Mike Foster's IT Security & Best Practices Blog

Latest Posts

Avoid Opening Word Attachments – Check with IT First

When you receive an email message with a PDF attached, it is always best to confirm that you are expecting the attachment before opening it.  However, if you receive a Word, Excel, or another file type other than a pdf, beware.

Continue reading Avoid Opening Word Attachments – Check with IT First


Microsoft Will Stop Protecting Windows 7 on January 14, 2020

Windows 7 computers will still run, your anti-virus will still work, as will your other programs. But you are taking a significant risk because Microsoft will no longer provide security updates that help keep attackers out of your network.

Continue reading Microsoft Will Stop Protecting Windows 7 on January 14, 2020


How to Best Protect Your Mobile Devices

Continue reading How to Best Protect Your Mobile Devices


773 Million Passwords Exposed – Were You Exposed?

Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords

Continue reading 773 Million Passwords Exposed – Were You Exposed?


Watch for Threatening Email Messages that Contain Your Actual Passwords

You may receive a threatening email message that shows you your actual username and password. The attacker may demand you pay them 2900, or some other significant amount. They threaten horrible things if you do not pay.

Continue reading Watch for Threatening Email Messages that Contain Your Actual Passwords


A Simple Change Can Help Protect Your Family, and It Works on Apple and Windows

There is a setting on your computer that can help protect your family.

Continue reading A Simple Change Can Help Protect Your Family, and It Works on Apple and Windows


Patching Nightmare – Please Forward to Your IT Pros

Intel says, again, to stop deploying patches. Java and other new patches need handling.

Continue reading Patching Nightmare – Please Forward to Your IT Pros


Protecting and Restricting iPads, iPhones, and Android Devices

Because many families, and business professionals, received new tablets for the holidays, it is important to consider security. Families, as well as businesses, may choose to restrict permissions on devices. Here’s how:

Continue reading Protecting and Restricting iPads, iPhones, and Android Devices


One Setting Can Protect Your Network from Ransomware

Once an attacker accesses one computer, they attempt to traverse the network and infect other computers too. That’s how ransomware spreads on a network.

Continue reading One Setting Can Protect Your Network from Ransomware


Your Software, such as CCleaner, May Have Backdoors

Can you trust programs you download? Millions of users, including outsourced computer firms, use a program called CCleaner on their own and on customers’ computers. CCleaner just announced that some of its software was compromised and has been stealing data from users’ computers.

Continue reading Your Software, such as CCleaner, May Have Backdoors