I would like to suggest the following approach to get you started.
1) Understand your business environment and IT technical infrastructure - IN this case your Mac
2) Understand the current vulnerabilities in your business environment and IT infrastructure
3) Understand the threats that exploit the identified vulnerabilities and could potentially interrupt your business processes ( through IT technology )
4) Identify the likelihood of an identified threat exploiting your vulnerabilities - use statistics from insurance companies and cyber security firms ( loads available )
5) Identify any compensating controls you have already in place to reduce the likelihood of an exploit AND the impact of the threat should it materialise.
6) Re- assess the likelihood taking into account the compensating controls.
7) Assign a priority to the identified risk and propose mitigating actions ( accept the risk, reduce likelihood, reduce impact, eliminate the risk ( this may be the same as stop doing business completely ))
To get your brain started .....
I am running my complete business on a 7 year old Mac ( never failed me before ) running 10.9.1 using Word processing and Spreadsheets, E-mail and Internet browsing.
That is all the technical infrastructure I have available.
Vulnerabilities ?
Threats ?
Likelihood ?
Risk ?
As a hint ..... my data means everything to me. No data, no revenue.
;D
Cheers ... McBie