by Mike Foster | Sep 2, 2024 | AI, Best Practices, Cyber Security, Cybersecurity, IT Best Practices, Technology
While we’ll discuss AI, the security principles outlined here are equally crucial for all computer-controlled manufacturing systems, whether they incorporate AI or not. AI’s Growing Role in Controlling Devices: As AI starts entering more workplaces, it is...
by Mike Foster | Aug 23, 2024 | AI, CCPA, Cybersecurity, IT Best Practices, Privacy, Supporting IT Professionals, Uncategorized
As a cybersecurity professional specializing in cybersecurity and AI, I’ve seen firsthand the importance of involving key stakeholders when implementing AI solutions. This guide highlights many essential steps to help ensure a smooth, secure, and compliant AI...
by Mike Foster | Jul 29, 2024 | Cybersecurity, Family Security, Mobile Security, Wireless Security
If you are traveling for work or on vacation, using Wi-Fi wireless connections in airports, coffee shops, hotels, and in-flight is tempting. Danger: Realize that using public networks via Wi-Fi or an Ethernet cable can be very dangerous. Your laptop is still...
by Mike Foster | Jul 8, 2024 | Cybersecurity, Cybersecurity Audits, Password Security, Supporting IT Professionals, Wireless Security
If you have existing or are applying for new Cyber Insurance coverage, be prepared for the questionnaire. Knowing what they’ll ask can give you time to implement systems to answer “yes” to the questions affecting your premium rates and whether you’re still considered...
by Mike Foster | Jul 6, 2024 | Best Practices, Cyber Security, Cybersecurity, Executive Tips, hotspot, IT Best Practices, Remote Worker, Remote Worker Security, Technology Safety Tips, wi-fi best practices, wi-fi security
Many of us believe that a Virtual Private Network (VPN) alone is enough of a security measure to protect users who connect at a coffee shop, hotel, or other public network. Still, it can expose your organization to threat actors who could compromise the user’s laptop...