  • Financial protection:
      • Identity theft recovery: Coverage for expenses related to restoring your identity, including legal fees, lost wages, and document replacement
      • Fraud reimbursement: Recovery of money stolen through cyber attacks, including unauthorized charges, stolen bank funds, and deceptive transfer fraud
      • Cyber extortion coverage: Payment for ransom demands and professional negotiation services if your data is held hostage
  • Technical support:
      • Data breach response: Professional IT services to recover compromised data and restore systems
      • Device recovery: Assistance with cleaning infected devices and replacing damaged smart home systems
      • Credit monitoring: Ongoing surveillance of your credit reports and financial accounts
  • Personal assistance:
    • Cyberbullying support: Coverage for counseling, private tutoring, and reputation management
    • Legal assistance: Access to legal professionals specializing in cyber-related incidents
    • Identity restoration: Dedicated help with replacing documents and clearing fraudulent records

However, as with other forms of insurance, it’s important to be aware of common exclusions that cyber insurance won’t cover:

  • Prior incidents: Cyber policies won’t cover known compromises that occurred before the policy’s start date.
  • Intentional acts: Self-inflicted losses or intentional policy violations are not covered.
  • Business-related incidents: Coverage is for personal activities only unless otherwise specified.
  • Cryptocurrency scams: Most policies don’t cover cryptocurrency losses.
  • Poor security practices: Failing to maintain basic security measures may void coverage.
  • Physical device damage: Standard damage to devices is typically covered by homeowner’s or renter’s insurance.

Getting Personal Cyber Insurance

For many people, the easiest way to get personal cyber insurance is as an endorsement (an add-on) to an existing homeowner’s or renter’s policy. That’s the case with State Farm, for instance. These endorsements are often quite affordable, with fees as low as an additional $25 per year, and they provide coverage up to $100,000.

Those who need a dedicated cyber insurance policy can look into the broker-sold Cyberboxx Home, which NFP sells directly as DigitalShield in many states, and Allstate Identity Protection, which focuses on identity theft. Prices start around $65 per year.

For most people, the most straightforward and economical approach is adding an endorsement to an existing policy. Contact your insurance broker and see what they can provide—even if your policy doesn’t offer what you want, they may be able to put together similar coverage for you. Of course, if you don’t yet have an insurance policy or are looking to switch providers, it’s worth reviewing exactly what’s covered, along with costs and coverage limits, when comparing policies or insurers.

Don’t Ignore Key Security Practices

Having cyber insurance doesn’t allow you to skimp on security. Even if an insurance policy recompenses you for lost money, having your identity stolen or being tricked into transferring funds to a scammer will be a huge hassle. Worse, being sufficiently negligent could prevent you from receiving coverage.

To reduce the chance that you’ll need to file a cyber insurance claim—and to ensure your policy remains valid—follow these essential security practices, which we’ve recommended many times:

  • Use strong, unique passwords with a password manager.
  • Enable two-factor authentication wherever available.
  • Keep all devices and software updated.
  • Maintain backups of important data.
  • Be cautious with unexpected links or attachments.
  • Monitor financial accounts regularly.

While personal cyber insurance can’t prevent attacks, it provides crucial financial protection in our increasingly digital world. As scammers ramp up the sophistication of their tactics, having a safety net becomes ever more important.

(Featured image by iStock.com/inkoly)

Audit How You Appear in Google Search

Google has created a free service that lets you see what of your personal and professional information has been published on the Web. Once you provide your name, address, phone numbers, and email addresses to Google’s Results About You website, Google will inform you if that info appears in search results. (Don’t worry, you’re not telling Google anything it doesn’t already know.) It may take a few days or weeks for the initial results to come back, and Google will keep adding more results over time. You can review each page with your information and, if it’s data you would prefer to keep private and it meets Google’s policy requirements, request its removal from the search results. This only removes your data from Google’s search results; to remove it from the Web entirely, you’ll need to contact the website hosting the information.

(Featured image by Google)

Stay Connected Off the Grid: How to Use Messages via Satellite in iOS 18

If you own an iPhone 14, 15, or 16 and are in the US, Canada, or Mexico, you now have access to a feature that could make all the difference the next time you find yourself staring at the dreaded SOS icon in your status bar. With iOS 18, Apple introduced Messages via satellite, a technology that lets you send and receive text messages even when you’re completely out of range of cellular and Wi-Fi networks. While it’s not a substitute for your usual messaging habits, it’s a powerful tool for minor emergencies, remote travel, or moments when the infrastructure fails you.

Why Messages via Satellite Matters

Cellular coverage is nearly ubiquitous—until it isn’t. It’s all too easy to find yourself without a signal in rural areas, and increasingly frequent natural disasters like hurricanes and wildfires can disrupt cell networks for days or even weeks. In those situations, the ability to communicate can range from a minor convenience to a literal lifesaver.

Apple’s satellite connectivity, first introduced with Emergency SOS and Find My features in iOS 16 and expanded to Roadside Assistance with iOS 17, has already proven its worth in real-world emergencies, most notably during the Maui wildfires. Now, with iOS 18 and a compatible iPhone, you can use Messages to let someone know you’re safe during a storm, get help from a friend if your bike gets a flat in a remote area, check in with family while hiking in rural regions, and stay in touch during large-scale network outages, all without a cell tower within range.

Who Can Use Messages via Satellite?

Messages via satellite is available on all iPhone 14, iPhone 15, and iPhone 16 models, and it currently works only in the US, Canada, and Mexico. The feature is included for free for two years after activating a supported device, and Apple has already extended this window once without indicating any plans to charge for the service.

Messages via satellite works best when both you and your recipient are running iOS 18 or later. However, SMS fallback is available for non-iPhone users and those on older iOS versions. If you haven’t messaged someone recently, you may be prompted to use SMS instead of iMessage. The best approach may be to send them a regular iMessage while you’re still online to “prime” the conversation for satellite use.

How to Access Messages via Satellite

Apple designed Messages via satellite for use only when you truly need it. You can’t just switch it on whenever you want—your iPhone will offer the option only when there’s no cellular or Wi-Fi connection available. When this happens, the SOS icon in your status bar indicates that Messages via satellite can be used. It may or may not have a satellite icon next to it.

To get started, open the Messages app. If you’re in SOS mode, you’ll see a prompt to enable satellite messaging. Alternatively, go to Settings, where a Satellite option will appear under Battery. Apple also provides a Satellite Connection demo (accessible from Control Center) so you can practice connecting your phone to a satellite even when you have connectivity. We recommend trying this demo at least once—don’t try Messages via satellite for the first time when you actually need it.

Screenshot

Once you’re ready to send a message, follow the on-screen instructions to point your iPhone at the sky. The phone will guide you to align with an available satellite, and you’ll see a green haze on the connection screen or a checkmark in the Dynamic Island when you’re connected. If you lose the connection, you’ll need to realign, as satellites move quickly across the sky. (Yes, you might look a bit eccentric waving your phone around in a field, but that’s a small price to pay for satellite connectivity.)

What You Can—and Can’t—Do

Messages via satellite has impressive capabilities, but it does come with some restrictions and quirks:

  • Text-only chats: You can send and receive text messages using iMessage or SMS. No photos, videos, audio messages, stickers, or other attachments are supported. However, emoji and tapbacks work.
  • Message length limits: iMessage conversations are restricted to 500 characters per message, while SMS messages are capped at 140 characters. If you go over these limits, the send button becomes disabled.
  • No group chats: Group conversations aren’t supported, even if everyone is using iMessage.
  • No location sharing in Messages: While you can’t send your location directly in a satellite message conversation, you can update your Find My location via satellite, which can then be viewed by those you’ve shared it with.
  • Slower delivery: Messages take longer to send and receive, anywhere from 30 to 60 seconds per message. You must stay connected to the satellite to receive replies.
  • Incoming message restrictions: Only emergency contacts and members of your Family Sharing group can initiate messages to you while you’re offline, and only via SMS. Their messages are delivered once you establish a connection to a satellite.
  • End-to-end encryption: iMessage conversations via satellite are end-to-end encrypted, but SMS messages are not.

Practical Tips for Using Messages via Satellite

To make the most of Messages via satellite when you need it, keep these tips in mind:

  • Practice connecting: Try Apple’s Satellite Connection demo before you need it. Familiarity with the process will save you time and stress in a real-world situation.
  • Update emergency contacts: Make sure your emergency contacts and Family Sharing members are current. They are the only people who can reach you first when you’re off the grid.
  • Prime important contacts: If you anticipate needing to reach someone while offline, send them a message while you still have coverage. This helps ensure the conversation is ready for satellite use.
  • Stay connected for replies: Keep your phone pointed at the satellite until you get a response. Dropping the connection will interrupt the flow of messages.
  • Don’t expect instantaneous service: Patience is key—sending and receiving messages via satellite is much slower than what you’re used to.

Messages via satellite is a significant step forward in making iPhones more useful in challenging situations. While we certainly hope you don’t need it every day, it’s a feature that’s good to have in your back pocket. The next time you see the SOS icon on your iPhone, don’t panic. Open Messages, follow the prompts, and stay connected when it matters most. It’s not magic, but it’s close enough for most practical purposes.

(Featured image by iStock.com/Jacob Wackerhausen)

Clean Your iPhone’s Camera Lens

Serious photographers take care of their lenses. The rest of us just stuff our iPhones into our pockets or purses and pay no attention to the fingerprints and grime they collect. If your iPhone’s camera lens is smudged, it will impact the quality of your photos. Take a few seconds to polish it with a microfiber cloth now and then, or, you know, simply wipe it with the edge of your T-shirt. Your photos will thank you.

(Featured image by iStock.com/EyeEm Mobile GmbH)

Switch Between Apps Fluidly on Face ID iPhones

The ongoing threat of tariffs raising the price of iPhones has recently prompted some people to upgrade from an old Touch ID iPhone to a new iPhone 16. Although most have adjusted well to Face ID, few are aware of the app-switching shortcut exclusive to Face ID iPhones. To access the App Switcher on a Face ID iPhone, you must swipe up slightly from the bottom of the screen and then continue the swipe to the right. However, Face ID experts rarely do that. Instead, they just swipe right and left on the bar at the bottom of the screen to switch between apps—it’s much faster and easier, albeit hard to discover.

(Featured image by Adam Engst)

Apple Silicon Macs Can’t Boot from the DFU Port

Booting from an external SSD (hard disks are too slow) provides a convenient way to test specific versions of macOS or troubleshoot problems with your Mac’s internal storage. However, a little-known gotcha has caused untold hair loss among those trying to boot from an external drive. Macs with Apple silicon cannot start up from external drives connected to their DFU (device firmware update) USB-C port. The only way to determine which port this is on a given Mac is to look it up on Apple’s website. If your Mac won’t boot from an external drive, connect it to a different USB-C port.

(Featured image by iStock.com/ardasavasciogullari)

Did You Know You Can Rename Many Bluetooth Devices?

All Bluetooth devices come with a name, but those names are often difficult to decipher, such as ATUMTEK, DX01Gu, and MY-CAR, making it hard to remember which is which in your iPhone’s Bluetooth settings. What you may not realize is that you can rename many Bluetooth devices to tidy up that list. Go to Settings > Bluetooth, connect to the device, and tap the blue ⓘ button to the right of its name. If you can rename the device, you’ll be able to tap the Name field and enter a new one. While you’re here, note the Device Type menu, which lets you choose from Car Stereo, Headphone, Hearing Aid, Speaker, and Other. Apple says that specifying the correct device type can ensure greater accuracy for the Headphone Audio Level measurements, which iOS uses to warn you about prolonged exposure to loud audio.

(Featured image based on originals by iStock.com/Pantherius and iStock.com/Meepian Graphic)

Choosing the Best Mac for a College-Bound Student in 2025

Is your child heading off to college soon? Now is a good time to consider getting them a new Mac, especially if their current computer is old or unreliable, is shared with other family members, or was a school loaner. If you haven’t been keeping up with Apple’s Mac lineup, you might be unsure which model is the best choice.

First, check with the college before making a purchase. Although less common than in the past, some college departments have specific requirements based on the software used by students in their classes. Generally, these requirements focus on processor type, amount of RAM, and storage space. Current Macs should meet or exceed all of these requirements. A more significant issue arises if the college requires a Windows machine; in that case, determine whether the requirement is based on specific Windows-only software or simply a preference by the IT staff to maintain a uniform support environment. Second, see if the college offers educational pricing—most do—to save a few hundred dollars off the prices listed below. Regardless, Apple often has a Back to School offer.

Choose a laptop instead of a desktop Mac. Students lead mobile lives and need to work in various locations on campus, so having to head back to the dorm to use an iMac or Mac mini will be limiting. Plus, they often need to work during breaks, so they need a Mac that’s easy to carry home. A student accustomed to taking notes on an iPad with a keyboard and Apple Pencil might manage to use that alongside a desktop Mac, but most students should opt for laptops.

In the past, deciding on the best model for a given student was more challenging, but Apple’s speedy and power-efficient M-series chips make the decision easier. We see three primary scenarios:

  • Most students: Buy Apple’s MacBook Air, the company’s lightest and least expensive laptop. Within the MacBook Air lineup, there are three options. The most affordable is the 13-inch M1 MacBook Air from 2020, which costs $649 and is exclusively available at Walmart. Purchase it only if budget is the primary concern. The other options include the 13-inch or 15-inch M4 MacBook Air models introduced in March 2025. The 13-inch M4 MacBook Air features a 13.6-inch screen, much faster performance than the M1, a memory ceiling of 32 GB, and up to 2 TB of storage, starting at $999. For those interested in a larger display, the 15-inch M4 MacBook Air is a great choice, beginning at $1,199. Otherwise, it’s nearly identical to its smaller sibling.
  • Better specs: If performance is more important than price—especially if your student will be working on processor-intensive tasks like video editing—consider the 14-inch MacBook Pro. It features a powerful M4, M4 Pro, or M4 Max chip, and the M4 Pro and M4 Max models can be configured with significantly more memory. While its 14.2-inch screen is physically slightly smaller than that of the 15-inch MacBook Air, it offers a somewhat higher resolution. The price starts at $1,599 but increases quickly with the M4 Pro and M4 Max chips. (There’s also a 16-inch MacBook Pro, which is available only in M4 Pro and M4 Max configurations and exceeds the needs of most students.)
  • Windows compatibility: The only downside of the transition to Apple silicon is that it’s more challenging to run Windows using virtualization software like Parallels Desktop (available at half price for students) or VMware Fusion (free for personal use). If Windows compatibility is a bonus but not essential, either of those with the Arm version of Windows 11 should work for most apps. However, if Windows compatibility is crucial, your options are a used Intel-based MacBook Pro or—much as we hate to say it—a PC laptop that runs Windows natively.

No matter which laptop you choose, you’ll need to select a processor, memory size, and storage capacity:

  • Processor: With the 13-inch M1 MacBook Air, you’re limited to the M1 chip with an 8-core CPU and a 7-core GPU. The 13-inch M4 MacBook Air models always come with a 10-core CPU, but you can pay $100 to upgrade from an 8-core GPU to a 10-core GPU. The 15-inch M4 MacBook Air comes standard with a 10-core GPU. Although the performance difference isn’t likely noticeable with everyday apps, it might be worth upgrading for $100, just in case. The 14-inch MacBook Pro offers a choice between the M4, M4 Pro, and M4 Max; the decision ultimately comes down to balancing potential performance needs against increased costs. Few students will need—or even notice—an M4 Pro, and even fewer will need an M4 Max.
  • Memory: The 13-inch M1 MacBook Air from Walmart comes with only 8 GB of memory, which is sufficient for most college students. The M4 MacBook Air models start at 16 GB and offer options for 24 or 32 GB. With the 14-inch MacBook Pro, the memory capacity varies with the chip. The M4 chip offers 16, 24, or 32 GB, similar to the MacBook Air. The M4 Pro comes standard with 24 GB, but you can choose to upgrade to 48 GB. The M4 Max has a standard memory spec of 36 GB, with upgrade options to 48, 64, or 128 GB. Students can typically stick with 16 GB or choose 24 GB for more demanding tasks—few will require 32 GB or more.
  • Storage: For all MacBook Air models, 256 GB is the minimum storage option, and you can upgrade to 2 TB on all devices sold by Apple. The 14-inch MacBook Pro starts at 512 GB and provides upgrades up to an impressive 8 TB. Choose the storage capacity based on two factors: budget (storage can get expensive quickly) and anticipated usage (audio and particularly video production can consume a lot of space, as can large quantities of photos, but most other uses don’t require as much). Keep in mind that connecting an external Thunderbolt SSD or hard drive is an easy way to offload large files that don’t always need to be readily available. Large files can also be kept in cloud-based storage.

For most students, the best choice for a Mac that is likely to last throughout four years of college is the 13-inch or 15-inch M4 MacBook Air, equipped with a 10-core GPU, 16 GB of memory, and 512 GB of storage. While the 15-inch model has a larger screen, it’s also heavier and takes up more space in a backpack, so consider portability when making your final decision. Be sure to budget for AppleCare+ as well; it’s almost guaranteed that some mishap will occur with a student laptop, and AppleCare+ covers up to two incidents of accidental damage each year.

We recommend talking with your child to learn more about what they think they’ll need—and make sure to compare it to the college’s recommendations—but if you have any questions afterward, feel free to reach out to us.

(Featured image by iStock.com/​​Zbynek Pospisil)

Beware Domain Name Renewal Phishing Attacks

Most phishing attacks are easy to identify, but we’ve just seen one that’s more likely to evade detection. Those who own personal or business Internet domain names—to personalize their email or provide an online presence for their website—may receive fake messages claiming that a domain has been deactivated due to a payment issue. Because scammers can determine when domain names are due to expire and the name of the company hosting the domain, the urgency triggered by a message that appears to be from the domain host and arriving near the renewal date may cause someone to click a link they shouldn’t. This particular one wasn’t even that well crafted and still caused the recipient brief concern until they manually went to DreamHost and verified that nothing was wrong with their domain payment. Stay alert out there!

(Featured image by iStock.com/weerapatkiatdumrong)

Consider Business Cyber Insurance

When discussing digital security, we typically focus on preventive measures, such as using strong passwords with a password manager, enabling multi-factor authentication, keeping systems up to date, maintaining regular backups, and training employees to recognize potential security threats. While these practices are essential, they don’t guarantee complete protection.

No one is immune to online attacks—the most security-conscious organizations and individuals can still become victims. Even security experts occasionally click something they shouldn’t have or forget to keep a little-used system up to date. A single employee opening a convincing phishing email, a momentary lapse in judgment, or a zero-day vulnerability can lead to devastating consequences.

According to the FBI’s Internet Crime Complaint Center (IC3), cybercrime-related losses from 2020 through 2024 are estimated at $50.5 billion, with IC3 receiving 4.2 million complaints. Most concerning is the rising trend in the frequency and severity of these attacks.

Given these statistics and the reality that perfect security is impossible, many are looking to protect themselves from possible financial losses. Just as fires and accidents make home and auto insurance necessary, these ever-increasing threats from phishing, malware, and other forms of digital attack make cyber insurance an important consideration for both companies and individuals. We’ll focus on businesses here and explore personal cyber insurance in a future article.

What Is Business Cyber Insurance

Cyber insurance for businesses helps companies recover from security breaches and online attacks. Unlike traditional business insurance policies, cyber insurance focuses on the risks of using technology to operate or to store sensitive data online. Businesses of all sizes are vulnerable, but small and medium-sized businesses are often targeted because they lack the robust security infrastructure of larger enterprises.

Industries that are especially at risk include healthcare, financial services, retail, and professional services, but no sector is immune. You may have cause for additional concern if your company collects customer information, processes payments, or maintains a significant online presence, but realistically, every business that uses email or conducts online banking is vulnerable.

What’s Covered

A business cyber policy typically includes two core types of coverage:

  • First-party coverage: This coverage responds to direct costs incurred by your company, including legal expenses, data breach response and notification costs, ransomware payments and recovery expenses, business interruption losses, data restoration, system replacement, and crisis management.
  • Third-party coverage: Also known as liability insurance, this coverage protects you against claims from others affected by the breach, including legal defense costs, settlements, regulatory fines and penalties, and PCI-related fines associated with credit card processing.

What’s Not Covered

However, it’s essential to be aware of common exclusions to business cyber insurance, the most important of which are:

  • Weak security processes: Insurance doesn’t exempt you from maintaining a strong security stance—if you aren’t requiring strong passwords, providing security training, and correcting known vulnerabilities, the policy won’t cover you. Insurers will likely require verification of minimum cybersecurity practices before providing coverage.
  • Prior breaches: Just as health insurance may not cover pre-existing conditions, cyber insurance typically does not cover events that occurred before the policy was taken out.
  • Insider attacks or misconduct: Deliberate or fraudulent acts by company leadership or employees generally aren’t covered. Employees are a company’s greatest resource, but they can also be its greatest weakness.

Shopping for Business Cyber Insurance

How much will business cyber insurance cost? It varies based on your company size and revenue, industry sector, type and amount of sensitive data stored, security practices, coverage limits and deductibles, and claims history. That said, small businesses with yearly revenues under $1 million typically have annual premiums ranging from $500 to $2,000. Mid-sized firms often pay between $2,000 and $10,000, and large companies can expect premiums in the tens of thousands.

It’s common—and entirely understandable—to hesitate to purchase cyber insurance due to concerns about the cost. However, the potential financial impact of an incident is often significant. IBM’s 2024 Cost of Data Breach Report found that the average cost of a data breach was $4.9 million globally, but $9.4 million in the United States. Although IBM doesn’t break out costs by company size, those costs are likely for larger companies. Nonetheless, a Financial Times report notes that users at small and medium-sized businesses were twice as likely to encounter threats as those at large companies.

Choosing the right cyber insurance broker is as important as selecting the policy itself, and you’ll want to involve your security team in the search. Look for someone specializing in cyber coverage who has technical expertise in cybersecurity practices, strong relationships with underwriters, and a track record of providing active claims support. A good broker will not only find competitive pricing but also help tailor coverage to your specific risks and ensure you’re prepared to meet underwriting requirements.

When comparing cyber insurance options, pay attention to the details. Confirm that the policy addresses risks specific to your situation and provides sufficient financial protection for your potential exposure. Pay close attention to exclusions—there will be more than those listed above. Research the insurer’s claims process and reputation for responsiveness, as timely support during an incident is crucial. Finally, inquire about additional risk management services offered by the insurer that may provide valuable preventative resources to complement your coverage.

Start Researching Cyber Insurance Now

Unfortunately, the frequency and risk of cyber attacks are on the rise. Proactive security measures are key, but a single mistake or oversight could have dire outcomes. Cyber insurance provides an important safety net in the event of a breach or attack that evades your best efforts.

We won’t pretend that finding and purchasing cyber insurance is simple, but we can help with finding a good cyber insurance broker, evaluating the policy, answering application questions, and ensuring that your company meets the necessary security requirements.

(Featured image by iStock.com/Who_I_am)