Mike Foster's IT Security & Best Practices Blog

Latest Posts

Are employees or guests connecting unauthorized computers to your network?

An IT professional discovered an unauthorized computer on the network!  “I know all our computer names and I knew this one did not belong.  I immediately called our consultants thinking we were being compromised. They said the computer was in our office.  I searched through the office and found that one of the (employees) brought […]

Continue reading Are employees or guests connecting unauthorized computers to your network?


Are you using an Amazon Kindle yet to save time?

I purchased my Amazon Kindle months ago and love it! Am an avid reader and used to carry lots of books with me. Now, all my books are in the Kindle e-book reader! It is amazing. I don’t need books filling up my house anymore either – just sent several huge boxes of books to […]

Continue reading Are you using an Amazon Kindle yet to save time?


Avoid Pitfalls of Outsourcing IT

Do you outsource IT? As I performed a recent IT Vital Systems Review at “Company A” – one of your peers – I was appalled.  The CEO and executives have relied for years on an outsourced firm that has offices nationwide. On the day of the review to the company, their representative showed up sloppily […]

Continue reading Avoid Pitfalls of Outsourcing IT