ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Protect Your Retina Macbook Pro - MacBook Air From Theft: Part 2 - Data Protection & Tracing A Stolen Computer

Updated on December 30, 2015

In case you missed the first part, which looked into the hardware option for protecting your Retina Macbook Pro or MacBook Air, you can still read it here.

Come back to continue with this part.

Data protection

You can do only so much to protect your MacBook from being stolen.

So, it is a good idea to prepare for the case it happens, despite all the measures you have taken to prevent it.
But even if nobody wants to steal your hardware, your content on your computer could be just as interesting for somebody. And I am sure you don’t want to see a stranger prying on your documents, bank data, photos and so on.

Apple knows that and offers within OS X a broad range of features to protect your data.

Unfortunately a lot of people are lazy and don’t want to enter passwords, so the default setting is oriented to convenience.
In order to make our Macintosh's as safe as possible, we need to activate these features, which Apple provides luckily at no extra costs.

You can find everything you need in "System Preferences”.

User account

First of all you need to setup your user account correctly. Beside the obvious - a strong password - you should consider the following.

System Preferences
System Preferences | Source

1. Click on “Users & Groups”


Deactivate "Automatic Login" & activate the Guest account
Deactivate "Automatic Login" & activate the Guest account | Source

2. Make sure that the “Automatic login” is switched to “Off” (see arrow 1).

If you let this setting on, a potential data thief needs just to start the computer and gets access to everything on it immediately, without even knowing your password. Even a strong password is of no use in this case.

Bonus tip: There is always a guest account pre-set by Apple. But by default it is not active. In preparation for our final step of “Tracing a stolen MacBook”, activate the guest user account (see arrow 2). I’ll explain what for in a few minutes.

Security & Privacy
Security & Privacy | Source

3. Next, go into "Security & Privacy"

Require password immediately
Require password immediately | Source

4. Click on the tab “General” and activate the first checkbox (see arrow 1) and choose “immediately” from the dropdown box (see arrow 2).

This way your computer will ask for the password, even if you have been away for just a few seconds, which could be enough time for a bad guy to get to your computer, while you fetch another coffee or talk to a colleague next door.

Turn FileVault On
Turn FileVault On | Source

5. Now click on the tab “FileVault” and turn it on.

This will encrypt your entire disk.
Even if a thief would disassemble your computer and re-install the disk in another computer, your data will be safe, as it is not accessible without the password.

But be aware, if you ever loose your password or the recovery key, even you would loose access to your data. Therefor make absolutely sure to safe the password in a secure place!

DO make Backups - use Time Machine
DO make Backups - use Time Machine | Source

6. Backup
I know nobody likes Backups!

They are a pain in the …. But please consider to use the free backup solution from Apple called "Time Machine”.
It is extremely easy to activate with literally just a click on a button and from there on it will automatically save your data as soon as the backup disk is connected.

In case of theft of your MacBook you have a Backup at home.
If this day ever come, you’ll be so happy you did this one click, believe me!

7. Cloud services

Another option is to consider to save the most important files in a cloud service as - the likely most known one:

Dropbox (Basic accounts are for free. Here with an extra 500MB).

Again, if somebody ever steals your notebook, you’ll be so relieved to know you still have access to your most precious data.

Use iCloud with your Apple ID
Use iCloud with your Apple ID | Source

8. Setup “Find my Mac"
Now we come to preparations for the worst case scenario, when your MacBook actually gets stolen.

(I am assuming that you already setup your Apple ID.)

Click on “iCloud” (see arrow).

Activate "Find my Mac"
Activate "Find my Mac" | Source

9. Scroll down in the list and activate the checkbox “Find my Mac”.

That’s all there is to do.

iCloud access from a browser
iCloud access from a browser | Source

Tracing a stolen MacBook

Now we can checkout, how it works, when your precious MacBook has actually been stolen.

  1. Open a browser on any computer - it doesn’t matter whether it is a Mac or a PC.
  2. Enter the URL: http://www.icoud.com
  3. Enter your Apple ID and password

Find your Mac with "Find my iPhone"  :-)
Find your Mac with "Find my iPhone" :-) | Source

4. Click on “Find my iPhone”

I know, you are looking for your MacBook and maybe even don’t have an iPhone, but you will find your Mac there as well.

Infos & remote actions for your iDevice
Infos & remote actions for your iDevice | Source

You got two information and three options here.


  • The location of your MacBook and how long ago the last active usage was. That is - by the way - why you should activate the guest account. This way your thief will actively use the computer - as the guest account has no password - giving your Mac the possibility to send current location data, telling you where it is taken hostage.

  • You will also see the current status of it’s battery (arrow 3), so you know for how much longer it will be able to send it's GPS location data.


But you have also some options to become active.

  • For one, you can lock your MacBook remotely (arrow 1), so that nobody can’t access it anymore without knowing the password.
  • If you are afraid that you will not get your laptop back or the data on it is so sensible (and providing you have made a backup before) you can delete the entire disk remotely (arrow 2)!
  • The last button is not so much for a case of theft, as much more useful if you do not remember where you placed your notebook.
    Click the “Play Sound” Button and the MacBook will play a very loud sound, so you can follow the lovely voice of your Mac to find it (maybe under a pile of folders or in dirty clothes).

Third party services

The above features are all part of the standard OS X and come without extra charges from Apple. They cover already quite a large range of functions to protect your data and help you finding your Mac in case of theft.

Nevertheless there are services offered by third parties, that go beyond these functions.

I would like to give you a quick overview, what’s out there and go a little deeper in what I opted for.

 
Hidden
Undercover
Prey
iSight camera pictures
X
X
X
Screenshots
X
X
X
Track location
X
X
X
Keylogging
X
X
-
External IP address
-
X
X
Send message
-
-
X
Sound alarm
-
-
X
Lock Device
-
-
X
Price
$15/year
$49 one-time fee
Free (basic account)

Basically there are three popular services that cover extended functions that might help you finding the thief of your Macbook.

All three of these businesses offer the following extended feature set:

  • iSight camera
    The Buildin iSight camera takes periodically pictures of whatever is in front of it. In the case of theft, it is most likely our thief enjoying your Mac. Smile thief, you are on camera! :-) These picture helps the authorities to find that bad guy, maybe he is even already known to them.

  • Screenshots
    Similar to the camera feature, every few minutes a screenshot is taken, which will show sooner or later, the identity of our “new friend”. He/She will likely use Email, Facebook, Twitter, Skype or so on and use his/her accounts for that.

  • Location tracking
    That’s basically the same information as Apple’s “Find my Mac” features. But these services are also meant for Non-Apple users, so it’s a good thing to have it.

Hidden

Hidden does one more thing, though. It logs the keyboard.

This way you might get even passwords from the thief, which gives you even more opportunities to get hold of him/her.

Hidden understand itself literally as a service and charges a monthly fee.
They consider that fee so low that they actually charge you annually. The more computers you sign up, the cheaper it gets for each of them. If you have a large amount of computers to protect, this might a service for you to consider.

Undercover

Undercover covers the same features as Hidden and adds again one more: the external IP address.

The company behind it follows more a licence model, so you need to buy a licence for each computer. It starts at $49 one-time fee for a single computer and gets cheaper the more you buy.

Prey

Prey is an open source project.

Therefor the basic account is for free!

It covers the same features as the others - besides key logging - and adds

  • “Send message”,
  • “Lock Device” and
  • “Sound alarm”.

The latter two are - again - known from Apple, but “Send Message” can be useful, if you think your MacBook is not stolen, but lost. Then there is a chance that there is an honest finder, reading your message, where to return the notebook.

Prey in use

It doesn’t take a genius to guess that I opted for Prey.

For me the extra information from the iSight camera, Screenshots and external IP address are very useful and come in case of Prey for free.

Once you sign up with Prey, you download and install a client app. Which runs invisible in the background (you can’t even see it in the task manager of your Mac) waiting for you to activate it.

It won’t send any data to Prey’s servers before!

For the purpose of showing you what you get, when the worst case scenario actually happens, I pretended to have my MacBook stolen.

Prey's main screen
Prey's main screen | Source

The screenshot above showns you the overview screen of Prey after you logged in.

Very similar to Apple’s “Find my Mac” you see a map with the last known location of your MacBook and a timestamp when this was reported.

In the lower left corner you will find three button for the before mentioned functions “Sound alarm”, “Send message” and “Lock device”.

Once you “reported” your device as stolen, a signal will be send to your Mac and it will start collecting data and sending a complete report every 5 minutes. That is the fast setting within the free account.


Below you can see the details of such a report.

Prey's missing device report 1/3
Prey's missing device report 1/3 | Source

Beside Device and owner name, there is a date for “missing since” and this particular report and a pin on the map, where it was at the time of this report.

Prey's missing device report 2/3
Prey's missing device report 2/3 | Source

When you scroll down in the report, you will see the Photo taken by the iSight camera and the screenshot and a list of all Wireless networks within reach of the Mac at the time of the report.

The information about signal strength are particular helpful for the police as it allows them to triangulate the exact position very accurate.

Prey's missing device report 3/3
Prey's missing device report 3/3 | Source

Last but not least the report ends with the IP addresses from the gateway that was used at the time and the private and public address.

Verdict

If you follow all these advices and set your MacBook up accordingly, you only have to get the Kensington Lock Adapter. Everything else is for free.

It will decrease the likelihood of your notebook stolen in the first place, increase the safety of your data and enable yourself and the police to retrieve both if the worst happens to you.


So, there is no excuse!


If you know any other service or tools that could help in this matter, I would love to see them in the comments below.

© 2014 TheAndy

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)