Mike Foster's IT Security & Best Practices Blog

Latest Posts

Does it help not to open e-mail from strangers?

An executive recently wrote me, “I got a virus that infected our network because I opened an e-mail message from someone I didn’t recognize – I’ll never do that again!” While that strategy may help some, it is far from being a reliable way to protect your network. First of all, without performing some technical […]

Continue reading Does it help not to open e-mail from strangers?


Productivity – what programs do you use most?

You might be surprised what programs you use most often. Tools from www.rescuetime.com watch your activity on your computer and give you a useful report about your daily activities. Their privacy statement and FAQ clearly state that they won’t gather any private information, and if you are willing to trust them, you may learn ways […]

Continue reading Productivity – what programs do you use most?


How much should IT companies charge per hour?

“Mike, I pay my outsourced company $75 per hour – is that a good rate?”  This is a common question from executives. The answer is simple: Hourly rates mean NOTHING. I have seen $40/hour companies spend months resolving simple issues that they should have known how to fix in a moment. At the same time, […]

Continue reading How much should IT companies charge per hour?


Productivity Booster: How to keep tons of information easily organized

“Mike, I can’t live without OneNote – do you use it?” Enough IT professionals and executives at organizations who hire me as a consultant asked me this that I decided to give Microsoft OneNote one more try. Do you know what? I wonder how I got along without it too. I had originally thought it […]

Continue reading Productivity Booster: How to keep tons of information easily organized