Mike Foster's IT Security & Best Practices Blog

Latest Posts

How is your disaster recovery plan?

A lot of organizations are revamping their IT systems now that the economy is recovering. Many are using services like server virtualization and thin client technology—both of which lend themselves to you having a great opportunity to make a more robust Disaster Recovery Plan (DRP).

Continue reading How is your disaster recovery plan?


What to do if someone steals your identity

A client wrote recently explaining their family’s personal information was on a laptop in their car when the car was stolen. Of course, the laptop was not using full disk encryption, or they would never have called me. What do you do?

Continue reading What to do if someone steals your identity


Executives, does your e-mail address end in AOL?

Three different highly respected business professionals communicated with me today and each of them made comments along the lines of, “Oh—that CEO is so far behind in technology that their e-mail address ends in AOL!”

Continue reading Executives, does your e-mail address end in AOL?


When will tech become truly user friendly?

I used a wonderful ATM in Santa Barbara recently. The main screen had a space for your PIN and the buttons for $20, $40, $100, etc. All the customer needs to do is touch 4 keys for the pin and 1 key for the amount requested and DONE! No “Enter” key. Out pops the cash! […]

Continue reading When will tech become truly user friendly?


Executives-be sure your CPA saw this article

One of my best clients, a CPA firm, forwarded a quick article from the AICPA—American Institute of CPA’s—called “Four Fast and Easy Tech Fixes.” Be sure your CPA sees it.

Continue reading Executives-be sure your CPA saw this article