Want to Password-Protect a PDF? Follow These Best Practices

Want to Password-Protect a PDF? Follow These Best Practices

We periodically field questions about password-protecting a PDF to prevent the wrong people from reading it. Lawyers want to ensure that drafts of legal documents don’t fall into the wrong hands, financial advisers want to keep confidential financial information private, and authors want to prevent their writing from being shared broadly on the Internet. Others…

Faster Copying of Two-Factor Authentication Codes from Messages

Faster Copying of Two-Factor Authentication Codes from Messages

One welcome feature of Safari is its automatic detection and auto-filling of SMS-based two-factor authentication codes you receive in Messages. It allows you to complete your login quickly, without having to retrieve the code from Messages. But what if you use a different Web browser, like Google Chrome, Firefox, Brave, or Arc? Apple doesn’t allow…

When Should You Upgrade to macOS 14 Sonoma, iOS 17, iPadOS 17, watchOS 10, and tvOS 17?

When Should You Upgrade to macOS 14 Sonoma, iOS 17, iPadOS 17, watchOS 10, and tvOS 17?

September is upon us, so Apple will soon start releasing major upgrades for all its operating systems. Note that we say “start.” Apple will undoubtedly release iOS 17 and watchOS 10 alongside new iPhone and Apple Watch models in mid-September. The company hasn’t said when it will release iPadOS 17, although it’s likely to accompany…

What Should You Do about an Authentication Code You DIDN’T Request?

What Should You Do about an Authentication Code You DIDN’T Request?

We strongly encourage using two-factor authentication (2FA) or two-step verification (2SV) with online accounts whenever possible. The details vary slightly, but with either one, after you enter your password, you must enter an authentication code to complete the login. Although it’s always best to get such codes from an authentication app like 1Password (which enters…

With Storms Increasing, Protect Your Tech Gear from Damaging Power Fluctuations

With Storms Increasing, Protect Your Tech Gear from Damaging Power Fluctuations

It has been a tough year for extreme weather events. While the connection between weather and technology may seem tenuous, heat waves, high winds, and lightning strikes can play havoc with all sorts of powered and networked electronic devices. Anything that causes power fluctuations—spikes, surges, sags, brownouts, and blackouts—can hurt your tech gear. Protecting your…