by Mike Foster | Nov 28, 2016 | Executives and IT, IT Best Practices, IT Pro Tips, IT Professionals
To keep their job, IT Professionals must do three things. First, IT Professionals need to know that the boss is always right. If the executives say that they do not want to use passwords, then that settles it. Of course, IT Pros should make recommendations, but let...
by Mike Foster | Nov 18, 2016 | Cyber Security, Cybersecurity, Google, Hacker Insight, Hackers, IT Best Practices, phones, Technology Safety Tips, Technology Security, wi-fi safety
Phone operating systems store much of the information that you have in your phone in the cloud too. So, attackers stealing information from your phone can be as simple as gaining access to that data in the cloud. Additionally, some of the apps on your phone can mine...
by Mike Foster | Nov 3, 2016 | Alerts, Application Updates, Applying IT Patches, Best Practices, Cyber Security, Cyber Security Breach, Cybersecurity, Infected Apps, Invisible Security Threats, IT Best Practices, IT Virus, Malware, Online Security, Patches, Ransomware, Virus
If your office has even one instance of a virus, ransomware, or any other kind of malware, that is a huge symptom. Yesterday, someone told me their security was good since they only get infected by a few viruses each year. Even a single infection means there is a...
by Mike Foster | Oct 21, 2016 | Cybersecurity, Facebook, Hackers, Identity Theft, Online Impersonators, Online Security
Twice recently, I’ve been contacted by executives who explain that someone was impersonating them on Facebook. They used my friends’ own pictures, sent messages, posted information, and everything was very inappropriate. Each friend asked what to do, and here is the...
by Mike Foster | Oct 14, 2016 | browser security, Cybersecurity, Password Safety, Password Security, Technology Safety, Technology Safety Tips, Technology Security
You hear in the news that Yahoo, or some other company, got hacked and your username and password may be in the hands of attackers. There is a way to find out if your credentials were exposed. An Australian Web Security Specialist, Troy Hunt, has compiled a database...