Mike Foster's IT Security & Best Practices Blog

Latest Posts

Keep your family computer like new forever

When you get a new computer, it runs fine. Over time, it can slow down and become infected. Microsoft offers a free tool that can protect your computers. It is called Windows Steady State. With Steady State, every time you restart your computer, the computer will return to its original, hopefully pristine, condition.

Continue reading Keep your family computer like new forever


Does your signature line contain a phone number?

Do you carry a phone that also receives e-mail? Do you ever receive an e-mail and then want to call the person back? If they put their phone number in their e-mail signature line, you can click the e-mail to place the phone call.

Continue reading Does your signature line contain a phone number?


Short useful Forbes article about CEO’s and cybersecurity

What CEOs Don’t Know About Cybersecurity by Andy Greenberg. A new study hints at how often cyberthreats aren’t communicated to the boss. http://www.forbes.com/2009/07/13/poneman-cybersecurity-breaches-technology-security-poneman.html?partner=email Many thanks to don@soundtraining.net for passing this along – he provides excellent IT training.

Continue reading Short useful Forbes article about CEO’s and cybersecurity


How to Keep Turnover Low and Employees Motivated in the Midst of Economic Turmoil

As a business owner or manager, your job is to get things done through your employees. To do this, you need to be able to motivate your team. However, in today’s age of downsizing, reduced employee loyalty, and the absence of job security, many business owners are finding that employee motivation is a concept that’s […]

Continue reading How to Keep Turnover Low and Employees Motivated in the Midst of Economic Turmoil


How Your Sales People Can Use Technology to Double Their Sales

Is your sales team working as effectively as they can be? In most companies, the answer is no. While you may have experienced a positive gain despite the economic slowdown, there’s likely much more business your sales team could have closed if they only had the technology tools to stay productive.

Continue reading How Your Sales People Can Use Technology to Double Their Sales


Users are one of your most vulnerable assets

Criminals can access your network when your users unknowingly make it easy for them.

Continue reading Users are one of your most vulnerable assets


You may never know your computer is infected

Think about it. If a cyber criminal is monitoring your computer to steal your passwords,  they do NOT want you to know.

Continue reading You may never know your computer is infected