Mike Foster's IT Security & Best Practices Blog

Latest Posts

If you use Firefox, Update it Now

Open Firefox, click on the little square icon near the top-right of your screen that is composed of three horizontal bars. Then click the question mark for “help”.  Third, select “About Firefox.”  Firefox will automatically download the latest version.

Continue reading If you use Firefox, Update it Now


Lenovo Computers Infected

Urgent bulletin: Lenovo pre-installed software called SuperFish on computers that is a security risk. This is just another example of why it is so important to remove the junk-ware from new computers. Follow these instructions from Lenovo: http://support.lenovo.com/us/en/product_security/superfish_uninstall Please forward this to anyone you know who might have purchased a Lenovo computer – laptops included.

Continue reading Lenovo Computers Infected


Info About Protecting Your Personal Identity

Especially after the recent Anthem cyber-security breach, people are writing to us who are concerned about identity theft. Below are 5 concise articles, written in plain English, related to identity theft; and you may want to forward this to your friends as well:

Continue reading Info About Protecting Your Personal Identity


Is Google Apps or Microsoft 365 more secure?

A CFO asked, “I would really love to hear your take on Google vs Microsoft 365 and see if you fall on one side or the other.” When it comes to cyber-security for those two big players…

Continue reading Is Google Apps or Microsoft 365 more secure?


How Strict Do You Want your IT Pro to Be?

A CFO told me today that he feels challenged because his VP of IT is “very sensitive to being too ‘Big Brother’ in his approach to security.” The CFO wants his VP of IT to increase cyber-security, “even if it means taking away some latitude for employees, etc.” Other times, CFOs explain that their VP […]

Continue reading How Strict Do You Want your IT Pro to Be?