by Mike Foster | Sep 10, 2018 | Best Practices, Cyber Security Breach, Cybersecurity, IT Best Practices, IT Pro Tips, password, Password Safety, Password Security
Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet. You assign your IT team the responsibility to secure and manage the keys to the vehicles, so you give each...
by Mike Foster | Jul 23, 2018 | Adobe Flash, Best Practices, browser security, Cyber Security, Cybersecurity, Encrypted Attachments, Executive Tips, Service Provider Breach, Service Provider Safety
Many organizations outsource to service providers that are not cyber-secure. It is common for companies to experience a significant security breach that originated at a third party. Just ask Target. Forward this request to your small outsourced providers asking them...
by Mike Foster | Jul 9, 2018 | Alerts, Attachments, Best Practices, Cybersecurity, Disabling Macros, Email
When you receive an email attachment, even when you are expecting the document and know the sender, the attached file can be poisoned. And the friend or associate who sends you the attachment probably does not know that the file is infected. A term to know is macro....
by Mike Foster | Jun 28, 2018 | Best Practices, Cybersecurity, Firewall Security, Web Content Filtering
We audited a company last week and discovered that their web filtering tools, designed to stop users from accidentally landing on malicious websites, was not blocking dangerous sites. In these days with ransomware and bad actors tricking users into clicking on...
by Mike Foster | May 11, 2018 | Best Practices, Cybersecurity, Encrypted Attachments, Online Security, Password Safety
E-mail messages can be intercepted or read by an unauthorized individual. When you want privacy, one way is to encrypt your documents before you attach them to your email message. Microsoft Office, for Windows and Mac, has a feature on the File menu called Protect...