“What man can make, man can break”.
I believe in the above phrase. It is one of the reasons why I don’t take online security lightly and do everything to not make it an easy and quick process for anyone to breach my online world. That is not to say it is impossible. Hackers with malicious intent have the resources and know-how.
Patience is all they need to go through the necessary steps of piercing through your walled garden, so by applying some best use practices, you can make it a little bit more of a difficult task for anyone trying to breach you, and hopefully buy yourself a little time – which is one of the single most important factors between a hacker and your personal stuff online.
GigaOm’s Geoffrey Goetz wrote a very informative and helpful guide on best practices to securing your Mac and iOS devices. I Highly recommend you read and apply these practices where needed.