Mike Foster's IT Security & Best Practices Blog

Latest Posts

What You Need to Do to Protect Yourself after the Equifax Breach

You may be one of the 143 million people affected by the Equifax hacking breach that was announced yesterday. Data stolen may include contact information, dates of birth, driver’s license information, and Social Security numbers. Attackers can make money selling the information to people who could steal your identity and take out loans in your […]

Continue reading What You Need to Do to Protect Yourself after the Equifax Breach


If Someone Impersonates You on Facebook

Twice recently, I’ve been contacted by executives who explain that someone was impersonating them on Facebook. They used my friends’ own pictures, sent messages, posted information, and everything was very inappropriate. Each friend asked what to do, and here is the answer in case this happens to you…

Continue reading If Someone Impersonates You on Facebook


Hackers Can Kill You

Am at the famous DEF CON ® Hacking Conference. One of the presentations today is entitled, “I Will Kill You.” A skilled hacker will show how he can do so by creating a doctor’s medical document showing cause of death,

Continue reading Hackers Can Kill You