MBS Debug
Mac Business Solutions

Displaying items by tag: Article

One of the ways companies protect critical account information is by remembering the devices you use to log in as “trusted devices” or “authorized devices.” Those logins will usually have been protected by two-factor authentication or another mechanism that guarantees the device is being used by you, its owner. Subsequent logins from those devices may […]
Published in MBS Blog
We all make mistakes, which is why Undo exists. Immediately choose Edit > Undo or press Command-Z to undo your last change. Most Mac apps support multiple levels of Undo, so you can keep pressing Command-Z to revert change after change. However, suppose you delete a table in your Pages document, but 30 minutes and […]
Published in MBS Blog
Apple’s iCloud Keychain Password Management Is All Many People Need We constantly recommend using a password manager like 1Password, BitWarden, or Dashlane. But many people resist committing to yet another app or paying for yet another service. Isn’t Apple’s built-in iCloud Keychain password management good enough? The answer now is yes, thanks to two recent […]
Published in MBS Blog
In November 2023, Apple unveiled the M3 chip in new versions of the 24-inch iMac and MacBook Pro, causing speculation about when other Mac models would be updated to match. If you’ve been longing for a MacBook Air with an M3 chip, your wait is over. (And we expect Apple to update the Mac mini […]
Published in MBS Blog
You may be used to Mac apps using red underlines to mark misspelled words, but did you know that macOS has also long included a fully featured Dictionary app? It provides quick access to definitions and synonyms in the New Oxford American Dictionary and the Oxford American Writer’s Thesaurus, along with definitions of Apple-specific words […]
Published in MBS Blog
The ease of sending and receiving email makes it an attractive way to run scams like phishing attacks. One telltale mark of a phishing attack is the sender’s address not matching their purported domain; attacks that appear to come from legitimate email addresses are much more likely to fool the victim. You can protect your […]
Published in MBS Blog
Long ago, before macOS was as stable as it is today, Mac users restarted their Macs regularly. Back then, Macs couldn’t sleep, either, so it was common for users to shut down at the end of the day and start up the next morning, effectively restarting daily. With modern Macs using the barest trickle of […]
Published in MBS Blog
Although many of us think of Messages as an iPhone app, Apple’s platform integration lets you read and reply to conversations in Messages on other Apple devices, including the Mac and iPad. All your devices must have the correct settings to make this work reliably. We regularly hear from users who don’t see all their […]
Published in MBS Blog
We’re all accustomed to searching the Web generally in Safari by typing in the search field and pressing Return or tapping Go. Most of us are also familiar with the search suggestions that Safari shows below the search field as we type. But did you know that Safari has a feature that lets you use […]
Published in MBS Blog
How would you realize that one or more of your Internet accounts—email, social media, financial—have been hacked? (Some prefer the terms “compromised” or “breached”—you may hear them from support techs.) Unfortunately, there’s no telltale warning sign because “hacked” could mean any number of things. Here are some possible indications: People you trust report receiving email […]
Published in MBS Blog
Page 1 of 32