Mike Foster's IT Security & Best Practices Blog

Latest Posts

Interesting cloud computing side effect

In the “old days” before cloud computing, most organizations used a firewall and everyone understood two areas. First, inside the firewall are your own assets. Then, outside the firewall is the public Internet. This simplistic thinking no longer works.

Continue reading Interesting cloud computing side effect


Is defense indepth that good?

Many IT departments tell their executives that having multiple firewalls, anti-virus protection, VPN’s, etc. are all you need for security. How does a firewall help you if the attack comes from inside your perimeter?

Continue reading Is defense indepth that good?


How to connect multiple monitors to your computer

When you try more than one monitor, it is hard to go back to a single monitor. Many users move to three or more monitors. What if your laptop, or desktop for that matter, only has one monitor port?

Continue reading How to connect multiple monitors to your computer


Rogue WiFi access points can cost you a great deal of money

During a recent IT and physical security audit, we found three wireless access points within a facility that were both: Insecure providing wide open access to whoever wanted to attach and unknown to the IT professionals at the facility.

Continue reading Rogue WiFi access points can cost you a great deal of money