by Mike Foster | Feb 25, 2021 | Cyber Security, IT Best Practices, IT Security, Technology, Technology Tips
A friend contacted me a few days ago and said, “Every few weeks, I’ll go to a site, and it will say that this appears to be a new device? For example, I’ve looked at my Twitter account this morning, and it put up my username and asked me for my password again. Is this...
by Mike Foster | Jan 28, 2021 | Alerts, Best Practices, Cyber Security
Equip all of your Work from Home users with a cloned drive so they can help protect your network and get up and running quickly if they get ransomware or if their hard drive crashes. Protect your home family computers the same way. Cloning a hard drive creates a...
by Mike Foster | Jan 21, 2021 | Uncategorized
Some services, free for home use, can protect your family devices from accessing malicious web servers even if you accidentally click a fraudulent link. If you already use Eero or some other family safety service, it probably already filters out bad sites for you, and...
by Mike Foster | Jan 13, 2021 | Alerts, Best Practices, Cybersecurity, Executives and IT, IT Best Practices
Will running one rarely used program stop future attacks? It will in the SolarWinds attack and perhaps stop future compromises too. It makes sense that malware uses strategies to infect and hide inside of networks undetected. Here is some fascinating insight into that...
by Mike Foster | Jan 7, 2021 | Alerts, Best Practices, Cyber Security
Even if you don’t use SolarWinds, your suppliers and customers might. In some cases, your security is only as good as their security. There are so many webpages about the Solar Winds attack. Here are three of the most useful. Please forward this to your IT team....