Mike Foster's IT Security & Best Practices Blog

Latest Posts

Protecting and Restricting iPads, iPhones, and Android Devices

Because many families, and business professionals, received new tablets for the holidays, it is important to consider security. Families, as well as businesses, may choose to restrict permissions on devices. Here’s how:

Continue reading Protecting and Restricting iPads, iPhones, and Android Devices


Portable Radios Can Replace Family Phones

This is the time of the year when youngsters remind parents that all of their friends have phones, the latest model is out, and everyone is getting one! Some parents ask if there is an alternative. Yes.

Continue reading Portable Radios Can Replace Family Phones


What You Need to Do to Protect Yourself after the Equifax Breach

You may be one of the 143 million people affected by the Equifax hacking breach that was announced yesterday. Data stolen may include contact information, dates of birth, driver’s license information, and Social Security numbers. Attackers can make money selling the information to people who could steal your identity and take out loans in your […]

Continue reading What You Need to Do to Protect Yourself after the Equifax Breach


Moms, Dads, and Friends: Take 7 Steps to Secure Your Students’ Computers

School is starting again and many students need computers. Take these important steps to help make them more secure:

Continue reading Moms, Dads, and Friends: Take 7 Steps to Secure Your Students’ Computers


More than 1 Billion Passwords Stolen – What to Do

You hear in the news that Yahoo, or some other company, got hacked and your username and password may be in the hands of attackers. There is a way to find out if your credentials were exposed.

Continue reading More than 1 Billion Passwords Stolen – What to Do


Avoid These 3 Really Good Hacker Tricks

Attackers prey on people trusting others. Watch out for these three common tricks.

Continue reading Avoid These 3 Really Good Hacker Tricks


Avoid Public Wireless Networks and Hot Spots

As executives take summer vacations, they will be tempted to connect to public WiFi wireless network hotspots at airports, coffee shops, hotels, etc.  Before you connect, know the risks.

Continue reading Avoid Public Wireless Networks and Hot Spots


Know Before You Click

Before you click on a link, if you want input about whether or not the link takes you to a dangerous site, Google provides a tool that can help you know…

Continue reading Know Before You Click


Stop Your Vulnerabilities in a Flash

Adobe Flash, something almost all organizations use, is often an easy target for attackers who want to successfully obtain control over your computers and network. And yes, you can do something about it!

Continue reading Stop Your Vulnerabilities in a Flash


Kids, Coughs, and Cyber Security

We learn things from our kids. Will our kids teach us to be more secure using computers?

Continue reading Kids, Coughs, and Cyber Security