Mike Foster's IT Security & Best Practices Blog

Latest Posts

Adding Security Makes Systems Unusable!

Ask your IT Professional: “Are you implementing the protections that users won’t notice anyway?” …

Continue reading Adding Security Makes Systems Unusable!


Linksys products – if you use them at home or work – you may be vulnerable to an attack

Your IT professionals are very busy and often don’t have time to keep up with what are called “firmware updates.” It turns out that many manufacturer’s products, including Linksys products that are common in smaller businesses and in homes, are getting hacked. Ask your IT professional to update your firmware. They may need to disable […]

Continue reading Linksys products – if you use them at home or work – you may be vulnerable to an attack


Attn: There is a Serious Mac Virus Circulating Right Now

There is a virus attacking Mac users that infects your computer and steals copies of your data files including .pdf documents. The virus has been named OSX/LaoShu-A. The way to protect yourself is to not click on any links in email messages that you don’t recognize. Historically, Mac users were targeted less often than Windows […]

Continue reading Attn: There is a Serious Mac Virus Circulating Right Now


The Bank Tells Us To Disable Security!

Ask your IT Professionals, “Has any vendor, even the bank, asked us to reduce security levels on any of our machines or the network?” Counterintuitively, the bank often tells your IT professionals to disable important security protection. This happens when your bank gives you a program or web site in order for your users to […]

Continue reading The Bank Tells Us To Disable Security!


Stop giving Outside Vendors Permission to Access your Most Sensitive Customer Files!

Question to ask your IT Professional: “Who outside of our company can log in as an administrator?” What happened at Target is that Target provided at least one of their vendors with username and password credentials to log in to Target’s corporate network. Attackers stole the username and password credentials from a vendor.

Continue reading Stop giving Outside Vendors Permission to Access your Most Sensitive Customer Files!