Mike Foster's IT Security & Best Practices Blog

Latest Posts

Are you rolling out the welcome mat to attackers?

One of the biggest surprises IT receives during an audit is that their network is basically configured to grant attackers access.

Continue reading Are you rolling out the welcome mat to attackers?


Recipe to get hacked: Keep doing what you’ve always done

Been hacked? Well there is always the insanity defense! IT professionals, both in-house and out-sourced, have a validated reason for being adverse to patching operating systems. Executives have a valid reason to be adverse to upgrading operating systems from, for example, Windows XP to Windows 7. Unless you resolve the issues, or at least establish […]

Continue reading Recipe to get hacked: Keep doing what you’ve always done


Single Biggest Way to Repel IT Attacks

Attackers have learned that one of the easiest and most successful ways to successfully take control of a network is to launch attacks against vulnerable programs on your systems. It is almost certain that you are not protected against these attacks—at least not until you take important steps.

Continue reading Single Biggest Way to Repel IT Attacks


Stop Drive-By-Downloads

It is time to review your anti-spam filters and your web-filters to ensure you are adequately protected against targeted email attacks as well as drive-by-download attacks. The latter attacks happen when one of your users visits an infected site. The settings your IT department configured in 2011 probably need to be reconfigured to repel new […]

Continue reading Stop Drive-By-Downloads