Mike Foster's IT Security & Best Practices Blog

Latest Posts

How to E-Mail Encrypted Attachments

E-mail messages can be intercepted or read by an unauthorized individual.

Continue reading How to E-Mail Encrypted Attachments


Patching – 10 Steps to Seal the Holes in Your Armor

You’ve likely heard of the massive ransomware attack that has taken down so many organizations, including hospitals, around the world. The ransomware appears to have exploited a bug for which Microsoft released a fix a little over a month ago. Follow these 10 steps to help protect your organization from this, and from future attacks:

Continue reading Patching – 10 Steps to Seal the Holes in Your Armor


The Google Scam Shows How, If someone You Know Gets Hacked, it can Make You Look Bad Too.

The Google scam: If anyone receives an email that contains a link to Google Doc, do not click on the link. Even if the email appears to be from someone they know and trust. Google did not get hacked, but someone else who has your email address in their contact list probably did. Anyone who […]

Continue reading The Google Scam Shows How, If someone You Know Gets Hacked, it can Make You Look Bad Too.


More than 1 Billion Passwords Stolen – What to Do

You hear in the news that Yahoo, or some other company, got hacked and your username and password may be in the hands of attackers. There is a way to find out if your credentials were exposed.

Continue reading More than 1 Billion Passwords Stolen – What to Do


Only One Virus is a Huge Problem

If your office has even one instance of a virus, ransomware, or any other kind of malware, that is a huge symptom.

Continue reading Only One Virus is a Huge Problem


If Someone Impersonates You on Facebook

Twice recently, I’ve been contacted by executives who explain that someone was impersonating them on Facebook. They used my friends’ own pictures, sent messages, posted information, and everything was very inappropriate. Each friend asked what to do, and here is the answer in case this happens to you…

Continue reading If Someone Impersonates You on Facebook