Mike Foster's IT Security & Best Practices Blog

Latest Posts

Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks

Will running one rarely used program stop future attacks? It will in the SolarWinds attack and perhaps stop future compromises too.

Continue reading Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks


Three of the Most Useful Links About the SolarWinds Attack:

Even if you don’t use SolarWinds, your suppliers and customers might. In some cases, your security is only as good as their security. There are so many webpages about the Solar Winds attack. Here are three of the most useful. Please forward this to your IT team.

Continue reading Three of the Most Useful Links About the SolarWinds Attack:


The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.

The investigation into the SolarWinds breach keeps revealing more shocking ways attackers infiltrated organizations. Even if your organization doesn’t use SolarWinds, you must take action.

Continue reading The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.


Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks

Bad Actors compromised a product called SolarWinds Orion and then used that as a vector attack organization. Ask your IT team if they use SolarWinds products, and if so, they must

Continue reading Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks


Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them

An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network.

Continue reading Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them


Be Smart and Avoid This Comforting Belief

Someone told me today, as is common: Attackers are only interested in hacking large businesses.

Continue reading Be Smart and Avoid This Comforting Belief


A Hacker Profile – Who Are They?

I experienced a presentation by the US Secret Service last week, and they provided the common background they’ve identified in attackers:

Continue reading A Hacker Profile – Who Are They?


Your Work From Home Users are Like a Box of Chocolates

Because of so many work from home users, the Internet is like a box of chocolates for attackers.

Continue reading Your Work From Home Users are Like a Box of Chocolates


Power Down to Boost Security

One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don’t want to power it down, at least disconnect from your network.

Continue reading Power Down to Boost Security


Zoom Security Settings – The Concise Details

Zoom has many security settings. This is a detailed but concise guide to the settings and how they work.

Continue reading Zoom Security Settings – The Concise Details