Mike Foster's IT Security & Best Practices Blog

Latest Posts

Microsoft Will Stop Protecting Windows 7 on January 14, 2020

Windows 7 computers will still run, your anti-virus will still work, as will your other programs. But you are taking a significant risk because Microsoft will no longer provide security updates that help keep attackers out of your network.

Continue reading Microsoft Will Stop Protecting Windows 7 on January 14, 2020


Stealing Tesla Cars, and Stealing Your Network with Agent Tesla

The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization’s security too.

Continue reading Stealing Tesla Cars, and Stealing Your Network with Agent Tesla


A New Opportunity for Your IT Pros to Protect your Servers

Attackers can take advantage of a large attack surface on your servers. Your IT professionals can drastically reduce the attack surface, and potentially save you money.

Continue reading A New Opportunity for Your IT Pros to Protect your Servers


Patching Nightmare – Please Forward to Your IT Pros

Intel says, again, to stop deploying patches. Java and other new patches need handling.

Continue reading Patching Nightmare – Please Forward to Your IT Pros


About Half of All Breaches are Caused by a Contractor or Service Provider

In our experience of auditing after breaches have happened, about half were caused by a service provider working for the company that gets breached.

Continue reading About Half of All Breaches are Caused by a Contractor or Service Provider


One Setting Can Protect Your Network from Ransomware

Once an attacker accesses one computer, they attempt to traverse the network and infect other computers too. That’s how ransomware spreads on a network.

Continue reading One Setting Can Protect Your Network from Ransomware


Please Alert Your IT Pros – Increase Your Security Log File Capacity

Windows computers can keep a log of security events, such as failed logon attempts. It is helpful to know if attackers are trying to gain access to your network. When the log fills up, it overwrites itself with the oldest events first. By default, the log files are very small, and that makes it much […]

Continue reading Please Alert Your IT Pros – Increase Your Security Log File Capacity


Do the Basics. Do not Believe that Threat Protection Software Will Save You.

This week, someone told me about a group of CEOs who came to the conclusion that their IT security was handled since they installed an artificial intelligence (AI) based threat protection tool. They didn’t know it, but they were wrong. 

Continue reading Do the Basics. Do not Believe that Threat Protection Software Will Save You.


Your iPhone and iPad are in Danger

If you use Apple products, here is what to do to protect yourself. By now, you’ve probably heard that attackers have told Apple that they have access to millions

Continue reading Your iPhone and iPad are in Danger


Smooth and Slippery for IT Security

When talking about security, a good example is the large polished stainless steel sculpture commonly known as The Bean. If someone wanted to climb the bean, they would quickly find that the smooth surface provides no place to get a foothold. Make your computers like The Bean. Every single program installed on your computers provides […]

Continue reading Smooth and Slippery for IT Security