Mike Foster's IT Security & Best Practices Blog

Latest Posts

Stonewall, not Firewall: Use Application Whitelisting

Protect yourself when a user plugs in a USB device that is infected. Reduce the risk of devastation when a user accidentally clicks on a bad link. There is a program built in to Windows that can protect you, and it is one of the most important strategies to use. What to ask your IT […]

Continue reading Stonewall, not Firewall: Use Application Whitelisting


See the Real-Time Attack Luring iTunes Users

Google the word iTunes, and examine the search results. You’ll notice the top Google result for the word “iTunes” is a site that hackers put up in order to redirect unsuspecting users to a potentially malicious hacking site. CAUTION: Do not click on the link.

Continue reading See the Real-Time Attack Luring iTunes Users


Annihilate Sensitive Data

A chief executive asked this week about, if he is going to donate a computer to a good cause, how can he erase all of his sensitive data from the hard drive first? Here is how – complete with a video.

Continue reading Annihilate Sensitive Data