by Mike Foster | Sep 1, 2022 | Cloud Security, Cybersecurity, Cybersecurity Audits, Ransomware, Supporting IT Professionals
Our role is to be security advisors to organizations, some of whom outsource their IT services. Executives sometimes express their frustration and ask us whether to fire a Managed Service Provider or third-party IT consulting company that handles all aspects of their...
by Mike Foster | Jul 7, 2022 | Family Security, Mobile Security
Assuming your remote workers’ temperature is ok, they can continue to work at home during short power outages. You can encourage them to buy, or even issue them, a small uninterruptable power supply UPS for their Internet router. Laptops have built-in battery power....
by Mike Foster | Jun 16, 2022 | Cloud Security, Cybersecurity, Email Security, Family Security, Mobile Security, Ransomware
You see the headlines: “App discovered to be spying on you,” or “App removed from the store because it was downloading private information.” Delete your third-party apps. You can always reinstall them if you decide to use them. Your phone and...
by Mike Foster | Jun 9, 2022 | Cybersecurity, Hacking, Password Security
Password attacks against businesses happen all the time. You can protect your organization. Imagine that your firewall has doors to allow connections into your network. Usernames and passwords are the keys to unlocking the doors. An effective cybersecurity control is...