by Mike Foster | Jan 7, 2022 | Cybersecurity, Cybersecurity Audits, Hacking
As an executive that leads, and depends on, your IT Professionals or outsourced IT provider, be sure to know these five essential steps that have a massive impact on your cybersecurity protection and how frequently your team must address them: Apply Critical Security...
by Mike Foster | Dec 23, 2021 | Cybersecurity, Supporting IT Professionals
Technical issues happen all the time, and you don’t hear about them because your IT professionals solve the problem efficiently and quietly. They use their skills and experience to perform monumental feats every month, and most executives have no idea what their...
by Mike Foster | Dec 15, 2021 | Cybersecurity, Cybersecurity Audits, Family Security, Hacking
Some of our customers take the Log4j situation seriously, and some ignore it. You or your organization might use products and services from Amazon, Apple, Cisco, Google, LinkedIn, VMware, and other affected organizations. Do not ignore the danger. Attackers are...
by Mike Foster | Nov 19, 2021 | Cybersecurity, Family Security, Hacking, Password Security
Data aggregation firms gather information on human beings and sell data to marketing companies, insurance companies, creditors, even employers. Sources of information include public records, loyalty programs, credit and gift cards, social media, web searches, apps,...