Foster Institute
  • What Keeps You
    Up At Night?
  • Cybersecurity Services
  • Professional Speaking
  • FAQs
  • Testimonials
  • Blog
  • Contact
  • 800-657-7107
Select Page
Reasons to Keep Your Same Outsourced Computer Consultant or Managed Service Provider

Reasons to Keep Your Same Outsourced Computer Consultant or Managed Service Provider

by Mike Foster | Sep 1, 2022 | Cloud Security, Cybersecurity, Cybersecurity Audits, Ransomware, Supporting IT Professionals

Our role is to be security advisors to organizations, some of whom outsource their IT services. Executives sometimes express their frustration and ask us whether to fire a Managed Service Provider or third-party IT consulting company that handles all aspects of their...
Battery Backup for Your Work from Home Users’ Internet and Computers for Power Outages

Battery Backup for Your Work from Home Users’ Internet and Computers for Power Outages

by Mike Foster | Jul 7, 2022 | Family Security, Mobile Security

Assuming your remote workers’ temperature is ok, they can continue to work at home during short power outages. You can encourage them to buy, or even issue them, a small uninterruptable power supply UPS for their Internet router. Laptops have built-in battery power....
The Next Time You’re Bored or Waiting, Delete Some Unused Apps from your Android or iPhone

The Next Time You’re Bored or Waiting, Delete Some Unused Apps from your Android or iPhone

by Mike Foster | Jun 16, 2022 | Cloud Security, Cybersecurity, Email Security, Family Security, Mobile Security, Ransomware

You see the headlines: “App discovered to be spying on you,” or “App removed from the store because it was downloading private information.” Delete your third-party apps. You can always reinstall them if you decide to use them. Your phone and...
Anatomy of a Password Attack, and How to Prevent Them

Anatomy of a Password Attack, and How to Prevent Them

by Mike Foster | Jun 9, 2022 | Cybersecurity, Hacking, Password Security

Password attacks against businesses happen all the time. You can protect your organization. Imagine that your firewall has doors to allow connections into your network. Usernames and passwords are the keys to unlocking the doors. An effective cybersecurity control is...
« Older Entries
Next Entries »

  • E-Savvy Newsletter Sign-Up

    Plain English IT Security Solutions and Best Practices for Executives

Recent Blog Post

  • Wire Transfer Fraud Just Got Smarter – Your Defenses Need to Catch Up
  • Executives – Any User Can Accidentally Expose All Your Data Unless IT Changes This Default Setting
  • AI is Listening: What Executives Must Know about Privacy in the Age of Workplace AI Assistants
  • The Executive’s AI Policy Checklist: Is Yours Missing These Essential Clauses?
The Foster Institute
PO Box 11030
Bozeman, MT, 59719

USA / Canada:  1-800-657-7107

International: 707-200-2095

Fax: 1-800-657-8564

International Fax: 1-305-503-9500

Contact

About

  • About Mike Foster
  • What Keeps You Up At Night?
  • Speaking and Training
  • Testimonials
  • Schedule a Consultation

Services

  • IT Vital Systems Security Review and Audit
  • Cybersecurity for Small Businesses
  • Cloud Security
  • Website/Web Application Security
  • Mobile Device Security
  • Penetration Testing
  • Training and Phishing
  • NIST CMMC Compliance
  • Physical Security Evaluation and Red Team Exercises

Resources

  • Help! I’ve Been Hacked
  • Message for CEOs and Executives
  • Message for IT Professionals
  • Home
  • E-Savvy Newsletter
  • FAQs

Contact

The Foster Institute
PO Box 11030
Bozeman, MT, 59719

USA / Canada:  1-800-657-7107

International: 707-200-2095

Fax: 1-800-657-8564

International Fax: 1-305-503-9500

Contact
  • Follow
  • Follow

Subscribe to the E-Savvy Newsletter

Plain English IT Security Solutions and Best Practices for Executives

Proudly Serving the Entire USA

©MMXX The Foster Institute Inc. All Rights Reserved. Legal Forms. Sitemap.Web design & SEO by Prime Concepts Group, Inc.