contact us

Use the form on the right to contact us.

 


Naperville, IL 60565
USA

630-639-7372

iPhone-XS-photo.jpg

Blog

How Often Should Macs Be Replaced?

Rowena

How Often Should Macs Be Replaced?

It’s a question as old as the personal computer. When should you replace your current Mac with a new model that’s faster and more capable? If money were no object, the answer would be easy—whenever you feel like it. For the rest of us, and particularly for organizations with multiple Macs and limited budgets, the question is harder to answer. But answer it we must because most of us can’t do our jobs without a Mac.

Let’s first look at some of the things that might encourage you to upgrade:

●     Performance and resale value: Many companies and large organizations swap out their Macs every 3 to 5 years. That’s considered the sweet spot where performance starts to decline, but resale value remains relatively high. Plus, Macs of that age start to have more problems that may require repair, resulting in lost productivity due to downtime.

●     Hardware limitations: At some point, you might feel your Mac is too slow—you’re seeing the spinning beachball frequently, or tasks are taking too long to complete. Another common concern crops up when you frequently have to shuffle files around to deal with low disk space on the startup drive. Or perhaps the battery life of a Mac laptop isn’t always sufficient for your needs—losing hours of productivity while on an airplane without seat power can be problematic.

●     macOS support: Although there’s no requirement that you run the latest version of macOS, being unable to upgrade is a hint that your Mac is getting older. Apple provides security updates for the two versions of macOS before the current one, so if your Mac can’t stay within that update circle, it will become more vulnerable to security exploits.

●     Physical damage: Macs are fairly durable, which often keeps them running even when the screen is cracked, a key sticks sometimes, or the case has been dented. The more damage your Mac has, the more likely it is that something else will go wrong, potentially at an inconvenient time.

●     General flakiness: It’s hard to quantify this, but an older Mac might start to feel slow, crash more often, or act weirdly. Sometimes those problems can be resolved by reinstalling macOS and apps from scratch, but that’s a lot of work and far from guaranteed.

●     Repair support: Apple guarantees that it will provide parts and service for all products within 5 years of when Apple last distributed them for sale. After that, Apple considers the products “vintage” for the next 2 years and will repair them subject to parts availability. Apple considers products pulled from the market more than 7 years before to be “obsolete” and won’t repair them apart from Mac laptops that are eligible for an additional battery-only repair period.

●     Shiny new Mac: Sometimes, it’s easy to delay a new Mac purchase because none of the Macs seem quite right. At other times, however, the exact Mac you want will be released just when you need it, making for an easy decision.

With those variables in mind, let us offer recommendations for different audiences:

●     Large-fleet organizations: It’s probably not worth the time to consider the needs of every employee in the context of what Mac they have. Instead, create a policy for replacing Macs on a 3- to-5-year schedule you can build into your annual budget. When it’s time to replace a particular Mac, swap it out for a comparable new model and send the old one to a resale organization.

●     Small-fleet organizations: For companies and nonprofits with a smaller number of Macs and a smaller budget, stick with the same 3- to 5-year schedule, but instead of automatically replacing each Mac as its number comes up, use it as an opportunity to evaluate the user’s needs and then either replace the Mac or set the next evaluation date. You may end up replacing Macs slightly less often, perhaps every 4 to 6 years. It’s also more likely that old Macs will be handed down rather than resold.

●     Creatives and freelancers: If you live and die by the work you can accomplish on your Mac, pay regular attention to whether your Mac is meeting your needs. You’ll probably start to notice issues in 3 to 5 years, and as soon as you do, start watching Apple’s releases to see what new Mac might be the best replacement. Also, consider saving a small amount per month with the idea that you’ll have enough to buy your new Mac about the time the old one noticeably starts to cut into your productivity.

●     Home users: As long as the Mac meets your needs and can run a version of macOS that’s receiving security updates, there’s no harm in continuing to use it for 8 years or more. However, if it starts to need hardware repairs and repeated consultant visits, that’s an indication that you should spend the money on a new Mac instead. Once it can no longer run a supported version of macOS, it’s time for a replacement.

●     Fixed budgets: We get it—sometimes there’s no money for a new Mac. Assuming you can accomplish what you need to do and avoid sketchy parts of the Internet, go ahead and run your current Mac into the ground. It could last 10 years or more. And when it comes time to replace it, there’s no shame in looking to the used market—all those Macs that others are replacing often come up for sale at bargain prices.

We hope this has given you some structure for thinking about replacing Macs, whether you’re worried about the Mac on your desk or all those in the entire design department. And, of course, feel free to contact us for help putting together a replacement schedule.

(Featured image by iStock.com/Prykhodov)


Social Media: When should you replace the Mac on your desk—or your organization’s Macs? There is no single answer, but we run down some variables that play into the decision and make recommendations for different use cases.


Protect Your iPhone Passcode by Using Face ID or Touch ID

Rowena

Protect Your iPhone Passcode by Using Face ID or Touch ID

This is troubling. Joanna Stern and Nicole Nguyen of the Wall Street Journal have published an article (paywalled) and accompanying video that describes attacks on hundreds of iPhone users in major cities throughout the United States. Some attacks involve drugging people in bars or even violence, but the most avoidable involve the thief or a confederate surreptitiously observing the iPhone user entering their passcode before snatching the iPhone and running.

However it happens, once the thief has a user’s iPhone and passcode, they change the user’s Apple ID password—which is shockingly easy for them to do. With the new password,  they disable Find My, making it impossible for the iPhone’s owner to erase it remotely. Then they use Apple Pay to buy things and access passwords stored in iCloud Keychain. They can even look in Photos for pictures of documents containing confidential information, such as credit cards and ID cards. After that, they may transfer money from bank accounts, apply for an Apple Card, and more, all while keeping the user locked out of their account. Of course, they’ll resell the iPhone too. (Apparently, Android users are susceptible to similar attacks, but Android phones have a lower resale value, so they aren’t being targeted as much.) Victims have reported thefts of tens of thousands of dollars, and many of them remain unable to access their Apple accounts.

We fervently hope Apple addresses this vulnerability in iOS 17, if not before. At a minimum, Apple should require users to enter their current Apple ID password before allowing it to be changed, much as the company requires at the Apple ID website. Plus, Apple would ideally do more to protect access to iCloud Keychain passwords from a passcode-wielding iPhone thief. (The closest we have now is a different Screen Time passcode, which can prevent account changes, but it blocks access to so many settings that most people will find it too annoying and turn it off.)

Although the chances of you falling prey to one of these attacks is vanishingly low, particularly if you don’t frequent urban bars or areas that suffer from snatch-and-run thefts, the consequences of a passcode theft are so severe that it’s worth taking steps to deter the malicious use of your passcode. With luck, you’re already doing many of these things, but if not, take some time to re-evaluate your broader security assumptions and behavior.

Pay More Attention to Your iPhone’s Physical Security While in Public

Most importantly, you don’t want to make it easy for a thief to grab your iPhone. Apart from a wrist strap, there’s no reliable way to prevent someone from snatching it from your hand. When you’re not actively using your iPhone, stash it in a secure pocket or purse instead of leaving it out on a bar or table. Many people are blasé about protecting their iPhones, so if you take more precautions, you’re less likely to have problems.

Always Use Face ID or Touch ID When Unlocking Your iPhone in Public

The easiest thing you can do to protect yourself from opportunistic attacks is to rely solely on Face ID or Touch ID when using your iPhone in public. If a thief sees you entering a passcode, you could become a target.

We know people who avoid Face ID or Touch ID based on some misguided belief that Apple controls their biometric information, but nothing could be further from the truth. Your fingerprint or facial information is stored solely on the device in the Secure Enclave, which is much more secure than passcode entry in nearly all circumstances.

We’ve also run across people for whom Face ID or Touch ID works poorly—if that’s you, conceal your passcode from anyone watching, just as you would when entering your PIN at an ATM.

Use a Strong Passcode

By default, iPhone passcodes are six digits. You can downgrade that security to four digits, but don’t—that’s asking for trouble. You can also upgrade the security to an alphanumeric passcode that can be as long as you like, but that’s overkill, in our opinion. Video would still capture you entering it, and if you’re focused on entering it accurately, you’re less likely to be aware of someone shoulder-surfing behind you.

That said, make sure your passcode isn’t trivially simple. Basic patterns like 333333 and 123456 are far more easily observed or even guessed. There’s no reason not to use a passcode that’s memorable but unguessable, such as your high school graduating class combined with your best friend’s birth month.

Don’t Share Your Passcode Beyond Trusted Family Members

Even those who don’t have motivated thieves targeting them need to be careful to protect their passcode. Our simple rule of thumb is that if you wouldn’t give someone complete access to your bank account, you shouldn’t give them your passcode. If extreme circumstances require you to trust a person outside that circle temporarily, reset the passcode to something they’ll remember—even 111111—and change it back as soon as they return your iPhone.

Switch from iCloud Keychain to a Third-Party Password Manager

Although Apple keeps improving iCloud Keychain’s interface and capabilities, having all your Internet passwords accessible to a thief who has your iPhone and passcode is unacceptable. Instead, we suggest you use a third-party password manager like 1Password or BitWarden (we no longer recommend LastPass). Even when a third-party password manager allows easier unlocking with Face ID or Touch ID (which both 1Password and BitWarden do), they fall back on their master password, not the device’s passcode. After you move your passwords from iCloud Keychain to another password manager, be sure to delete everything from iCloud Keychain.

Delete Photos Containing Identification Numbers

Many people take photos of their important documents as a backup in case the original is lost. That’s a good idea, but storing photos of your driver’s license, passport, Social Security card, credit cards, insurance card, and more in Photos leaves them vulnerable to a thief who has your iPhone and your passcode. With the information in those cards, the thief has a much better chance of impersonating you when opening credit cards, accessing financial accounts, and more. Instead, store those card photos—or at least the information on them—in your password manager.

A Security Wakeup Call

Again, although it’s very unlikely that you would fall prey to one of these attacks, we appreciated the encouragement to re-evaluate our security assumptions and behaviors, and we suggest you do the same.

(Featured image by iStock.com/AntonioGuillem)


Social Media: Prompted by a spate of attacks where an iPhone thief obtains the user’s passcode and uses it to lock the user out of their iCloud account, steal their money, and more, we suggest ways you can protect yourself.


Need to Back Up or Export a Messages Conversation? Try PDF or iMazing

Rowena

Need to Back Up or Export a Messages Conversation? Try PDF or iMazing

Occasionally, we hear from a client who needs to document a Messages conversation with timestamps, perhaps as part of a lawsuit. The only way to do that on an iPhone or iPad is to take a series of screenshots, but if you have a Mac, there are additional options. The easiest approach is to select the conversation, choose File > Print, and save it as a PDF. If you need a different format, try the macOS iMazing app, which can export all or selected messages from an iPhone backup in PDF, Excel, CSV, and text. It can also export attachments. The trial version lets you extract up to 25 items, and it’s only $39.99 if you have more significant iPhone exporting needs.

(Featured image by iStock.com/Morakot Kawinchan)