Mike Foster's IT Security & Best Practices Blog

Latest Posts

Wireless Security is Broken & What You Need to Do

Many organizations rely on a wireless password to protect their Wi-Fi networks. Behind the scenes, that password is used as part of a security protocol called WPA2. An attack, dubbed KRACK, has been announced that breaks that security.

Continue reading Wireless Security is Broken & What You Need to Do


5 Steps to Take Now Even if You do not use Kasperski Anti-Virus

According to the Wall Street Journal, followed by the Washington Post, Russian hackers used Kaspersky anti-virus to steal NSA cyber defense information off of an employee’s home computer. Even if you do not use Kaspersky, you still need to take 5 important steps.

Continue reading 5 Steps to Take Now Even if You do not use Kasperski Anti-Virus


Please Alert Your IT Pros – Increase Your Security Log File Capacity

Windows computers can keep a log of security events, such as failed logon attempts. It is helpful to know if attackers are trying to gain access to your network. When the log fills up, it overwrites itself with the oldest events first. By default, the log files are very small, and that makes it much […]

Continue reading Please Alert Your IT Pros – Increase Your Security Log File Capacity