Mike Foster's IT Security & Best Practices Blog

Latest Posts

Hacker Contest Nets Winners Hundreds of Thousands of Dollars

Hackers competing in this year’s PWN2OWN competition earned hundreds of thousands of dollars. Who paid them?

Continue reading Hacker Contest Nets Winners Hundreds of Thousands of Dollars


Protect Loved Ones from Tech Support Scams and Share this Hilarious Video

A wonderful person who is tech-savvy sent an e-mail message yesterday explaining that she cannot trust her mom with a computer or phone anymore because scammers posing as Microsoft stole $2000 from her.

Continue reading Protect Loved Ones from Tech Support Scams and Share this Hilarious Video


Three Essential Questions to Ask Your IT Team Today Because of the Massive Exchange Attack

So far, it appears that more than 30,000 organizations, including small businesses, are compromised. The US National Security Council urges organizations, including small businesses, to “take immediate measures” to detect compromise.

Continue reading Three Essential Questions to Ask Your IT Team Today Because of the Massive Exchange Attack


Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated Problems

A friend contacted me a few days ago and said, “Every few weeks, I’ll go to a site, and it will say that this appears to be a new device? For example, I’ve looked at my Twitter account this morning, and it put up my username and asked me for my password again. Is this […]

Continue reading Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated Problems


Prepare Now to Recover Quickly from Ransomware on Mac and Windows Computers

Equip all of your Work from Home users with a cloned drive so they can help protect your network and get up and running quickly if they get ransomware or if their hard drive crashes. Protect your home family computers the same way.

Continue reading Prepare Now to Recover Quickly from Ransomware on Mac and Windows Computers


Three of the Most Useful Links About the SolarWinds Attack:

Even if you don’t use SolarWinds, your suppliers and customers might. In some cases, your security is only as good as their security. There are so many webpages about the Solar Winds attack. Here are three of the most useful. Please forward this to your IT team.

Continue reading Three of the Most Useful Links About the SolarWinds Attack:


Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks

Bad Actors compromised a product called SolarWinds Orion and then used that as a vector attack organization. Ask your IT team if they use SolarWinds products, and if so, they must

Continue reading Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks


Beware: Attackers Buy Top Search Engine Results to Trick You

What seems to be the best way to find a company’s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site.

Continue reading Beware: Attackers Buy Top Search Engine Results to Trick You


Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them

An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network.

Continue reading Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them


Your Work From Home Users are Like a Box of Chocolates

Because of so many work from home users, the Internet is like a box of chocolates for attackers.

Continue reading Your Work From Home Users are Like a Box of Chocolates