Mike Foster's IT Security & Best Practices Blog

Latest Posts

Updated: Forward these 7 Minimum Security Requirements for Your Small Service Providers

Many organizations outsource to service providers that are not cyber-secure. It is common for companies to experience a significant security breach that originated at a third party. Just ask Target. Forward this request to your small outsourced providers asking them to do these seven things.

Continue reading Updated: Forward these 7 Minimum Security Requirements for Your Small Service Providers


Moms, Dads, and Friends: Take 7 Steps to Secure Your Students’ Computers

School is starting again and many students need computers. Take these important steps to help make them more secure:

Continue reading Moms, Dads, and Friends: Take 7 Steps to Secure Your Students’ Computers


Patching – 10 Steps to Seal the Holes in Your Armor

You’ve likely heard of the massive ransomware attack that has taken down so many organizations, including hospitals, around the world. The ransomware appears to have exploited a bug for which Microsoft released a fix a little over a month ago. Follow these 10 steps to help protect your organization from this, and from future attacks:

Continue reading Patching – 10 Steps to Seal the Holes in Your Armor


Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization

It happens all the time: A user clicks on a link in an email message, and the computer gets infected. Ransomware can lock up the data on the drive or even your servers. Sensitive data can be stolen, wire transfers attempted, and other bad things can happen. When a user is tricked into clicking on […]

Continue reading Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization


How to Find Out if Your Password Might Have Been Hacked

You hear in the news that Yahoo, or some other company, got hacked and your username and password may be in the hands of attackers. There is a way to find out if your credentials were exposed.

Continue reading How to Find Out if Your Password Might Have Been Hacked


Security Version 2.0

Here is another powerful way to strengthen security – upgrade to the newest versions. Just like last week, your key tool will be your application inventory. It will look something like this…

Continue reading Security Version 2.0


No Flash Attacks After June 30

Starting June 30, 2016, Google will no longer accept advertisements that use Flash. What this means: Better security for you and your organization. You needn’t buy anything or change anything. It will all happen automatically.

Continue reading No Flash Attacks After June 30


Know Before You Click

Before you click on a link, if you want input about whether or not the link takes you to a dangerous site, Google provides a tool that can help you know…

Continue reading Know Before You Click


If you use Firefox, Update it Now

Open Firefox, click on the little square icon near the top-right of your screen that is composed of three horizontal bars. Then click the question mark for “help”.  Third, select “About Firefox.”  Firefox will automatically download the latest version.

Continue reading If you use Firefox, Update it Now


Is Google Apps or Microsoft 365 more secure?

A CFO asked, “I would really love to hear your take on Google vs Microsoft 365 and see if you fall on one side or the other.” When it comes to cyber-security for those two big players…

Continue reading Is Google Apps or Microsoft 365 more secure?