by Mike Foster | Oct 28, 2021 | Cybersecurity, Hacking, Mobile Devices
If you haven’t already, you will receive text messages that entice you to respond. Some of the messages contain links that can infect your phone with spyware and other malicious programs. Before you click a link, follow instructions, or consider believing a text...
by Mike Foster | Oct 22, 2021 | Cloud Security, Cybersecurity, Cybersecurity Audits, Hacking
Some organizations move their data to the cloud and stop backing it up. Cloud services offer ways to restore the data. But what happens if an attacker deletes your files and deletes the backup at the cloud service too? Consider backing up your data at a different...
by Mike Foster | Oct 1, 2021 | Cybersecurity, Cybersecurity Audits, Supporting IT Professionals
After we performed a cybersecurity audit for a company many years ago, the President and CEO assigned the recommendations to their IT consulting firm. What is different about this lead executive is that he gently applies firm pressure on their IT consultants to...
by Mike Foster | Sep 17, 2021 | Cybersecurity, Hacking, Password Security, Uncategorized
Attackers steal passwords, people forget passwords, resetting passwords is a pain. Microsoft provides a way to remove passwords from your Microsoft account. That way, you can log in without passwords to Microsoft Office, Teams, Outlook, OneDrive, Windows, and other...
by Mike Foster | Sep 10, 2021 | Cyber Security, Cybersecurity Audits, Hacking, Password Security
Executives, please remember: Attackers do not need to know any passwords if they are already inside a computer. They can wait for the user to log in for them. Even if you’ve moved all of your servers, programs, and storage to the cloud, passwords aren’t...