Mike Foster's IT Security & Best Practices Blog

Latest Posts

Security Version 2.0

Here is another powerful way to strengthen security – upgrade to the newest versions. Just like last week, your key tool will be your application inventory. It will look something like this…

Continue reading Security Version 2.0


Smooth and Slippery for IT Security

When talking about security, a good example is the large polished stainless steel sculpture commonly known as The Bean. If someone wanted to climb the bean, they would quickly find that the smooth surface provides no place to get a foothold. Make your computers like The Bean. Every single program installed on your computers provides […]

Continue reading Smooth and Slippery for IT Security


Send your IT Professionals to The 2016 SuperTech Best Practices Workshop

Send your IT Professionals to The 2016 SuperTech Best Practices Workshop Monday 8/8/16 thru Wednesday 8/10/16 Executives are welcome too Professional Development Workshop for IT Pros: IT Pros must overcome ever-increasing challenges. Together, you can help yourself and your organization grow and thrive more than ever. At the SuperTech workshop, IT Professionals receive what they […]

Continue reading Send your IT Professionals to The 2016 SuperTech Best Practices Workshop


Alert – ACH and Wire Transfer Fraud at Epic Levels

Everyone – this is urgent – we are seeing an enormous increase in users being duped into making unauthorized transfers. The attackers are very, very good at tricking people – often using multiple communications in order to build trust. You absolutely must take the following steps to help protect you and your organization.

Continue reading Alert – ACH and Wire Transfer Fraud at Epic Levels


How To Know if a Password Attack Succeeded

Last week, you saw an example of a list of passwords that an attacker used to attack a server more than 41,000 times. But the worst part was the server that underwent a short attack…

Continue reading How To Know if a Password Attack Succeeded