Mike Foster's IT Security & Best Practices Blog

Latest Posts

Two-Step Logon – You Only Need to do it Once

Using two-step logon is one of the best things you can do to keep unauthorized people from logging into your account. Use the checkbox to “remember this device”

Continue reading Two-Step Logon – You Only Need to do it Once


Zoom Security – Set Up Two-Step Login

Protect your Zoom account. If someone discovers your username and password for Zoom, two-step login should block them from logging in as you.

Continue reading Zoom Security – Set Up Two-Step Login


Zoom Security Settings – The Concise Details

Zoom has many security settings. This is a detailed but concise guide to the settings and how they work.

Continue reading Zoom Security Settings – The Concise Details


Recommendations for Cybersecurity for Remote Workers During Coronavirus

The rapidly changing situation of potential school closures, self-quarantines, and public reaction to the coronavirus guarantees that at some point you will have employees who need to work from home.

Continue reading Recommendations for Cybersecurity for Remote Workers During Coronavirus


Avoid Opening Word Attachments – Check with IT First

When you receive an email message with a PDF attached, it is always best to confirm that you are expecting the attachment before opening it.  However, if you receive a Word, Excel, or another file type other than a pdf, beware.

Continue reading Avoid Opening Word Attachments – Check with IT First


What to Do if Someone Hacks Your Email Account

How to protect yourself if, or even before, an unauthorized spammer uses one of your email accounts to send out spam:

Continue reading What to Do if Someone Hacks Your Email Account