Mike Foster's IT Security & Best Practices Blog

Latest Posts

How to Best Protect Your Mobile Devices

Continue reading How to Best Protect Your Mobile Devices


773 Million Passwords Exposed – Were You Exposed?

Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords

Continue reading 773 Million Passwords Exposed – Were You Exposed?


The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else

Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet. You assign your IT team

Continue reading The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else


Watch for Threatening Email Messages that Contain Your Actual Passwords

You may receive a threatening email message that shows you your actual username and password. The attacker may demand you pay them 2900, or some other significant amount. They threaten horrible things if you do not pay.

Continue reading Watch for Threatening Email Messages that Contain Your Actual Passwords


A New Opportunity for Your IT Pros to Protect your Servers

Attackers can take advantage of a large attack surface on your servers. Your IT professionals can drastically reduce the attack surface, and potentially save you money.

Continue reading A New Opportunity for Your IT Pros to Protect your Servers


How Buying a Spare Printer can Vastly Improve Your Cyber Security

Imagine a scenario when an IT professional knows there is an urgent security problem in your firewall that needs to be addressed. And at the same time, your multi-function printer is broken. What problem will the IT professional address first?

Continue reading How Buying a Spare Printer can Vastly Improve Your Cyber Security


When Trusted Programs get Hacked: An Attacker May Be Putting Germs on Your Toothbrush

It is like someone borrowing your toothbrush without you knowing, and you get sick from their germs. Think of programs on computers as being something that can be used to make you sick. As 2018 continues, more attackers will use trusted software as a vector to infect networks.

Continue reading When Trusted Programs get Hacked: An Attacker May Be Putting Germs on Your Toothbrush


Three Serious Trends to Watch Out for in Cyber Security

First, are your servers backed up to the cloud? The use of online backup will continue to grow. Organizations are finding out, sometimes the hard way,

Continue reading Three Serious Trends to Watch Out for in Cyber Security


About Half of All Breaches are Caused by a Contractor or Service Provider

In our experience of auditing after breaches have happened, about half were caused by a service provider working for the company that gets breached.

Continue reading About Half of All Breaches are Caused by a Contractor or Service Provider


One Setting Can Protect Your Network from Ransomware

Once an attacker accesses one computer, they attempt to traverse the network and infect other computers too. That’s how ransomware spreads on a network.

Continue reading One Setting Can Protect Your Network from Ransomware