by Mike Foster | Dec 30, 2020 | Alerts, Email Security, IT Best Practices, Technology Tips
The investigation into the SolarWinds breach keeps revealing more shocking ways attackers infiltrated organizations. Even if your organization doesn’t use SolarWinds, you must take action. Official channels report that some software giants, including at least...
by Mike Foster | Dec 15, 2020 | Alerts, CCleaner, Cyber Security, Executives and IT, Infection Vector, IT Best Practices, IT Risk Management, Security Breach, SolarWinds
Bad Actors compromised a product called SolarWinds Orion and then used that as a vector attack organization. Ask your IT team if they use SolarWinds products, and if so, they must visit SolarWinds dot com/security advisory immediately for more information. SolarWinds...
by Mike Foster | Nov 24, 2020 | Uncategorized
Recently, the CEO of an organization told me that his budgeting process demonstrates his commitment to protecting from cyber-attacks because he includes his investments in the IT Vital Systems Reviews as part of his risk management budget. You might already do this...
by Mike Foster | Nov 18, 2020 | browser security, Credit Card Security, Cyber Fraud, Cyber Scams, Cyber Security, Cybersecurity, Family Cyber Safety, Malicious Advertising, Online Security, Password Safety, Technology Safety Tips, Website Security
What seems to be the best way to find a company’s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site. Here is how the scam works: Suppose you want to...
by Mike Foster | Oct 23, 2020 | Alerts, Cyber Security, Cybersecurity, Executive Tips, IT Best Practices, Patches, Remote Worker Security, Security Breach, Technology Safety Tips
An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network. The attacker does not need to know any passwords; they do not even need a username. They plug in a cable, and 3 seconds later, they’ve...