by Mike Foster | Jan 7, 2022 | Cybersecurity, Cybersecurity Audits, Hacking
As an executive that leads, and depends on, your IT Professionals or outsourced IT provider, be sure to know these five essential steps that have a massive impact on your cybersecurity protection and how frequently your team must address them: Apply Critical Security...
by Mike Foster | Dec 23, 2021 | Cybersecurity, Supporting IT Professionals
Technical issues happen all the time, and you don’t hear about them because your IT professionals solve the problem efficiently and quietly. They use their skills and experience to perform monumental feats every month, and most executives have no idea what their...
by Mike Foster | Dec 15, 2021 | Cybersecurity, Cybersecurity Audits, Family Security, Hacking
Some of our customers take the Log4j situation seriously, and some ignore it. You or your organization might use products and services from Amazon, Apple, Cisco, Google, LinkedIn, VMware, and other affected organizations. Do not ignore the danger. Attackers are...
by Mike Foster | Nov 19, 2021 | Cybersecurity, Family Security, Hacking, Password Security
Data aggregation firms gather information on human beings and sell data to marketing companies, insurance companies, creditors, even employers. Sources of information include public records, loyalty programs, credit and gift cards, social media, web searches, apps,...
by Mike Foster | Nov 12, 2021 | Cybersecurity, Cybersecurity Audits, Supporting IT Professionals
Below is a letter you can send your third-party service providers if you want to give them pointers on being more secure. We’ve done the work to make this quicker for you. None of these are unreasonable for you to request. You and your IT team can customize the letter...