Mike Foster's IT Security & Best Practices Blog

Latest Posts

773 Million Passwords Exposed – Were You Exposed?

Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords

Continue reading 773 Million Passwords Exposed – Were You Exposed?


Stealing Tesla Cars, and Stealing Your Network with Agent Tesla

The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization’s security too.

Continue reading Stealing Tesla Cars, and Stealing Your Network with Agent Tesla


Watch for Threatening Email Messages that Contain Your Actual Passwords

You may receive a threatening email message that shows you your actual username and password. The attacker may demand you pay them 2900, or some other significant amount. They threaten horrible things if you do not pay.

Continue reading Watch for Threatening Email Messages that Contain Your Actual Passwords


Stop Hidden Attacks Buried in Email Attachments

When you receive an email attachment, even when you are expecting the document and know the sender, the attached file can be poisoned. 

Continue reading Stop Hidden Attacks Buried in Email Attachments


Three Serious Trends to Watch Out for in Cyber Security

First, are your servers backed up to the cloud? The use of online backup will continue to grow. Organizations are finding out, sometimes the hard way,

Continue reading Three Serious Trends to Watch Out for in Cyber Security


The Three Biggest Cyber Security Trends Right Now

First, the attacker population is outpacing the ability to control them. Attacks are trending higher at an ever-increasing rate. Be extra security-diligent.

Continue reading The Three Biggest Cyber Security Trends Right Now


One Setting Can Protect Your Network from Ransomware

Once an attacker accesses one computer, they attempt to traverse the network and infect other computers too. That’s how ransomware spreads on a network.

Continue reading One Setting Can Protect Your Network from Ransomware


Do the Basics. Do not Believe that Threat Protection Software Will Save You.

This week, someone told me about a group of CEOs who came to the conclusion that their IT security was handled since they installed an artificial intelligence (AI) based threat protection tool. They didn’t know it, but they were wrong. 

Continue reading Do the Basics. Do not Believe that Threat Protection Software Will Save You.


What You Need to Do to Protect Yourself after the Equifax Breach

You may be one of the 143 million people affected by the Equifax hacking breach that was announced yesterday. Data stolen may include contact information, dates of birth, driver’s license information, and Social Security numbers. Attackers can make money selling the information to people who could steal your identity and take out loans in your […]

Continue reading What You Need to Do to Protect Yourself after the Equifax Breach


The UK Is Preparing to Attack Hackers with Army, Navy and Air Force.

The UK is preparing to attack hackers with Army, Navy and Air Force.

Continue reading The UK Is Preparing to Attack Hackers with Army, Navy and Air Force.