Mike Foster's IT Security & Best Practices Blog

Latest Posts

A Quick Way to Automatically Help Users Identify Impersonation Email Messages

Fraudsters can pretend to be an executive at a company to request wire transfers or gift card purchases. To reduce the chance of a message duping someone at your company:

Continue reading A Quick Way to Automatically Help Users Identify Impersonation Email Messages


Attackers are Targeting High Net Worth Individuals

An experienced high-level executive shared his concern about how attackers are investing more time targeting high net worth individuals.

Continue reading Attackers are Targeting High Net Worth Individuals


Can you Trust the Kindness of Tech Support Strangers?

If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your computer, think twice.

Continue reading Can you Trust the Kindness of Tech Support Strangers?


Watch for Threatening Email Messages that Contain Your Actual Passwords

You may receive a threatening email message that shows you your actual username and password. The attacker may demand you pay them 2900, or some other significant amount. They threaten horrible things if you do not pay.

Continue reading Watch for Threatening Email Messages that Contain Your Actual Passwords


The Google Scam Shows How, If someone You Know Gets Hacked, it can Make You Look Bad Too.

The Google scam: If anyone receives an email that contains a link to Google Doc, do not click on the link. Even if the email appears to be from someone they know and trust. Google did not get hacked, but someone else who has your email address in their contact list probably did. Anyone who […]

Continue reading The Google Scam Shows How, If someone You Know Gets Hacked, it can Make You Look Bad Too.


Alert – A Popular Password Manager Has Serious Security Flaw Right Now

A password manager company announced that there is a vulnerability that could allow attackers to gather stored passwords.

Continue reading Alert – A Popular Password Manager Has Serious Security Flaw Right Now


E-Mail Protection Solution

Everyone is concerned about the danger of a user clicking on a link in an email message, perhaps invoking a ransomware attack, or users responding to requests to transfer money. There are tools that will help.

Continue reading E-Mail Protection Solution


Protect Against Bad Attachments and Employee Downloads

Imagine giving each of your team members a loaner computer every time they need to open a file that they download or receive as an attachment. The loaner computers won’t be connected to your network, so if a file is infected, ransomware and other viruses would not affect your network.

Continue reading Protect Against Bad Attachments and Employee Downloads


Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization

It happens all the time: A user clicks on a link in an email message, and the computer gets infected. Ransomware can lock up the data on the drive or even your servers. Sensitive data can be stolen, wire transfers attempted, and other bad things can happen. When a user is tricked into clicking on […]

Continue reading Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization


Avoid These 3 Really Good Hacker Tricks

Attackers prey on people trusting others. Watch out for these three common tricks.

Continue reading Avoid These 3 Really Good Hacker Tricks