Skip to content

How to take a screenshot on a Mac

How to take a screenshot on a Mac 
 

If you are one of the millions of Mac users who need a quick, straightforward way to take screenshots, I’ve got you covered.

Taking a screenshot on a Mac is easier than ordering takeout, thanks to the different shortcuts offered.

With just a few taps, you can take a screenshot to share with coworkers, add to a blog post, or save a favorite image or photo.

If you’re not sure how to take a screenshot or don’t understand why your shortcuts aren’t working, read on.

I have an entire guide dedicated to helping you capture that perfect screenshot or recording.

Parallels lets you run Windows programs seamlessly on your Mac. Get your free trial! 

5 ways to take a screenshot on Mac

Unlocking the full potential of your Mac goes beyond knowing how to open a browser and finding your favorite apps.

Learning to capture and share what’s on your screen effectively can streamline your workflow, improve collaboration, and help you share your creativity.

Let’s look at several methods for capturing screenshots on your Mac like a pro.

1. Capture a portion of your screen

The simplest way to capture a screenshot is to use the Command-Shift-4 keyboard shortcut.

This method is like the snipping tool you’re likely familiar with from using PCs.

Here is how:

  • Press Command-Shift-4 to change a pointer to a crosshair.
  • Select the area of a screen you want to capture by dragging the cursor.

After releasing the mouse button, the screenshot appears as a PNG image on your desktop.

You can then upload it to a blog or social media site or send it as an email attachment.

2. Capture the entire visible portion of the screen in a screenshot

This shortcut captures your entire screen, making it useful when you’re trying to show a colleague what’s happening on your screen or share an error with IT support.

Other tabs and chat boxes will be visible in the screenshot, so close out anything that you don’t intend to share.

Here’s how:

  • Press Command-Shift-3 to take a screenshot of the entire screen.
  • The screenshot will appear as a PNG image on your desktop, which you can then upload to Slack, add to an email, etc.

3. Take a screenshot of an active page

Sometimes, you need to take a screenshot of a dynamic feature, such as a menu bar with an item selected.

Active screenshots are great for creating tutorials, documenting interactions with software or websites, or similar dynamic processes.

To copy a screenshot of an active page, follow these steps:

  • Press Command-Shift-4 to change a pointer to a crosshair.
  • Tap on the spacebar on your keyboard. The cursor will change to a camera.
  • Select the active application window you want to capture by moving your cursor and highlighting the active window.
  • Click the mouse button on the window you want to capture. The screenshot will appear as a PNG image on your desktop.

Alternatively, to paste the screenshot, navigate to the location you’d like to share the image (Slack, Teams, etc.) and press Command-V.

4. Create an adjustable screenshot

This shortcut allows you to take a much more customized screenshot by selecting the size or window to screenshot and accessing the recording button.

Here’s how:

  • Press Command-Shift-5. A clip box will appear on your screen.
  • Drag the corners of the box to select the sections you want to screenshot.
  • Use the options at the bottom to adjust your screenshot. Select the entire screen, choose a different window, or use the recording button to take a video of all or a portion of your screen.
  • The screenshot or recording file will appear on your desktop.

5. Take a screenshot of the Touch Bar  (if available)

In some cases, you may need to take a screenshot of the items in your Touch Bar.

While this is a less common application, it can be helpful if you are working with IT support or writing a detailed tutorial.

To take a screenshot of the Touch Bar, open System Preferences and select Keyboard.

Click on “Customize Control Strip” and drag the Screenshot button to your Touch Bar.

Use this button to take screenshots as needed.

What happens if the capture area tool isn’t working on macOS?

In some cases, the shortcuts above may not work. You press the buttons or make the clicks, but nothing happens.

There are a few reasons why this might happen — and it’s usually related to your settings.

Parallels Desktop users, for example, may find that updating their MacOS makes tools that worked previously stop working.

In this case, you’ll need to give Parallels Toolbox permission to record the screen. Here’s a walk-through on how to do this. 

If you are a Mac user, the issue might be your system settings. Start by navigating to the Apple menu, then select:

System setting > Keyboard > Keyboard shortcuts > Screenshots 

Make sure all the items on the list are checked off. Try the shortcuts above again, and you’ll likely find they work.

How do you take a screenshot on a Mac without pressing buttons?

What if you don’t have a keyboard or your keyboard isn’t working? Good news —you can still take a screenshot using just your mouse!

Here’s how:

  • Select the Finder icon in your Dock (that’s the little blue and gray face).
  • Choose “Applications,” then find the “Utilities” folder.
  • Within the Utilities folder, you’ll see a camera icon labeled “Screenshot.” Double click.
  • The tool will open, allowing you to use the same options as Command-Shift-5, including adjusting your screenshot, taking a recording, and other actions.

Another option is to add a screenshot tool to your Touch Bar:

  • Navigate to System Preferences > Keyboard > Customize Control Strip.
  • Drag and drop the screenshot button to the Touch Bar.

How do you take a Mac screenshot using the keyboard?

The simplest way to take a screenshot on a Mac is to use the shortcut Command-Shift-3. This method allows you to adjust the size and shape of the screenshot.

Command-Shift-5 provides the most options, as it allows you to record, choose a different window, and select the size of the screen grab.

Alternatively, you can add the screenshot button to your Touch Bar, as described in the section above.

Save your screenshots directly to your clipboard on Mac

Want to save your screenshots to your clipboard to copy and paste elsewhere? You can save your screenshots directly to your clipboard instead of saving them as files on your desktop.

This is useful if you want to paste the screenshot into another application, such as an email, document, or image editor.

Here’s how to accomplish that:

  • To capture your entire screen and save it to your clipboard, press Control + Shift + Command (⌘) + 3.
  • For a selected portion, press Control + Shift + Command (⌘) + 4, then select the desired area.
  • For a specific window, press Control + Shift + Command (⌘) + 4, then press the Spacebar, then click the window.

Then you can paste the screenshot into your document or image editor using Command (⌘) + V.

Streamline your day by mastering the Mac screenshot

The screenshot option on Macs is a small but mighty tool. It can be used for sharing funny memes, improving collaboration at work, or sharing moments of creativity. However, you use it, knowing these shortcuts and screenshot tricks will help you work faster and more efficiently.

Supercharge your workflow with Parallels Toolbox for Windows and Mac. Use it to optimize your PC, reclaim disk space, and much more. Try it free for 14 days.  

 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Parallels 
Parallels® is a global leader in cross-platform solutions, enabling businesses and individuals to access and use the applications and files they need on any device or operating system. Parallels helps customers leverage the best technology available, whether it’s Windows, Linux, macOS, iOS, Android or the cloud.

PINs vs. Passwords: Which is more secure?

Are you team passwords or team PINs?

Passwords and secret codes have been used for thousands of years to keep information safe and private. In today’s digital world, we continue to rely on these methods to protect our data and online accounts. Most people use either passwords or PINs to secure their digital assets, and there has been an ongoing debate about which is more secure.

Some users find PINs secure enough and appreciate that they’re short and easy to remember. Password advocates argue that PINs, usually just a few digits long, offer far fewer combinations, making them more vulnerable to cyber attacks. There are also those who suggest that both PINs and passwords serve the same purpose of authentication and can be equally safe, as well as people who doubt the security of either approach.

Let’s explore this topic to see whether PINs or passwords offer greater security.

What is a PIN?

To understand PINs and passwords, let’s start with the basics. PIN stands for “Personal Identification Number,” a numerical code used to verify a user’s identity. PINs were first introduced in the 1960s along with cash machines (ATMs), and to this day, a typical PIN consists of four to eight digits, providing a relatively simple way to authenticate a person.

The simplicity of a PIN has its pros and cons. Because it’s usually short and made up of numbers, a PIN is easy to remember. However, if a PIN has only four digits, there are just 10,000 possible combinations. While that might sound like plenty, in today’s world of advanced technology, it’s not as secure as you’d think. It’s actually super easy for powerful computers to crack these PINs.

PINs are usually entered manually on touchscreen devices, which makes automated brute-force attacks less effective. Additionally, most systems that use PINs have a limit on the number of failed attempts allowed before locking the user out. For instance, if a device only allows six attempts to enter a PIN, there is a 0.06% chance that someone could crack a four-digit PIN simply by guessing. However, if your PIN is as common as ‘0000’ or ‘1234,’ the chances of getting hacked go up significantly.

What is a password?

A password is a secret word, phrase, or string of characters used to confirm someone’s identity or to gain access to a system, application, or device. It can be just about anything—a word, a set of numbers, or a mix of both. To make it secure, a strong password should combine numbers, uppercase and lowercase letters, and special characters and be at least 12 characters long.

Like PINs, digital passwords first appeared in the early 1960s and have been in use ever since. If you take a 10-character password, it can have a massive 59,873,693,923,837,900,000 possible variations. This might make you think you already know which of the two options is more secure, but things aren’t as straightforward as they seem.

Passwords are often used for online accounts or devices that usually don’t have a limit on failed login attempts. This makes them vulnerable to automated brute-force attacks, where a program systematically tries all possible combinations to crack the password. Not every brute-force attack is practical, though, because it could take years to break into a strong password. However, hacking technologies are evolving quickly, making these attacks more efficient and raising the odds of success.

Password vs. PIN: Which is safer?

It’s time to answer the big question: Which is safer, passwords or PINs? Technically, passwords are more secure if they’re strong enough. Even with the latest hacking software, it could take hundreds of years to crack a complex 12-character password. Using a 16-character password might extend that time to thousands of years. So, if you’re looking to protect your device or online account, using a strong password is a better choice than a PIN.

This doesn’t necessarily mean you should stop using PINs altogether. PINs are a practical and secure method to unlock your touchscreen device, for example. Using them is quick and often has a limited number of attempts before locking, adding an extra layer of protection.

However, if you really care about the security of your online accounts and digital assets, consider using both passwords and PINs generated by a multi-factor authentication (MFA) tool. In this case, after you enter your account’s password, the MFA tool prompts you with a unique PIN that you must enter to verify your access. This extra layer of security ensures that even if someone gets hold of your password, they won’t be able to access your account without the additional verification step.

How to create a secure PIN

If you are to create a PIN for your touchscreen device or credit card, make sure it is as secure as possible. Here are some guidelines on how to achieve that:

  1. Stay away from simple, easily guessable PINs like “1234,” “0000,” “1111,” “123456,” or “9876.”

  2. Don’t use personal information such as birthdates, anniversaries, phone numbers, or other details that someone could easily guess.

  3. Don’t write down your PIN or store it in an insecure manner (like a note on your phone)—just memorize it.

  4. If possible, create a PIN that is longer than four digits.

How to improve your password security

The first thing you should do to improve your password security is to ensure that all your passwords are strong and stored securely. Since we’ve already stressed the importance of unique and complex passwords, let’s now shift our attention to the storage part.

Many people still keep their passwords in their notebooks or notes on their phones, not realizing how insecure that is. But the reasoning behind this habit isn’t too surprising. After all, memorizing all your passwords isn’t exactly easy. According to our study, the average person juggles a whopping 87 passwords just for work. For most of us, this is way too many to even try to remember. So, how do you address this problem? You use a reliable password manager like NordPass.

NordPass provides an encrypted virtual space where you can safely store and manage all your passwords, passkeys, credit card details, and other sensitive information. It is also lightning-fast at generating strong passwords, allows you to securely share credentials with the people you trust, and even checks if your login data has been compromised in a breach. So, if you’re looking for a way to improve your password security, NordPass is your go-to solution.

Try passwordless authentication

It might come as news to some of you that nowadays, you can skip the whole dilemma of choosing between PINs or passwords altogether and opt for a far more secure solution. This is because there is a new authentication method that lets you securely log in to websites and apps without entering a password or a PIN—and it’s called “passkeys”.

A passkey consists of two distinct cryptography keys: a public key, which is registered with the website or app, and a private key, which remains stored locally on your device and never leaves it. During login, these keys are matched up, granting you access to the website.

As already mentioned, NordPass lets you store passkeys, ensuring fast and secure access to your online accounts. This allows you to utilize biometrics, such as fingerprint or facial recognition, for authentication, making the whole process much easier and safer. Therefore, if you’re truly committed to improving the security of your online accounts, we suggest you go passwordless with NordPass and switch to passkeys on accounts and applications.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

PAM vs Password Manager: Which is Best?

As businesses of all sizes face increasing cyber threats, password protection and identity management are vital components of a robust cybersecurity strategy. In today’s rapidly evolving digital landscape, it’s crucial to understand the tools available to protect your vulnerable data. 

49% of data breaches include stolen credentials, according to Verizon’s 2023 Data Breach Investigations Report.

One common dilemma many businesses face is understanding the distinction between Privileged Access Management (PAM) and a password manager. While both have roles in securing access to systems and data, they serve vastly different purposes. 

In this blog post, we’ll detail the differences between privileged access management software and password management software, emphasizing that while a password vault can be a valuable tool, PAM is the superior choice for IT and tech teams.

What is Privileged Access Management (PAM)?

Privileged Access Management (PAM) is a comprehensive cybersecurity solution that offers total control and security when it comes to managing access to critical systems and sensitive data. It goes beyond the scope of the best password management tools, providing organizations with the capability to manage not only passwords but also a myriad of other privileged accounts and credentials. Incorporating robust information security practices, PAM solutions ensure that sensitive information remains protected from unauthorized access.

The best PAM solutions cover the entire privileged access lifecycle: identity management, privileged access management, and auditing all activities carried out in the privileged session.

What is a password manager?

A password manager is a tool designed primarily for individual users to store and manage their login credentials. While it serves a valuable purpose for personal online security, it falls short when addressing the complex needs of IT and security teams. Password managers essentially act as digital vaults for storing passwords, offering convenience but lacking the comprehensive security features needed in today’s cyber threat landscape.

PAM Solution vs Password Manager

Now that you know what each solution does, let’s dive into the key differences that set PAM apart from traditional password managers:

1. An All-in-One Solution

Enterprise password managers may provide basic password storage capabilities but don’t include the broader spectrum of privileged accounts and sensitive assets that require protection. 

PAM solutions, on the other hand, are designed to monitor, manage, and control access to all privileged accounts and credentials, including H2M and M2M. This comprehensive approach includes approval workflows, robust job engines for password rotation and discovery, and session management with recording. 

With PAM, organizations can securely manage accounts, implement the principle of least privilege, tighten permissions controls, and provide secure remote access, all within a single, integrated solution.

2. Accounts for Human Factors

Aside from external threats, malicious insiders and unsafe employee behaviors pose a significant risk to privileged account security. Password managers often rely on individual users to set up, maintain, and use the application diligently. 

In contrast, enterprise PAM solutions transfer the responsibility to the IT team, which assumes the task of setting up and maintaining corporate password security. This approach mitigates the risk associated with user negligence and ensures that password security remains a top priority.

3. Achieves Zero Trust

The Zero Trust security model, grounded in the principle of “never trust, always verify,” is a modern approach to cybersecurity. Password managers lack the visibility and control required to adhere to Zero Trust principles, making it challenging to protect sensitive data and meet regulatory requirements.

Enterprise PAM solutions continuously discover and manage all privileged accounts and associated passwords throughout the organization. They provide centralized oversight, including session management and monitoring for privileged account behavior, meeting the high demands of the Zero Trust model.

4. Audits for Compliance

Compliance with industry regulations and audit requirements is essential for organizations across various industries. Password manager tools often lack crucial features like immutable audit logs, customizable reports, and session monitoring or recording.

In contrast, enterprise PAM solutions offer robust session recording capabilities, facilitating forensics and generating compliance reports that satisfy auditors’ strict requirements. PAM ensures that managers can monitor administrators’ access comprehensively, providing transparency and accountability.

Learn more: Privileged Access Management (PAM): A Complete Guide


5. Made for Scalability

While enterprise password managers may be an initial cost-effective option for privileged credential security, most organizations swiftly outgrow them. These tools lack advanced automation and reporting, rendering them inadequate as organizations expand.

PAM software is tailor-made for scalability, addressing the challenges posed by system sprawl and multiple disconnected technologies. PAM tools seamlessly integrate with essential IT tools, such as Security Information and Event Management (SIEM) solutions, streamlining security management and reporting.

So which is best: Privileged Access Management or a Password Manager?

While password managers offer convenience and personal online security, Privileged Access Management (PAM) stands out as the best choice for IT and tech teams seeking a comprehensive cybersecurity solution. PAM provides an all-encompassing approach, accounting for human error, adhering to the Zero Trust model, ensuring compliance and auditing, and offering scalability for organizations’ evolving needs. In an era where cyber threats continue to evolve, organizations must prioritize adopting robust PAM solutions to protect their critical assets effectively.

Remember, when it comes to safeguarding your organization from cyber threats, PAM is not just a choice; it’s a necessity.

Explore the best Privileged Access Management solutions with senhasegura and fortify your organization’s cybersecurity defenses.



 

Ready for more? Learn everything you need to know about Privileged Access Management in our PAM 101 eBook.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×