Mike Foster's IT Security & Best Practices Blog

Latest Posts

Fix A Computer in Minutes and It Works Almost Every Time

I was stranded in the Portland airport last night because of a mechanical failure on the first flight. You’ve had similar situations for sure. What would your travel experience be like if the airlines could immediately reset a plane to be brand new if it breaks?

Continue reading Fix A Computer in Minutes and It Works Almost Every Time


Straw, Sticks, or Brick: How to Tell Which Your Network Is, and How to Improve It

Just yesterday, someone told me they think they are secure because they have anti-virus, strong passwords and a firewall. Last weekend, I asked my daughter to tell me a fairy tale. She chose The Three Little Pigs and the Big Bad Wolf. As she told the story, it became so clear that organizations use straw, […]

Continue reading Straw, Sticks, or Brick: How to Tell Which Your Network Is, and How to Improve It


Get Apple’s Urgent Patches that Fix Dozens of Security Holes

For those of you with Apple products, Apple just released some important updates. Knowing that updates might cause a problem, please back up your computer first. You are backing up all the time already, right? Time Machine is a wonderful tool and is built in. If you want to supplement Time Machine with an additional […]

Continue reading Get Apple’s Urgent Patches that Fix Dozens of Security Holes


1 Million Android User Accounts Reported Hacked

It was reported yesterday that malicious apps running on Android phones has resulted in 1 million Google user accounts being hacked. Check Point Software Technologies estimates that 75% of Android phones are still vulnerable to this attack. Once the attackers take over the phone, they can then gain access to the user’s Google accounts. Often […]

Continue reading 1 Million Android User Accounts Reported Hacked


“This is Your Captain Speaking – No Samsung Phones Allowed”

Yesterday afternoon, I and some of the more than 100 other passengers on our jet were paying attention to the safety demo. Unexpectedly, the announcement included a statement that prohibited the use of a Samsung Galaxy Note 7 phone. Additionally, charging such a device is prohibited too. Now that’s harsh… or is it?

Continue reading “This is Your Captain Speaking – No Samsung Phones Allowed”


Cyber Security’s Three Essential Steps

In this time of gratitude, which is perhaps the most important foundation of happiness and success, it is important to thank you for helping make the world a safer place. Three controls, perhaps the most important three controls, help protect you from cyber-threats. They are:

Continue reading Cyber Security’s Three Essential Steps


Your IT Pros Deserve This

Give your IT Professionals an edge, and show your appreciation of them at the same time.

Continue reading Your IT Pros Deserve This


New Hard Drives Need Electricity or they Lose Your Data

Most computers, for years now, have used hard drives to store data files. Those drives have metal discs that spin around. Drives that use newer technology have no moving parts…

Continue reading New Hard Drives Need Electricity or they Lose Your Data


Kids, Coughs, and Cyber Security

We learn things from our kids. Will our kids teach us to be more secure using computers?

Continue reading Kids, Coughs, and Cyber Security


A Possible Solution for Ransomware

Ransomware is hitting so many companies hard. If you’ve not heard of it, you will soon. Ransomware is an infection that encrypts files on your network such that you cannot access the files. This can be devastating. The best way to deal with ransomware is…

Continue reading A Possible Solution for Ransomware