Mike Foster's IT Security & Best Practices Blog

Latest Posts

Your 2021 Budget Should Accurately Differentiate IT Expenses from Cyber Risk Management.

Recently, the CEO of an organization told me that his budgeting process demonstrates his commitment to protecting from cyber-attacks because he includes his investments in the IT Vital Systems Reviews as part of his risk management budget. You might already do this too.

Continue reading Your 2021 Budget Should Accurately Differentiate IT Expenses from Cyber Risk Management.


If You Get Hacked, Do Not Email Anyone About It

You’ve trained your users to be vigilant for symptoms of cybersecurity issues. Now teach them to share their concerns confidentially.

Continue reading If You Get Hacked, Do Not Email Anyone About It


Geo-Blocking is an Essential Protection

Your security logs for your firewall, for Azure, Office 365, and more, might show attacks from countries worldwide.

Continue reading Geo-Blocking is an Essential Protection


Your Work From Home Users are Like a Box of Chocolates

Because of so many work from home users, the Internet is like a box of chocolates for attackers.

Continue reading Your Work From Home Users are Like a Box of Chocolates


Did you Fail to Plan for the Pandemic? Plan for a Microsoft Outage or a GPS Provider Attack.

Last weekend, our family drove to southwestern Montana looking for Coolidge, a thriving mining town turned Ghost Town. After we entered a remote valley,

Continue reading Did you Fail to Plan for the Pandemic? Plan for a Microsoft Outage or a GPS Provider Attack.


Two-Step Logon – You Only Need to do it Once

Using two-step logon is one of the best things you can do to keep unauthorized people from logging into your account. Use the checkbox to “remember this device”

Continue reading Two-Step Logon – You Only Need to do it Once


Zoom Security – Set Up Two-Step Login

Protect your Zoom account. If someone discovers your username and password for Zoom, two-step login should block them from logging in as you.

Continue reading Zoom Security – Set Up Two-Step Login


Zoom Security Settings – The Concise Details

Zoom has many security settings. This is a detailed but concise guide to the settings and how they work.

Continue reading Zoom Security Settings – The Concise Details


Recommendations for Cybersecurity for Remote Workers During Coronavirus

The rapidly changing situation of potential school closures, self-quarantines, and public reaction to the coronavirus guarantees that at some point you will have employees who need to work from home.

Continue reading Recommendations for Cybersecurity for Remote Workers During Coronavirus


Avoid Opening Word Attachments – Check with IT First

When you receive an email message with a PDF attached, it is always best to confirm that you are expecting the attachment before opening it.  However, if you receive a Word, Excel, or another file type other than a pdf, beware.

Continue reading Avoid Opening Word Attachments – Check with IT First