Unfortunately as virus/malware etc continue to advance, a single AV solution isn't going to be able to 100% protect you.
I've taken the following approach which does help me. It may be useful (or not):
- Use a decent AV. I use Bitdefender; it seems to stack up well against competitors, or at least it did when I compared it in July. This gives a basic level of antivirus security.
- Use an inbound network level firewall (pf or ufw in MacOS work fine, or the MacOS gui firewall whatever that uses under the skin). This helps in protecting the system from network attacks.
- Use an outbound application level firewall (such as Little Snitch or Lulu) and block all applications from outbound connections unless manually added to allow rules. This helps stop any unknown application from contacting external entities such as botnets or malware hosts and updating/sharing information.
- Dont disable SIP or Gatekeeper or the other inbuilt protection systems that Apple provide unless you really have to. I see countless threads on disabling x to get an application to run, that is simply asking for trouble unless you have a specific need to do so.
- Check all downloaded software for vendor MD5 hashes/security hashes. It helps ensure that what youve downloaded really is what you meant to download.
- Scan downloads with Virustotal.com. It's not foolproof but scanning things with multiple AV engines is better than relying on one.
- Use an adblocker such as Adguard, Wipr, Ublock Origin etc and enable the security/privacy blocklists. There are a lot of websites now which can execute malicious code on the local machine. This helps block those.
- Consider using a third party software authorisation system such as Googles opensource Santa, it adds extra protection against offensive software.
- Consider using a behaviour analytics based AV solution such as Elastic Endpoint Security. They can be expensive but in a corporate environment, the cost could be justified.
- Take a backup of critical data regularly to an offline store such as USB drive, Cloud etc. In the worst case where all of the above fail; you'll want to make sure that even if the local system is trashed, you dont loose information you need.
So in short, its a pain in the **** but offensive malicious tooling is so rife now, it's probably necessary...