Mike Foster's IT Security & Best Practices Blog

Latest Posts

Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks

Will running one rarely used program stop future attacks? It will in the SolarWinds attack and perhaps stop future compromises too.

Continue reading Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks


Three of the Most Useful Links About the SolarWinds Attack:

Even if you don’t use SolarWinds, your suppliers and customers might. In some cases, your security is only as good as their security. There are so many webpages about the Solar Winds attack. Here are three of the most useful. Please forward this to your IT team.

Continue reading Three of the Most Useful Links About the SolarWinds Attack:


If You Get Hacked, Do Not Email Anyone About It

You’ve trained your users to be vigilant for symptoms of cybersecurity issues. Now teach them to share their concerns confidentially.

Continue reading If You Get Hacked, Do Not Email Anyone About It


One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself

Workers who use their personal home computers for business put you at significant risk.

Continue reading One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself


Be Smart and Avoid This Comforting Belief

Someone told me today, as is common: Attackers are only interested in hacking large businesses.

Continue reading Be Smart and Avoid This Comforting Belief


Your Work From Home Users are Like a Box of Chocolates

Because of so many work from home users, the Internet is like a box of chocolates for attackers.

Continue reading Your Work From Home Users are Like a Box of Chocolates


Power Down to Boost Security

One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don’t want to power it down, at least disconnect from your network.

Continue reading Power Down to Boost Security


Alert Your Team – USB Devices, Login Prompts, and Apps

Warn your users about three ways attackers continue to exploit the COVID-19 crisis:

Continue reading Alert Your Team – USB Devices, Login Prompts, and Apps


Warn Your Workers about Attacker Decoy Tactics

Alert your workers to be on guard looking for fake, decoy websites about coronavirus,

Continue reading Warn Your Workers about Attacker Decoy Tactics


Information that You Need to Know About the California Consumer Privacy Act

California’s CCPA act went into effect on January 1, but you have until July 1, 2020 when it is enforced. Get started now. First, you need to

Continue reading Information that You Need to Know About the California Consumer Privacy Act