Mike Foster's IT Security & Best Practices Blog

Latest Posts

Information that You Need to Know About the California Consumer Privacy Act

California’s CCPA act went into effect on January 1, but you have until July 1, 2020 when it is enforced. Get started now. First, you need to

Continue reading Information that You Need to Know About the California Consumer Privacy Act


Adobe Flash Stops on December 31, 2020. Are You Ready?

For more than 20 years, Adobe Flash helped websites deliver video content to your screen. However, attackers use Flash to inject ransomware and other malicious code into computers. The bad actors are usually one step ahead of security patches.

Continue reading Adobe Flash Stops on December 31, 2020. Are You Ready?


Good News for Windows 7 Users

Microsoft stops supporting Windows 7 on January 14, 2020. If you are not going to upgrade, there are options.

Continue reading Good News for Windows 7 Users


A Huge Data Leak Exposed Your Personal Information

The most massive data leak that’s ever happened includes neatly bundled information for more than 1 billion people. Keep in mind that the estimated population of the United States is only 330 million. If you use email, you are probably exposed.

Continue reading A Huge Data Leak Exposed Your Personal Information


What Will You Do if Your Customers’ Spam Filters Block Your Messages?

One of the ways your spam filter helps to stop unwanted messages is to block messages from mail servers with a bad reputation for spamming. What will you do if your company gets labeled as a spammer? First of all, nobody will receive your company’s messages.

Continue reading What Will You Do if Your Customers’ Spam Filters Block Your Messages?


Protect Your Network Even when Attackers Trick Your Users

A business contacted our office last week because a bad actor tricked an employee to give them full access to their computer. The bad actor immediately took over the network and started performing highly illegal activities that appeared to come from the victim’s systems.  User training is not enough. It is essential to take additional […]

Continue reading Protect Your Network Even when Attackers Trick Your Users


Avoid Opening Word Attachments – Check with IT First

When you receive an email message with a PDF attached, it is always best to confirm that you are expecting the attachment before opening it.  However, if you receive a Word, Excel, or another file type other than a pdf, beware.

Continue reading Avoid Opening Word Attachments – Check with IT First


Microsoft Will Stop Protecting Windows 7 on January 14, 2020

Windows 7 computers will still run, your anti-virus will still work, as will your other programs. But you are taking a significant risk because Microsoft will no longer provide security updates that help keep attackers out of your network.

Continue reading Microsoft Will Stop Protecting Windows 7 on January 14, 2020


Never Permit Tech Support to Access your Computer

A company had a problem with their bank’s remote deposit software. They called technical support, and the bank’s software support person announced, “First, I need to connect to your computer to see what is going on.” Fortunately, the company’s team member told the bank’s technical support person,

Continue reading Never Permit Tech Support to Access your Computer


When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6

Wi-Fi technology is always changing. When you buy new Wi-Fi equipment, be sure to ask if there is a Wi-Fi version 6 option available. You will increase speed, security, and help futureproof your investment. Wi-Fi version 6 will become the new standard for several reasons:

Continue reading When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6