Mike Foster's IT Security & Best Practices Blog

Latest Posts

Microsoft Will Stop Protecting Windows 7 on January 14, 2020

Windows 7 computers will still run, your anti-virus will still work, as will your other programs. But you are taking a significant risk because Microsoft will no longer provide security updates that help keep attackers out of your network.

Continue reading Microsoft Will Stop Protecting Windows 7 on January 14, 2020


How to Best Protect Your Mobile Devices

Continue reading How to Best Protect Your Mobile Devices


773 Million Passwords Exposed – Were You Exposed?

Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords

Continue reading 773 Million Passwords Exposed – Were You Exposed?


Watch for Threatening Email Messages that Contain Your Actual Passwords

You may receive a threatening email message that shows you your actual username and password. The attacker may demand you pay them 2900, or some other significant amount. They threaten horrible things if you do not pay.

Continue reading Watch for Threatening Email Messages that Contain Your Actual Passwords


A Simple Change Can Help Protect Your Family, and It Works on Apple and Windows

There is a setting on your computer that can help protect your family.

Continue reading A Simple Change Can Help Protect Your Family, and It Works on Apple and Windows


Patching Nightmare – Please Forward to Your IT Pros

Intel says, again, to stop deploying patches. Java and other new patches need handling.

Continue reading Patching Nightmare – Please Forward to Your IT Pros


Protecting and Restricting iPads, iPhones, and Android Devices

Because many families, and business professionals, received new tablets for the holidays, it is important to consider security. Families, as well as businesses, may choose to restrict permissions on devices. Here’s how:

Continue reading Protecting and Restricting iPads, iPhones, and Android Devices


One Setting Can Protect Your Network from Ransomware

Once an attacker accesses one computer, they attempt to traverse the network and infect other computers too. That’s how ransomware spreads on a network.

Continue reading One Setting Can Protect Your Network from Ransomware


Your Software, such as CCleaner, May Have Backdoors

Can you trust programs you download? Millions of users, including outsourced computer firms, use a program called CCleaner on their own and on customers’ computers. CCleaner just announced that some of its software was compromised and has been stealing data from users’ computers.

Continue reading Your Software, such as CCleaner, May Have Backdoors


Credit Monitoring is Not Enough – You Must Place Credit Freezes to Protect Yourself

Regarding the Equifax breach, the breach affects about half of America’s population, so take action. Experts agree that one of the best things you can do to protect yourself is to place a credit freeze on your credit reports.

Continue reading Credit Monitoring is Not Enough – You Must Place Credit Freezes to Protect Yourself