Mike Foster's IT Security & Best Practices Blog

Latest Posts

Updated: Forward these 7 Minimum Security Requirements for Your Small Service Providers

Many organizations outsource to service providers that are not cyber-secure. It is common for companies to experience a significant security breach that originated at a third party. Just ask Target. Forward this request to your small outsourced providers asking them to do these seven things.

Continue reading Updated: Forward these 7 Minimum Security Requirements for Your Small Service Providers


Patching Nightmare – Please Forward to Your IT Pros

Intel says, again, to stop deploying patches. Java and other new patches need handling.

Continue reading Patching Nightmare – Please Forward to Your IT Pros


Moms, Dads, and Friends: Take 7 Steps to Secure Your Students’ Computers

School is starting again and many students need computers. Take these important steps to help make them more secure:

Continue reading Moms, Dads, and Friends: Take 7 Steps to Secure Your Students’ Computers


Security Version 2.0

Here is another powerful way to strengthen security – upgrade to the newest versions. Just like last week, your key tool will be your application inventory. It will look something like this…

Continue reading Security Version 2.0


No Flash Attacks After June 30

Starting June 30, 2016, Google will no longer accept advertisements that use Flash. What this means: Better security for you and your organization. You needn’t buy anything or change anything. It will all happen automatically.

Continue reading No Flash Attacks After June 30


Stop Your Vulnerabilities in a Flash

Adobe Flash, something almost all organizations use, is often an easy target for attackers who want to successfully obtain control over your computers and network. And yes, you can do something about it!

Continue reading Stop Your Vulnerabilities in a Flash