<?xml version="1.0" encoding="utf-8" standalone="no"?><rss xmlns:creativeCommons="http://backend.userland.com/creativeCommonsRssModule" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">
<channel>
<title>The Practical Guide to Mac Security</title>
<link>http://macmost.com</link>
<itunes:image href="http://macmost.com/podcasts/security-podcast.jpg"/>
<image><link>http://macmost.com</link><url>http://macmost.com/podcasts/security-podcast.jpg</url><title>The Practical Guide to Mac Security</title></image>
<description>The Practical Guide to Mac Security is a video podcast with tutorials and explanations that will enable the typical home and office Mac user to secure their Mac from dangers like malware, online account break-ins, data loss, and online scams. For more free daily video tutorials for Mac and Apple users, visit http://macmost.com/</description>
<itunes:summary>The Practical Guide to Mac Security is a video podcast with tutorials and explanations that will enable the typical home and office Mac user to secure their Mac from dangers like malware, online account break-ins, data loss, and online scams.</itunes:summary>
<itunes:author>MacMost</itunes:author>
<language>en</language>
<generator>http://macmost.com</generator>
<lastBuildDate>Wed, 10 May 2017 20:02:03 +0000</lastBuildDate>
<pubDate>Wed, 10 May 2017 20:02:03 +0000</pubDate>
<media:copyright>Copyright MacMost</media:copyright>
<media:thumbnail url="http://macmost.com/podcasts/security-podcast.jpg"/>
<media:keywords>mac,security,privacy,apple,macmost</media:keywords>
<media:category scheme="http://www.itunes.com/dtds/podcast-1.0.dtd">Technology/Software How-To</media:category>
<media:category scheme="http://www.itunes.com/dtds/podcast-1.0.dtd">Technology/Tech News</media:category>
<media:category scheme="http://www.itunes.com/dtds/podcast-1.0.dtd">Technology</media:category>
<media:category scheme="http://www.itunes.com/dtds/podcast-1.0.dtd">Technology/Gadgets</media:category>

<itunes:explicit>no</itunes:explicit>
<itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords>




<atom10:link xmlns:atom10="http://www.w3.org/2005/Atom" href="http://macmost.com/security-podcast.xml" rel="self" type="application/rss+xml"/>
<copyright>Copyright MacMost</copyright>
<media:credit role="author">MacMost</media:credit>
<media:rating>nonadult</media:rating>
<media:description type="plain">The Practical Guide to Mac Security is a video podcast with tutorials and explanations that will enable the typical home and office Mac user to secure their Mac from dangers like malware, online account break-ins, data loss, and online scams.</media:description>


<itunes:subtitle>The Practical Guide to Mac Security is a video podcast with tutorials and explanations that will enable the typical home and office Mac user to secure their Mac from dangers like malware, online account break-ins, data loss, and online scams.</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Software How-To"/></itunes:category><itunes:category text="Technology"><itunes:category text="Gadgets"/></itunes:category><itunes:category text="Education"><itunes:category text="Training"/></itunes:category><itunes:owner><itunes:email>questions@macmost.com</itunes:email><itunes:name>MacMost</itunes:name></itunes:owner><item>
<guid isPermaLink="false">01Intro.mp4</guid>
<link>http://macmost.com</link>
<title>1. Introduction</title>
<itunes:subtitle>The Practical Guide to Mac Security: 1. Introduction</itunes:subtitle>
<description>
<![CDATA[ An introduction to the podcast. Find out what you will learn. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Sat, 15 Apr 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/01Intro.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>1. Introduction</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>An introduction to the podcast. Find out what you will learn.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">03StrongPasswords.mp4</guid>
<link>http://macmost.com</link>
<title>2. Improving Your Passwords</title>
<itunes:subtitle>The Practical Guide to Mac Security: 2. Improving Your Passwords</itunes:subtitle>
<description>
<![CDATA[ The weakest point in most peoples’ security is their passwords. Almost all security failures are simply a matter of weak passwords. Learn what a weak password is and how to create a strong password. Strong passwords should be computer-generated random passwords. You should only ever use a password once. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Sun, 16 Apr 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/03StrongPasswords.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>2. Improving Your Passwords</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>The weakest point in most peoples’ security is their passwords. Almost all security failures are simply a matter of weak passwords. Learn what a weak password is and how to create a strong password. Strong passwords should be computer-generated random passwords. You should only ever use a password once.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">04TwoFactor.mp4</guid>
<link>http://macmost.com</link>
<title>3. Using Two-Factor Authentication</title>
<itunes:subtitle>The Practical Guide to Mac Security: 3. Using Two-Factor Authentication</itunes:subtitle>
<description>
<![CDATA[ When available you should also use two-factor authentication. When you log into a site you not only need to enter your password, but also a code received on another device or via text message. This is important for securing your most important online accounts like email, iCloud and more. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Mon, 17 Apr 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/04TwoFactor.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>3. Using Two-Factor Authentication</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>When available you should also use two-factor authentication. When you log into a site you not only need to enter your password, but also a code received on another device or via text message. This is important for securing your most important online accounts like email, iCloud and more.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">05SafariPasswords.mp4</guid>
<link>http://macmost.com</link>
<title>4. Password Management</title>
<itunes:subtitle>The Practical Guide to Mac Security: 4. Password Management</itunes:subtitle>
<description>
<![CDATA[ Using strong passwords doesn’t require much extra effort if you use a password manager, such as the one built into Apple products. Or, you could use a third-party password manager. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Tue, 18 Apr 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/05SafariPasswords.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>4. Password Management</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>Using strong passwords doesn’t require much extra effort if you use a password manager, such as the one built into Apple products. Or, you could use a third-party password manager.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">06SecurityQuestions.mp4</guid>
<link>http://macmost.com</link>
<title>5. Security Questions</title>
<itunes:subtitle>The Practical Guide to Mac Security: 5. Security Questions</itunes:subtitle>
<description>
<![CDATA[ If you are asked to enter answers to security questions for a website or service, you should avoid using real answers as they can be easily guessed. Instead, use random passwords which will prevent your account from being compromised. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Wed, 19 Apr 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/06SecurityQuestions.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>5. Security Questions</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>If you are asked to enter answers to security questions for a website or service, you should avoid using real answers as they can be easily guessed. Instead, use random passwords which will prevent your account from being compromised.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">07WhatToDo.mp4</guid>
<link>http://macmost.com</link>
<title>6. What To Do If Your Accounts Have Been Compromised</title>
<itunes:subtitle>The Practical Guide to Mac Security: 6. What To Do If Your Accounts Have Been Compromised</itunes:subtitle>
<description>
<![CDATA[ If you fail to use strong passwords and two-factor authentication and your accounts are hacked, find out what you should do first. It is important to act quickly to avoid more damage and identity theft. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Thu, 20 Apr 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/07WhatToDo.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>6. What To Do If Your Accounts Have Been Compromised</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>If you fail to use strong passwords and two-factor authentication and your accounts are hacked, find out what you should do first. It is important to act quickly to avoid more damage and identity theft.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">08DoYouNeedAntivirus.mp4</guid>
<link>http://macmost.com</link>
<title>7. Do You Need Anti-Virus Software?</title>
<itunes:subtitle>The Practical Guide to Mac Security: 7. Do You Need Anti-Virus Software?</itunes:subtitle>
<description>
<![CDATA[ Experts and non-experts disagree on whether you need to buy anti-virus software for your Mac. But macOS already contains anti-virus protection that operates quietly and without any settings or controls. Often third-party “anti-virus” software is just a waste of money that causes more problems and should be avoided. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Fri, 21 Apr 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/08DoYouNeedAntivirus.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>7. Do You Need Anti-Virus Software?</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>Experts and non-experts disagree on whether you need to buy anti-virus software for your Mac. But macOS already contains anti-virus protection that operates quietly and without any settings or controls. Often third-party “anti-virus” software is just a waste of money that causes more problems and should be avoided.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">09ThreeRules.mp4</guid>
<link>http://macmost.com</link>
<title>8. Three Simple Rules</title>
<itunes:subtitle>The Practical Guide to Mac Security: 8. Three Simple Rules</itunes:subtitle>
<description>
<![CDATA[ To keep your Mac free of malware you need to follow three simple rules: Don’t download software from sites you don’t trust, keep your Mac up-to-date, and stay informed. Find out how to follow these three rules and stick to them. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Sat, 22 Apr 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/09ThreeRules.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>8. Three Simple Rules</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>To keep your Mac free of malware you need to follow three simple rules: Don’t download software from sites you don’t trust, keep your Mac up-to-date, and stay informed. Find out how to follow these three rules and stick to them.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">10Gatekeeper.mp4</guid>
<link>http://macmost.com</link>
<title>9. Using Gatekeeper</title>
<itunes:subtitle>The Practical Guide to Mac Security: 9. Using Gatekeeper</itunes:subtitle>
<description>
<![CDATA[ macOS will try to stop you from downloading and installing software that is not from the Mac App Store or has not been signed by registered developers. Learn how this protects you and how to get around the protection if you need to. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Sun, 23 Apr 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/10Gatekeeper.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>9. Using Gatekeeper</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>macOS will try to stop you from downloading and installing software that is not from the Mac App Store or has not been signed by registered developers. Learn how this protects you and how to get around the protection if you need to.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">11UserAccounts.mp4</guid>
<link>http://macmost.com</link>
<title>10. Mac User Accounts</title>
<itunes:subtitle>The Practical Guide to Mac Security: 10. Mac User Accounts</itunes:subtitle>
<description>
<![CDATA[ Each person using a Mac should be logged into their own account. Doing so will protect you from security issues and make your Mac experience better. Anyone else you let use your Mac should be using a Guest account. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Mon, 24 Apr 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/11UserAccounts.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>10. Mac User Accounts</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>Each person using a Mac should be logged into their own account. Doing so will protect you from security issues and make your Mac experience better. Anyone else you let use your Mac should be using a Guest account.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">12VPN.mp4</guid>
<link>http://macmost.com</link>
<title>11. Secure Connections with VPN</title>
<itunes:subtitle>The Practical Guide to Mac Security: 11. Secure Connections with VPN</itunes:subtitle>
<description>
<![CDATA[ If you are connecting to Wi-Fi away from home or work you should be using a VPN. This keeps your online transactions safe and secure from compromised Wi-Fi systems and on-the-air snooping. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Tue, 25 Apr 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/12VPN.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>11. Secure Connections with VPN</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>If you are connecting to Wi-Fi away from home or work you should be using a VPN. This keeps your online transactions safe and secure from compromised Wi-Fi systems and on-the-air snooping.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">13Phishing.mp4</guid>
<link>http://macmost.com</link>
<title>12. Phishing Scams</title>
<itunes:subtitle>The Practical Guide to Mac Security: 12. Phishing Scams</itunes:subtitle>
<description>
<![CDATA[ Just because an email looks like it comes from a service you use, doesn’t mean that it is from that service. It is easy for email to be faked in order to get you to hand over your passwords and other personal information. Find out how to protect yourself from this very common scam security weak point. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Wed, 26 Apr 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/13Phishing.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>12. Phishing Scams</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>Just because an email looks like it comes from a service you use, doesn’t mean that it is from that service. It is easy for email to be faked in order to get you to hand over your passwords and other personal information. Find out how to protect yourself from this very common scam security weak point.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">14WebScamsAndCalls.mp4</guid>
<link>http://macmost.com</link>
<title>13. Web Scams and Phone Calls</title>
<itunes:subtitle>The Practical Guide to Mac Security: 13. Web Scams and Phone Calls</itunes:subtitle>
<description>
<![CDATA[ Other scams will use fake web ads and unsolicited phone calls to try to gain access to your Mac or online accounts. Learn how to recognize and avoid these scams. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Thu, 27 Apr 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/14WebScamsAndCalls.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>13. Web Scams and Phone Calls</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>Other scams will use fake web ads and unsolicited phone calls to try to gain access to your Mac or online accounts. Learn how to recognize and avoid these scams.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false"/>
<link>http://macmost.com</link>
<title>14. </title>
<itunes:subtitle>The Practical Guide to Mac Security: 14. </itunes:subtitle>
<description>
<![CDATA[  ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Fri, 28 Apr 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/"/>
<media:player url="http://macmost.com/"/>
<media:title>14. </media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">15OnlineScams.mp4</guid>
<link>http://macmost.com</link>
<title>15. Social Engineering Scams</title>
<itunes:subtitle>The Practical Guide to Mac Security: 15. Social Engineering Scams</itunes:subtitle>
<description>
<![CDATA[ The web is teeming with scams. Classified sites and shopping sites, while legitimate, may harbor malicious threats in the form of common cons and scams. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Sat, 29 Apr 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/15OnlineScams.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>15. Social Engineering Scams</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>The web is teeming with scams. Classified sites and shopping sites, while legitimate, may harbor malicious threats in the form of common cons and scams.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">16TimeMachine.mp4</guid>
<link>http://macmost.com</link>
<title>16. Time Machine Backups</title>
<itunes:subtitle>The Practical Guide to Mac Security: 16. Time Machine Backups</itunes:subtitle>
<description>
<![CDATA[ Great overall security protection is provided simply by backing up. In addition, this protects you from physical disasters, theft, or simply your own mistakes. Every Mac user should get an inexpensive backup drive and start using Mac’s built-in backup system. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Sun, 30 Apr 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/16TimeMachine.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>16. Time Machine Backups</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>Great overall security protection is provided simply by backing up. In addition, this protects you from physical disasters, theft, or simply your own mistakes. Every Mac user should get an inexpensive backup drive and start using Mac’s built-in backup system.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">17CloudStorage.mp4</guid>
<link>http://macmost.com</link>
<title>17. Storing Files in the Cloud</title>
<itunes:subtitle>The Practical Guide to Mac Security: 17. Storing Files in the Cloud</itunes:subtitle>
<description>
<![CDATA[ If you use cloud storage, such as iCloud Drive or Dropbox, then you have a certain amount of protection since the files live on remove servers. This can make recovering from a physical disaster or theft very easy. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Mon, 01 May 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/17CloudStorage.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>17. Storing Files in the Cloud</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>If you use cloud storage, such as iCloud Drive or Dropbox, then you have a certain amount of protection since the files live on remove servers. This can make recovering from a physical disaster or theft very easy.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">18FileVault.mp4</guid>
<link>http://macmost.com</link>
<title>18. FileVault</title>
<itunes:subtitle>The Practical Guide to Mac Security: 18. FileVault</itunes:subtitle>
<description>
<![CDATA[ MacBook users should consider using macOS’s built-in encryption. This prevents someone from stealing your Mac and accessing your data. Without FileVault, it is possible from someone to get to your data even if they can’t log on to your Mac. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Tue, 02 May 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/18FileVault.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>18. FileVault</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>MacBook users should consider using macOS’s built-in encryption. This prevents someone from stealing your Mac and accessing your data. Without FileVault, it is possible from someone to get to your data even if they can’t log on to your Mac.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">19OnlineBackups.mp4</guid>
<link>http://macmost.com</link>
<title>19. Online Backups</title>
<itunes:subtitle>The Practical Guide to Mac Security: 19. Online Backups</itunes:subtitle>
<description>
<![CDATA[ Local backups are easy and provide a lot of protection, but online backups provide off-site backups which will protect you in case both your Mac and local backup are destroyed or stolen. They are also handy for users who travel often. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Wed, 03 May 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/19OnlineBackups.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>19. Online Backups</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>Local backups are easy and provide a lot of protection, but online backups provide off-site backups which will protect you in case both your Mac and local backup are destroyed or stolen. They are also handy for users who travel often.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">20UPS.mp4</guid>
<link>http://macmost.com</link>
<title>20. Using a UPS</title>
<itunes:subtitle>The Practical Guide to Mac Security: 20. Using a UPS</itunes:subtitle>
<description>
<![CDATA[ A simply battery system can protect your Mac from short power outages and let you gracefully shut down your Mac in the case of longer ones. A UPS can also be used on your Wi-Fi system to prolong your Internet connection in case of a power failure. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Thu, 04 May 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/20UPS.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>20. Using a UPS</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>A simply battery system can protect your Mac from short power outages and let you gracefully shut down your Mac in the case of longer ones. A UPS can also be used on your Wi-Fi system to prolong your Internet connection in case of a power failure.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">21FindMyMac.mp4</guid>
<link>http://macmost.com</link>
<title>21. Find My Mac</title>
<itunes:subtitle>The Practical Guide to Mac Security: 21. Find My Mac</itunes:subtitle>
<description>
<![CDATA[ If your Mac is stolen you may be able to track it if you have enabled the Find My Mac feature. This will also let you remotely wipe your Mac in some cases. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Fri, 05 May 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/21FindMyMac.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>21. Find My Mac</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>If your Mac is stolen you may be able to track it if you have enabled the Find My Mac feature. This will also let you remotely wipe your Mac in some cases.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">22SuspiciousSharing.mp4</guid>
<link>http://macmost.com</link>
<title>22. Suspicious Sharing</title>
<itunes:subtitle>The Practical Guide to Mac Security: 22. Suspicious Sharing</itunes:subtitle>
<description>
<![CDATA[ Old-fashioned file sharing can still be useful at home or work, but it opens up a security vulnerability if you connect to a public network. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Sat, 06 May 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/22SuspiciousSharing.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>22. Suspicious Sharing</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>Old-fashioned file sharing can still be useful at home or work, but it opens up a security vulnerability if you connect to a public network.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">24WiFiPasswords.mp4</guid>
<link>http://macmost.com</link>
<title>23. WiFi Passwords</title>
<itunes:subtitle>The Practical Guide to Mac Security: 23. WiFi Passwords</itunes:subtitle>
<description>
<![CDATA[ You may not think it is important to set a Wi-Fi password in your home. But without one, the data being sent from your Mac and other devices may by unencrypted and easy for someone to snoop. You should set a password and also be wary of public Wi-Fi that does not require a password. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Sun, 07 May 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/24WiFiPasswords.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>23. WiFi Passwords</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>You may not think it is important to set a Wi-Fi password in your home. But without one, the data being sent from your Mac and other devices may by unencrypted and easy for someone to snoop. You should set a password and also be wary of public Wi-Fi that does not require a password.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">25PrivateBrowserWindows.mp4</guid>
<link>http://macmost.com</link>
<title>24. Private Browsing</title>
<itunes:subtitle>The Practical Guide to Mac Security: 24. Private Browsing</itunes:subtitle>
<description>
<![CDATA[ The Private Window feature in Safari is handy, but perhaps not for the reasons you think. It does not really provide any security or hide your browsing activity from your ISP or work IT department. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Mon, 08 May 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/25PrivateBrowserWindows.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>24. Private Browsing</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>The Private Window feature in Safari is handy, but perhaps not for the reasons you think. It does not really provide any security or hide your browsing activity from your ISP or work IT department.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

<item>
<guid isPermaLink="false">26Selling.mp4</guid>
<link>http://macmost.com</link>
<title>25. Selling Your Mac</title>
<itunes:subtitle>The Practical Guide to Mac Security: 25. Selling Your Mac</itunes:subtitle>
<description>
<![CDATA[ Before you sell or give away your Mac, you should log out of all of your accounts, wipe the hard drive and re-install the original operating system that came with your Mac. You can do this by booting in a special Internet Recovery mode. ]]>
</description>
<itunes:duration>0</itunes:duration>
<pubDate>Tue, 09 May 2017 00:00:00 +0000</pubDate>
<enclosure length="0" type="video/mp4" url="https://archive.org/download/MacMostPracticalGuideToMacSecurity/26Selling.mp4"/>
<media:player url="http://macmost.com/"/>
<media:title>25. Selling Your Mac</media:title>

<itunes:explicit>clean</itunes:explicit>
<itunes:author>MacMost</itunes:author>
<author>questions@macmost.com (MacMost)</author><itunes:summary>Before you sell or give away your Mac, you should log out of all of your accounts, wipe the hard drive and re-install the original operating system that came with your Mac. You can do this by booting in a special Internet Recovery mode.</itunes:summary><itunes:keywords>mac,security,privacy,apple,macmost</itunes:keywords></item>

</channel>
</rss>