Mike Foster's IT Security & Best Practices Blog

Latest Posts

A Way to Control Consultant Access – Every Time

What if you’d like to know each and every time a consultant attempted to access your systems? And would you like the ability to approve or deny each attempt?

Continue reading A Way to Control Consultant Access – Every Time


Why is it not Google’s fault?

After last week’s post about the stolen Google and Gmail passwords, one of our valued subscribers wrote back asking why it isn’t Google’s fault that the passwords were stolen.

Continue reading Why is it not Google’s fault?


No More Passwords

How do you feel about giving up passwords entirely? You may have that option soon.

Continue reading No More Passwords