Mike Foster's IT Security & Best Practices Blog

Latest Posts

A Huge Data Leak Exposed Your Personal Information

The most massive data leak that’s ever happened includes neatly bundled information for more than 1 billion people. Keep in mind that the estimated population of the United States is only 330 million. If you use email, you are probably exposed. Continue reading ‘A Huge Data Leak Exposed Your Personal Information’


What Will You Do if Your Customers’ Spam Filters Block Your Messages?

One of the ways your spam filter helps to stop unwanted messages is to block messages from mail servers with a bad reputation for spamming. What will you do if your company gets labeled as a spammer? First of all, nobody will receive your company’s messages. Continue reading ‘What Will You Do if Your Customers’ Spam Filters Block Your Messages?’


Protect Your Network Even when Attackers Trick Your Users

A business contacted our office last week because a bad actor tricked an employee to give them full access to their computer.

The bad actor immediately took over the network and started performing highly illegal activities that appeared to come from the victim’s systems.  User training is not enough. It is essential to take additional steps to help protect your network when an attacker is crafty enough to trick a user.

Continue reading ‘Protect Your Network Even when Attackers Trick Your Users’


Avoid Opening Word Attachments – Check with IT First

When you receive an email message with a PDF attached, it is always best to confirm that you are expecting the attachment before opening it.  However, if you receive a Word, Excel, or another file type other than a pdf, beware.
Continue reading ‘Avoid Opening Word Attachments – Check with IT First’


Microsoft Will Stop Protecting Windows 7 on January 14, 2020

Windows 7 computers will still run, your anti-virus will still work, as will your other programs. But you are taking a significant risk because Microsoft will no longer provide security updates that help keep attackers out of your network.
Continue reading ‘Microsoft Will Stop Protecting Windows 7 on January 14, 2020’


Find Out if You Can Collect a Bundle from the Equifax Breach

There is a strong chance that hackers obtained your identity information in the Equifax breach. It exposed 148 million American’s sensitive information, and that sets you and your family up for identity theft. If you already suffered identity theft and can prove Equifax was the source, you might get up to twenty thousand dollars. Continue reading ‘Find Out if You Can Collect a Bundle from the Equifax Breach’


Never Permit Tech Support to Access your Computer

A company had a problem with their bank’s remote deposit software. They called technical support, and the bank’s software support person announced, “First, I need to connect to your computer to see what is going on.” Fortunately, the company’s team member told the bank’s technical support person, Continue reading ‘Never Permit Tech Support to Access your Computer’


When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6

Wi-Fi technology is always changing. When you buy new Wi-Fi equipment, be sure to ask if there is a Wi-Fi version 6 option available. You will increase speed, security, and help futureproof your investment. Wi-Fi version 6 will become the new standard for several reasons: Continue reading ‘When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6’


Protect your Company from the Imminent Threat called Eternal Blue

In 2017, the NSA made headlines after developing a hacking tool called Eternal Blue. The NSA did not notify Microsoft of the stockpiled vulnerabilities, so Microsoft didn’t know what holes to seal. The hacker group called Shadow Brokers acquired this powerful hacking tool developed by some of our nation’s best and brightest. Continue reading ‘Protect your Company from the Imminent Threat called Eternal Blue’