Mike Foster's IT Security & Best Practices Blog

Latest Posts

Never Permit Tech Support to Access your Computer

A company had a problem with their bank’s remote deposit software. They called technical support, and the bank’s software support person announced, “First, I need to connect to your computer to see what is going on.” Fortunately, the company’s team member told the bank’s technical support person, Continue reading ‘Never Permit Tech Support to Access your Computer’


When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6

Wi-Fi technology is always changing. When you buy new Wi-Fi equipment, be sure to ask if there is a Wi-Fi version 6 option available. You will increase speed, security, and help futureproof your investment. Wi-Fi version 6 will become the new standard for several reasons: Continue reading ‘When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6’


Protect your Company from the Imminent Threat called Eternal Blue

In 2017, the NSA made headlines after developing a hacking tool called Eternal Blue. The NSA did not notify Microsoft of the stockpiled vulnerabilities, so Microsoft didn’t know what holes to seal. The hacker group called Shadow Brokers acquired this powerful hacking tool developed by some of our nation’s best and brightest. Continue reading ‘Protect your Company from the Imminent Threat called Eternal Blue’


You Do Not Need to Understand Computers to Make Ransomware

There is a new program that is designed to help even non-technical people to create ransomware. The tool is called Inpivx, and it is designed to provide easy point-and-click functionality. Continue reading ‘You Do Not Need to Understand Computers to Make Ransomware’


What to Do if Someone Hacks Your Email Account

How to protect yourself if, or even before, an unauthorized spammer uses one of your email accounts to send out spam: Continue reading ‘What to Do if Someone Hacks Your Email Account’


How to Stop the Annoying Phone Calls

Everyone is tired of getting those annoying phone calls. Sometimes the callers are people trying to steal your credit card numbers.

Tools are available to help stop the problem. Continue reading ‘How to Stop the Annoying Phone Calls’


How to Best Protect Your Mobile Devices

The RSA Security Conference is wrapping up today. I’ve been here all week, and almost all of the best security companies demonstrated their security protection tools. Guess what was missing? Continue reading ‘How to Best Protect Your Mobile Devices’


Tesla Will Give a Car to a Hacker if they can Break In

Hackers will compete for prizes from Tesla. In addition to the first winner who gets the car, Tesla also pays…

$250,000 if they can hack the autopilot
$100,000 if they can hack the modem or tuner
$100,000 if they can hack the key fob or phone-as-a-key

Microsoft, VMWare, and other companies are offering big prizes to someone for breaking their security.

Challenges like this are an excellent way for companies to find security holes in their hardware, software, and services. Most companies offer a bounty system to pay successful attackers every day of the year.

If you want to go, or even compete, the event is March 20-22 in Vancouver. Visit CanSecWest.com.


773 Million Passwords Exposed – Were You Exposed?

Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords
Continue reading ‘773 Million Passwords Exposed – Were You Exposed?’