Are Macs sensitive to Malware and Viruses? - Business IT Plus Ltd

Do Macs need antivirus?

Hello, fellow Mac user.

If you’re reading this, then you are looking for the definitive answer to whether or not you need a third party antivirus application installed on your Mac. The short and sweet answer is “yes.” If you want the long answer, it too is “yes,” but with complexities sprinkled in.

Let’s start with the funny Mac vs. PC commercials that took over our televisions in 2006. Watching these commercials, you may have heard that Macs are impervious to viruses, which is simply not true. In the commercial that deals with viruses, the PC actor states that there were 114,000 known viruses for PCs, while the Mac (Justin Long) said, “PCs, but not Macs.” While this is true, it is slightly misleading because there are 30 pieces of malware [1] as of June 2015 for your beautiful Macintosh. As you can see the chasm is rather vast between these numbers, and can lead one to believe that antivirus on your Mac is a moot point, but don’t let the small number fool you. It is just as easy to download a malicious application to your Mac from a website, as it is on a Windows system. To be brief, computers, in general, are susceptible to malware because of you, the human element.

In fact, we humans help malware along because most of us have a tendency to just quickly click the “Yes” button when we are trying to install a program or make a popup go away. This trend is ideal for nefarious characters lurking on the net, but sorry for the rest of us because grandma’s infected text document is now destroying our computers. That said, viruses are not the only pieces of bad code that you should concern yourself with. Now, before you throw on your deerstalker hat (that slightly unfashionable, double-billed cap that Sherlock wears) and start inspecting files on your Mac, you should know a few things about malware. It is crucial to be at least familiar with these terms: malware, viruses, Trojan horses, exploit, worm, spyware, spam, and Botnet. Since each definition would take up more space in this document than you most likely would care to read, I will leave it to the security gurus at Intego to give you the exact definitions;

Link to the article by Justin Pierce: