Mike Foster's IT Security & Best Practices Blog

Latest Posts

Protect Your Kids from Online Cyber Threats

Another free tool that helps you protect your kids from cyber threats while they are online protects them if they are using Windows, Apple computers, iPads, iPhones, Androids…

Continue reading Protect Your Kids from Online Cyber Threats


Protect Your Kids from Cyber Dangers

Know about a free tool that helps you protect your kids from cyber threats while they are both online and offline, limit the hours of use, and if you want to, monitor their cyber behavior…

Continue reading Protect Your Kids from Cyber Dangers


Cyber-Safe Holiday Travels

Many executives will be travelling for the holidays. It will be so tempting to use W-Fi wireless connections in airports, coffee shops, hotels, in-flight Wi-Fi…

Continue reading Cyber-Safe Holiday Travels


Hack the Hacker who Hacked You

Many times, organizations that got hacked want to track down and “hack the attacker back.” For instance, suppose someone emails your customers an email that says something bad about your organization. Most of the time, you’ll want to track those people down and do something about it!

Continue reading Hack the Hacker who Hacked You