Mike Foster's IT Security & Best Practices Blog

Latest Posts

Protect your Company from the Imminent Threat called Eternal Blue

In 2017, the NSA made headlines after developing a hacking tool called Eternal Blue. The NSA did not notify Microsoft of the stockpiled vulnerabilities, so Microsoft didn’t know what holes to seal. The hacker group called Shadow Brokers acquired this powerful hacking tool developed by some of our nation’s best and brightest.

Continue reading Protect your Company from the Imminent Threat called Eternal Blue


When Trusted Programs get Hacked: An Attacker May Be Putting Germs on Your Toothbrush

It is like someone borrowing your toothbrush without you knowing, and you get sick from their germs. Think of programs on computers as being something that can be used to make you sick. As 2018 continues, more attackers will use trusted software as a vector to infect networks.

Continue reading When Trusted Programs get Hacked: An Attacker May Be Putting Germs on Your Toothbrush


Three Serious Trends to Watch Out for in Cyber Security

First, are your servers backed up to the cloud? The use of online backup will continue to grow. Organizations are finding out, sometimes the hard way,

Continue reading Three Serious Trends to Watch Out for in Cyber Security


One Setting Can Protect Your Network from Ransomware

Once an attacker accesses one computer, they attempt to traverse the network and infect other computers too. That’s how ransomware spreads on a network.

Continue reading One Setting Can Protect Your Network from Ransomware


Please Alert Your IT Pros – Increase Your Security Log File Capacity

Windows computers can keep a log of security events, such as failed logon attempts. It is helpful to know if attackers are trying to gain access to your network. When the log fills up, it overwrites itself with the oldest events first. By default, the log files are very small, and that makes it much […]

Continue reading Please Alert Your IT Pros – Increase Your Security Log File Capacity


Recover Quickly if Ransomware Attacks at Remote Worker and Home Computers

Ransomware is a common problem. If an attacker encrypts all your files and demands that you pay ransom to unlock your files, you will want to be able to recover quickly. Regular backups are not enough.

Continue reading Recover Quickly if Ransomware Attacks at Remote Worker and Home Computers


Straw, Sticks, or Brick: How to Tell Which Your Network Is, and How to Improve It

Just yesterday, someone told me they think they are secure because they have anti-virus, strong passwords and a firewall. Last weekend, I asked my daughter to tell me a fairy tale. She chose The Three Little Pigs and the Big Bad Wolf. As she told the story, it became so clear that organizations use straw, […]

Continue reading Straw, Sticks, or Brick: How to Tell Which Your Network Is, and How to Improve It


Get Apple’s Urgent Patches that Fix Dozens of Security Holes

For those of you with Apple products, Apple just released some important updates. Knowing that updates might cause a problem, please back up your computer first. You are backing up all the time already, right? Time Machine is a wonderful tool and is built in. If you want to supplement Time Machine with an additional […]

Continue reading Get Apple’s Urgent Patches that Fix Dozens of Security Holes


Patching – 10 Steps to Seal the Holes in Your Armor

You’ve likely heard of the massive ransomware attack that has taken down so many organizations, including hospitals, around the world. The ransomware appears to have exploited a bug for which Microsoft released a fix a little over a month ago. Follow these 10 steps to help protect your organization from this, and from future attacks:

Continue reading Patching – 10 Steps to Seal the Holes in Your Armor


Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization

It happens all the time: A user clicks on a link in an email message, and the computer gets infected. Ransomware can lock up the data on the drive or even your servers. Sensitive data can be stolen, wire transfers attempted, and other bad things can happen. When a user is tricked into clicking on […]

Continue reading Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization