Authentication
Services and applications
Data
Privacy
Malware
Operations security
Guards! Guards!
Restrict which apps can run
System integration protection (SIP)
Use a VPN service
Secure browsers that protect your privacy
Use a secure messaging service
Use a secure email service
Use SSH tunnels
Use a firewall as a VPN fail-safe mechanism
Use alternative DNS servers
Use a Tor proxy
Change MAC address
Renew IP lease
Edit hosts file