Mike Foster's IT Security & Best Practices Blog

Latest Posts

Protect your Company from the Imminent Threat called Eternal Blue

In 2017, the NSA made headlines after developing a hacking tool called Eternal Blue. The NSA did not notify Microsoft of the stockpiled vulnerabilities, so Microsoft didn’t know what holes to seal. The hacker group called Shadow Brokers acquired this powerful hacking tool developed by some of our nation’s best and brightest.

Continue reading Protect your Company from the Imminent Threat called Eternal Blue


You Do Not Need to Understand Computers to Make Ransomware

There is a new program that is designed to help even non-technical people to create ransomware. The tool is called Inpivx, and it is designed to provide easy point-and-click functionality.

Continue reading You Do Not Need to Understand Computers to Make Ransomware


773 Million Passwords Exposed – Were You Exposed?

Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords

Continue reading 773 Million Passwords Exposed – Were You Exposed?


Stealing Tesla Cars, and Stealing Your Network with Agent Tesla

The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization’s security too.

Continue reading Stealing Tesla Cars, and Stealing Your Network with Agent Tesla


Watch for Threatening Email Messages that Contain Your Actual Passwords

You may receive a threatening email message that shows you your actual username and password. The attacker may demand you pay them 2900, or some other significant amount. They threaten horrible things if you do not pay.

Continue reading Watch for Threatening Email Messages that Contain Your Actual Passwords


Stop Hidden Attacks Buried in Email Attachments

When you receive an email attachment, even when you are expecting the document and know the sender, the attached file can be poisoned. 

Continue reading Stop Hidden Attacks Buried in Email Attachments


Three Serious Trends to Watch Out for in Cyber Security

First, are your servers backed up to the cloud? The use of online backup will continue to grow. Organizations are finding out, sometimes the hard way,

Continue reading Three Serious Trends to Watch Out for in Cyber Security


The Three Biggest Cyber Security Trends Right Now

First, the attacker population is outpacing the ability to control them. Attacks are trending higher at an ever-increasing rate. Be extra security-diligent.

Continue reading The Three Biggest Cyber Security Trends Right Now


One Setting Can Protect Your Network from Ransomware

Once an attacker accesses one computer, they attempt to traverse the network and infect other computers too. That’s how ransomware spreads on a network.

Continue reading One Setting Can Protect Your Network from Ransomware


Do the Basics. Do not Believe that Threat Protection Software Will Save You.

This week, someone told me about a group of CEOs who came to the conclusion that their IT security was handled since they installed an artificial intelligence (AI) based threat protection tool. They didn’t know it, but they were wrong. 

Continue reading Do the Basics. Do not Believe that Threat Protection Software Will Save You.