Mike Foster's IT Security & Best Practices Blog

Latest Posts

Keeping Hackers from Stealing Your Online Identity

Too often you visit a website, after you place an order, transfer money, or update a profile, you just close the window when you are finished. You just skipped one of the most important parts for security…

Continue reading Keeping Hackers from Stealing Your Online Identity


These Short and Fun IT Videos Can Protect You!

Always remember: The best IT security controls can be thwarted by human ignorance. Here are fun videos to help you train your users in an enjoyable way. One of our training videos currently holds the #1 spot

Continue reading These Short and Fun IT Videos Can Protect You!


Executives tell Employees – It is OK to lose your phone

These days, employees’ phones contain your company’s sensitive data. Sure, IT can wipe the data off of the phone remotely, but ONLY when the employee notifies someone that they lost their phone. What happens is the users do not notify IT, and the lost phone still contains the sensitive data. To solve this problem…

Continue reading Executives tell Employees – It is OK to lose your phone


Turn Off Computers for Security?

A common question is: “Does turning off a computer when not in use help with security?”

Continue reading Turn Off Computers for Security?


Should You Trust Cloud Storage?

iCloud, SkyDrive, DropBox, etc. – Are they secure?  How do you know how much to trust “the cloud?” Here are the answers…

Continue reading Should You Trust Cloud Storage?