by Mike Foster | Oct 17, 2017 | Cyber Security, Cyber Security Breach, Cybersecurity, KRACK, wi-fi best practices, wi-fi safety, wi-fi security
Many organizations rely on a wireless password to protect their Wi-Fi networks. Behind the scenes, that password is used as part of a security protocol called WPA2. An attack, dubbed KRACK, has been announced that breaks that security. The attack can permit attackers...
by Mike Foster | Oct 6, 2017 | Cybersecurity, Kasperski, Ransomware, Whitelisting
According to the Wall Street Journal, followed by the Washington Post, Russian hackers used Kaspersky anti-virus to steal NSA cyber defense information off of an employee’s home computer. Even if you do not use Kaspersky, you still need to take 5 important steps....
by Mike Foster | Oct 6, 2017 | Best Practices, Cybersecurity, Data Loss Prevention, IT Best Practices, Preventative IT Security Breach, Security Logs
Windows computers can keep a log of security events, such as failed logon attempts. It is helpful to know if attackers are trying to gain access to your network. When the log fills up, it overwrites itself with the oldest events first. By default, the log files are...
by Mike Foster | Sep 29, 2017 | AI, Alerts, Best Practices, Cybersecurity, Executive Tips, IT Best Practices, Preventative IT Security Breach, Threat Protection Software
This week, someone told me about a group of CEOs who came to the conclusion that their IT security was handled since they installed an artificial intelligence (AI) based threat protection tool. They didn’t know it, but they were wrong. Having a false sense of security...
by Mike Foster | Sep 25, 2017 | Apple, Best Practices, Cybersecurity, iOS 11, wi-fi best practices, wi-fi safety, wi-fi security
The new Apple iOS 11 has a feature that appears to permit you to turn Wi-Fi on and off from the easy to reach Control Center. However, some people in the security community are concerned since the setting does no such thing. Your iPhone and iPad will prompt you to...