Mike Foster's IT Security & Best Practices Blog

Latest Posts

How to Best Protect Your Mobile Devices

Continue reading How to Best Protect Your Mobile Devices


773 Million Passwords Exposed – Were You Exposed?

Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords

Continue reading 773 Million Passwords Exposed – Were You Exposed?


Attackers are Targeting High Net Worth Individuals

An experienced high-level executive shared his concern about how attackers are investing more time targeting high net worth individuals.

Continue reading Attackers are Targeting High Net Worth Individuals


Happy Computer Security Day!

November 30th is Computer Security Day. Today is a great day to remind your team members to continue to be extra vigilant as they watch for spam email messages. 

Continue reading Happy Computer Security Day!


Stealing Tesla Cars, and Stealing Your Network with Agent Tesla

The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization’s security too.

Continue reading Stealing Tesla Cars, and Stealing Your Network with Agent Tesla


Can you Trust the Kindness of Tech Support Strangers?

If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your computer, think twice.

Continue reading Can you Trust the Kindness of Tech Support Strangers?


The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else

Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet. You assign your IT team

Continue reading The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else


Updated: Forward these 7 Minimum Security Requirements for Your Small Service Providers

Many organizations outsource to service providers that are not cyber-secure. It is common for companies to experience a significant security breach that originated at a third party. Just ask Target. Forward this request to your small outsourced providers asking them to do these seven things.

Continue reading Updated: Forward these 7 Minimum Security Requirements for Your Small Service Providers


Stop Hidden Attacks Buried in Email Attachments

When you receive an email attachment, even when you are expecting the document and know the sender, the attached file can be poisoned. 

Continue reading Stop Hidden Attacks Buried in Email Attachments


Ask IT Pros to Check Your Routers and Firewalls

We audited a company last week and discovered that their web filtering tools, designed to stop users from accidentally landing on malicious websites, was not blocking dangerous sites. In these days with ransomware and bad actors tricking users into clicking on dangerous links, it is essential to have web content filtering in place.

Continue reading Ask IT Pros to Check Your Routers and Firewalls