Skip to main content
Protect My Mac — FreeNo credit card required
CoreLock

Dashboard

Last scanned: 2 min ago

87Healthy

Health Score

CRITICALSecurity

Unsigned app running from ~/Downloads

Unknown binary without code signature detected

WARNINGPerformance

High CPU usage: node (47%)

Network secureNo suspicious connections
Guides5 min read

How to Secure Your Mac in Under 5 Minutes

Hassanain

# How to Secure Your Mac in Under 5 Minutes

Most people assume securing a Mac takes hours of research and deep technical knowledge. It doesn't. I always tell people: before you install any security tool, learn to use the settings already built into your Mac. Apple gives you solid security foundations -- you just have to turn them on.

The seven steps below take less than five minutes total. No terminal commands. No confusing jargon. Just open System Settings and follow along.

1. Enable FileVault (30 Seconds)

FileVault encrypts your entire startup disk. If someone steals your MacBook, they cannot read your files without your login password. Without FileVault, anyone with physical access can pull data off your drive.

How to enable it: Open System Settings > Privacy & Security > FileVault and click Turn On. Your Mac will generate a recovery key -- save it somewhere safe (not on the Mac itself). Encryption happens in the background while you keep working, so you won't notice any slowdown.

If FileVault is already on, you'll see a green indicator. Most newer Macs ship with it enabled by default, but it's worth double-checking. I've seen plenty of machines where it was never turned on.

2. Turn On the Firewall (15 Seconds)

The built-in macOS firewall blocks unwanted incoming network connections. It's surprisingly effective for something that takes two clicks to enable, yet Apple ships it turned off by default.

How to enable it: Go to System Settings > Network > Firewall and toggle it on. That's it. If you want extra protection, click Options and enable Stealth Mode, which makes your Mac invisible to network scans. This is especially important if you ever connect to public Wi-Fi at coffee shops, airports, or hotels.

3. Enable Automatic Updates (15 Seconds)

Security patches fix vulnerabilities that hackers actively exploit. Running an outdated version of macOS is one of the easiest ways to get compromised. The fix is simple: let your Mac update itself.

How to enable it: Open System Settings > General > Software Update. Click the info icon next to Automatic Updates and make sure all toggles are on -- especially Install Security Responses and system files. This ensures critical patches install immediately without waiting for a full macOS update.

Apple releases security-only updates between major versions. These are small, fast, and rarely require a restart. There's no good reason to skip them.

4. Review Your Login Items (60 Seconds)

Login items are apps that launch automatically when you start your Mac. Over time, software you've installed (or forgotten about) quietly adds itself to this list. Some of these could be adware, crypto miners, or apps with known vulnerabilities.

How to review them: Go to System Settings > General > Login Items. Look through both the Open at Login list and the Allow in the Background section below it. Remove anything you don't recognize or no longer use by selecting it and clicking the minus button.

If you're unsure what something is, search the name online before removing it. But as a rule of thumb: if you didn't intentionally put it there and you don't know what it does, remove it. You can always add it back. For a deeper dive into what each setting does, check out the full Mac security settings guide.

5. Check Privacy Permissions (90 Seconds)

This is the step most people skip, and it's arguably the most important one. macOS requires apps to request permission for sensitive capabilities like your camera, microphone, screen recording, and full disk access. But once you grant a permission, it stays granted forever -- even if you stop using the app.

How to check them: Open System Settings > Privacy & Security. Review each of these categories one by one:

  • Camera -- Which apps can see through your webcam? Remove any you don't actively use for video calls.
  • Microphone -- Same idea. If an app doesn't need to hear you, revoke access.
  • Screen Recording -- This one is critical. Apps with screen recording access can see everything on your display, including passwords you type.
  • Full Disk Access -- The most powerful permission. Apps here can read and write any file on your Mac.

Spend 90 seconds scanning each list. If you see an app you forgot you installed, or one you haven't opened in months, toggle it off. You can learn more about which apps typically request camera access and why in this breakdown of apps with camera access.

6. Set a Firmware/Recovery Password (30 Seconds)

On Intel Macs, a firmware password prevents anyone from booting your Mac from an external drive or resetting it without your authorization. On Apple Silicon Macs, the equivalent protection is built into the Startup Security Utility.

For Apple Silicon Macs: Shut down your Mac completely. Press and hold the power button until you see "Loading startup options." Click Options, then go to Utilities > Startup Security Utility. Make sure Full Security is selected and that you have a recovery password set.

For Intel Macs: Restart and hold Command + R to enter Recovery Mode. Go to Utilities > Startup Security Utility and set a firmware password.

This step is often overlooked, but it closes a real attack vector. Without it, someone with physical access to your Mac can boot it from a USB drive and bypass your login entirely.

7. Run a Quick Security Scan (60 Seconds)

You've locked down the settings. Now it's worth checking whether anything suspicious is already running on your system. macOS doesn't ship with a built-in security scanner, so this is where a lightweight tool helps.

CoreLock scans your Mac's running processes, network connections, and permission grants in about 60 seconds. It flags anything unusual -- like an app quietly accessing your camera in the background or a process making connections to a known malicious server. It's designed for exactly this kind of quick check: no subscriptions, no bloatware, just a clear picture of what's happening on your machine.

Even if you don't use CoreLock, I'd recommend opening Activity Monitor (search for it in Spotlight) and scanning for processes you don't recognize. Sort by CPU or Network usage and see if anything stands out. If you want a more thorough approach to Mac protection beyond these quick steps, I wrote a comprehensive guide to protecting your Mac that covers everything from threat models to advanced hardening.

You're Done

Seven steps. Under five minutes. Your Mac is now significantly more secure than it was when you started reading this.

Here's what you just accomplished:

  • Your disk is encrypted (FileVault)
  • Unwanted network connections are blocked (Firewall)
  • Security patches install automatically (Software Update)
  • No mystery apps are launching at startup (Login Items)
  • Only trusted apps have sensitive permissions (Privacy)
  • Your Mac can't be booted from external media without authorization (Firmware/Recovery)
  • You've verified nothing suspicious is already running (Security Scan)

None of these steps are complicated. The hard part is just knowing they exist. Now you do.

If you want to go deeper, the Mac security settings guide covers additional hardening steps, and the complete protection guide walks through everything from network security to threat modeling for non-technical users.

Stay safe out there.

Ready to try CoreLock?

Free to download. No credit card required.

Download CoreLock Free