- Creating a Standard account from the admin account
Mostly protects you from yourself, not from any threats. However, it is a good practice which may be effective against future threats.
- Turning on the firewall and in stealth mode (regardless of a router been used or not)
Unnecessary and may causes problems that are difficult to identify--especially for "newbies."
Enabled by default.
Enabled by default on notebooks during the startup manager. Unnecessary for most people, but certainly the "safest" until you forget the password.
- Allow Apps to download from App store 'only'
Unnecessary. Defaults are sufficient. And, this is essentially a duplicate since it is GateKeeper. It certainly would be simpler for a certified developer to go rogue, but it isn't out of the realm of possibility that they could do it through the App Store, too. Limiting software to the App Store may be "safer," but it also restricts you from using some very good software, or provides only crippled versions.
- Update Apps and other security features automatically in system preferences
This may be bad advice for someone who uses their Mac for their livelihood. Updates may cause third-party applications to stop working. In that environment, updates must be screened on a non-production system to ensure they do not interfere with workflow, and to find workarounds if necessary. A "safe" system that cannot be used for production of wealth isn't particularly useful.
- Simple Changes to make in Safari
The defaults are sufficient. You'd have to go into specifics on individual web plug-ins, but I suppose setting them all to Block would be "safest." Not sure how useful that would be. Ask would be fairly safe, but generally when asked a lot, people just get in the habit of allowing without reading.
As to specific Internet Plug-ins, not installing Flash Player would be "safest" and would have the additional benefit of making your browsing experience better.
- Explanation on what not to install on a Mac
- How to protect oneself from social engineering (email links ect)
In some cases, these are essentially the same as much of the things to not install are "sold" to people using social engineering.
You should install programs that help you get your work done and do the things you want to do with your computer.
You do not need to install things that "help" your computer such as things that purport to Optimize, Protect, Clean, Monitor, Purge, Uninstall, or otherwise Maintain your Mac. They are completely unnecessary on any computer, especially a Mac. They will always cause problems, not fix or prevent anything. There are some tools that can be used on a case-by-case basis which provide some of those functions when absolutely needed.
There is absolutely nothing that can "scan" your computer over the internet unless you install software that allows that functionality. So, any time you get something that claims you have an infection or problem on your computer is a scam.
No company will send you an email indicating necessity to update your account or it will be locked, deleted, or otherwise impaired. Even if you are absolutely certain the email came legitimately, never use the links in the email (short of a password reset link that you specifically requested). Just go directly to the company website and log in normally. If there is an actual problem, you can resolve it from there.
You will never get the Prince of Nairobi's treasure. Any offer that sounds too good to be true is false.
Social Engineering has worked long before the internet was even considered. It's called a "con." The con-men (and women) now have better access to their "marks." Many people have been bilked out of their life savings through social engineering, mostly preying on the elderly, but anyone is susceptible.
Other than that, this topic is too broad for a checklist. Here is some links (from the User Tips sections):
Viruses, Trojans, Malware - and other aspects of Internet Security
How to install adware
Phony "tech support" / "ransomware" popups and web pages
Effective defenses against malware and other threats
Linc Davis has a very good list, but he has never created a User Tip from it, so it is not easily found.