Mike Foster's IT Security & Best Practices Blog

Latest Posts

Attackers are Targeting High Net Worth Individuals

An experienced high-level executive shared his concern about how attackers are investing more time targeting high net worth individuals.

Continue reading Attackers are Targeting High Net Worth Individuals


Happy Computer Security Day!

November 30th is Computer Security Day. Today is a great day to remind your team members to continue to be extra vigilant as they watch for spam email messages. 

Continue reading Happy Computer Security Day!


Updated: Forward these 7 Minimum Security Requirements for Your Small Service Providers

Many organizations outsource to service providers that are not cyber-secure. It is common for companies to experience a significant security breach that originated at a third party. Just ask Target. Forward this request to your small outsourced providers asking them to do these seven things.

Continue reading Updated: Forward these 7 Minimum Security Requirements for Your Small Service Providers


The Three Biggest Cyber Security Trends Right Now

First, the attacker population is outpacing the ability to control them. Attacks are trending higher at an ever-increasing rate. Be extra security-diligent.

Continue reading The Three Biggest Cyber Security Trends Right Now


Do the Basics. Do not Believe that Threat Protection Software Will Save You.

This week, someone told me about a group of CEOs who came to the conclusion that their IT security was handled since they installed an artificial intelligence (AI) based threat protection tool. They didn’t know it, but they were wrong. 

Continue reading Do the Basics. Do not Believe that Threat Protection Software Will Save You.


Your Software, such as CCleaner, May Have Backdoors

Can you trust programs you download? Millions of users, including outsourced computer firms, use a program called CCleaner on their own and on customers’ computers. CCleaner just announced that some of its software was compromised and has been stealing data from users’ computers.

Continue reading Your Software, such as CCleaner, May Have Backdoors


Straw, Sticks, or Brick: How to Tell Which Your Network Is, and How to Improve It

Just yesterday, someone told me they think they are secure because they have anti-virus, strong passwords and a firewall. Last weekend, I asked my daughter to tell me a fairy tale. She chose The Three Little Pigs and the Big Bad Wolf. As she told the story, it became so clear that organizations use straw, […]

Continue reading Straw, Sticks, or Brick: How to Tell Which Your Network Is, and How to Improve It


Attackers Are Using Mobile Devices as a Bridge into Your Network

A newly discovered virus, called Milky Door, permits attackers to connect to your organization’s network through apps on mobile devices. The users have no idea their mobile device is being used in this way.

Continue reading Attackers Are Using Mobile Devices as a Bridge into Your Network


Alert Your IT Team – Urgent Patch for Network Servers

Many organizations use VMware to host their servers. VMware has released an urgent update they label as

Continue reading Alert Your IT Team – Urgent Patch for Network Servers


Alert IT to Graphics Component Patches

Security patches are so important to security, but they are difficult to manage and you always stand the risk of a patch interrupting productivity. And there are some new patches your IT team needs to know about…

Continue reading Alert IT to Graphics Component Patches