Mike Foster's IT Security & Best Practices Blog

Latest Posts

A Hacker Profile – Who Are They?

I experienced a presentation by the US Secret Service last week, and they provided the common background they’ve identified in attackers:

Continue reading A Hacker Profile – Who Are They?


Your Work From Home Users are Like a Box of Chocolates

Because of so many work from home users, the Internet is like a box of chocolates for attackers.

Continue reading Your Work From Home Users are Like a Box of Chocolates


Power Down to Boost Security

One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don’t want to power it down, at least disconnect from your network.

Continue reading Power Down to Boost Security


Zoom Security Settings – The Concise Details

Zoom has many security settings. This is a detailed but concise guide to the settings and how they work.

Continue reading Zoom Security Settings – The Concise Details


Alert Your Team – USB Devices, Login Prompts, and Apps

Warn your users about three ways attackers continue to exploit the COVID-19 crisis:

Continue reading Alert Your Team – USB Devices, Login Prompts, and Apps


Warn Your Workers about Attacker Decoy Tactics

Alert your workers to be on guard looking for fake, decoy websites about coronavirus,

Continue reading Warn Your Workers about Attacker Decoy Tactics


Adobe Flash Stops on December 31, 2020. Are You Ready?

For more than 20 years, Adobe Flash helped websites deliver video content to your screen. However, attackers use Flash to inject ransomware and other malicious code into computers. The bad actors are usually one step ahead of security patches.

Continue reading Adobe Flash Stops on December 31, 2020. Are You Ready?


A Huge Data Leak Exposed Your Personal Information

The most massive data leak that’s ever happened includes neatly bundled information for more than 1 billion people. Keep in mind that the estimated population of the United States is only 330 million. If you use email, you are probably exposed.

Continue reading A Huge Data Leak Exposed Your Personal Information


Protect Your Network Even when Attackers Trick Your Users

A business contacted our office last week because a bad actor tricked an employee to give them full access to their computer. The bad actor immediately took over the network and started performing highly illegal activities that appeared to come from the victim’s systems.  User training is not enough. It is essential to take additional […]

Continue reading Protect Your Network Even when Attackers Trick Your Users


Avoid Opening Word Attachments – Check with IT First

When you receive an email message with a PDF attached, it is always best to confirm that you are expecting the attachment before opening it.  However, if you receive a Word, Excel, or another file type other than a pdf, beware.

Continue reading Avoid Opening Word Attachments – Check with IT First