Mike Foster's IT Security & Best Practices Blog

Latest Posts

What dangerous behaviors do users regularly engage in using company owned computer equipment?

A graduate student asked me to help him in his research regarding technical issues in Industrial-Organizational Psychology. Here are some of the observations I see on a regular basis. Perhaps you can add even more through your blog responses about computer user behavior that will help him in his quest: Installing a program, toolbar, browser […]

Continue reading What dangerous behaviors do users regularly engage in using company owned computer equipment?


Executives and Owners – ANSI recently published an action guide about 50 Questions Every C-level Executive Should Ask about Cyber Risk!

In the past, CFO’s and executives were just in charge of managing people and money. Now Cyber-Security falls into this realm as well. Too many executives just hand-off IT security to the IT department and the IT department is too busy taking care of other tasks to plug the security leaks. The American National Standards […]

Continue reading Executives and Owners – ANSI recently published an action guide about 50 Questions Every C-level Executive Should Ask about Cyber Risk!


What? CEO’s, executives and business owners are protecting their network with a cheap home based firewall?

Any successful business professional can become the target of people wishing to do them harm. Why would a business professional trust their family’s safety to a $30 home level router when they can get a much better firewall for less than $100? And a great one for less than $300?  How much is your family’s […]

Continue reading What? CEO’s, executives and business owners are protecting their network with a cheap home based firewall?