Foster Institute
  • What Keeps You
    Up At Night?
  • Cybersecurity Services
  • Professional Speaking
  • FAQs
  • Testimonials
  • Blog
  • Contact
  • 800-657-7107
Select Page
Executives: Five Key Cybersecurity Steps to Protect Your Organization, and the Vital Timing

Executives: Five Key Cybersecurity Steps to Protect Your Organization, and the Vital Timing

by Mike Foster | Jan 7, 2022 | Cybersecurity, Cybersecurity Audits, Hacking

As an executive that leads, and depends on, your IT Professionals or outsourced IT provider, be sure to know these five essential steps that have a massive impact on your cybersecurity protection and how frequently your team must address them: Apply Critical Security...
Executives: Celebrate IT Appreciation Days

Executives: Celebrate IT Appreciation Days

by Mike Foster | Dec 23, 2021 | Cybersecurity, Supporting IT Professionals

Technical issues happen all the time, and you don’t hear about them because your IT professionals solve the problem efficiently and quietly. They use their skills and experience to perform monumental feats every month, and most executives have no idea what their...
Give Your IT Teams Guidance and Time to Address Log4j Cybersecurity Issues Immediately

Give Your IT Teams Guidance and Time to Address Log4j Cybersecurity Issues Immediately

by Mike Foster | Dec 15, 2021 | Cybersecurity, Cybersecurity Audits, Family Security, Hacking

Some of our customers take the Log4j situation seriously, and some ignore it. You or your organization might use products and services from Amazon, Apple, Cisco, Google, LinkedIn, VMware, and other affected organizations. Do not ignore the danger. Attackers are...
Why Phishing Messages Contain Such Accurate Information

Why Phishing Messages Contain Such Accurate Information

by Mike Foster | Nov 19, 2021 | Cybersecurity, Family Security, Hacking, Password Security

Data aggregation firms gather information on human beings and sell data to marketing companies, insurance companies, creditors, even employers. Sources of information include public records, loyalty programs, credit and gift cards, social media, web searches, apps,...
« Older Entries
Next Entries »

  • E-Savvy Newsletter Sign-Up

    Plain English IT Security Solutions and Best Practices for Executives

Recent Blog Post

  • Wire Transfer Fraud Just Got Smarter – Your Defenses Need to Catch Up
  • Executives – Any User Can Accidentally Expose All Your Data Unless IT Changes This Default Setting
  • AI is Listening: What Executives Must Know about Privacy in the Age of Workplace AI Assistants
  • The Executive’s AI Policy Checklist: Is Yours Missing These Essential Clauses?
The Foster Institute
PO Box 11030
Bozeman, MT, 59719

USA / Canada:  1-800-657-7107

International: 707-200-2095

Fax: 1-800-657-8564

International Fax: 1-305-503-9500

Contact

About

  • About Mike Foster
  • What Keeps You Up At Night?
  • Speaking and Training
  • Testimonials
  • Schedule a Consultation

Services

  • IT Vital Systems Security Review and Audit
  • Cybersecurity for Small Businesses
  • Cloud Security
  • Website/Web Application Security
  • Mobile Device Security
  • Penetration Testing
  • Training and Phishing
  • NIST CMMC Compliance
  • Physical Security Evaluation and Red Team Exercises

Resources

  • Help! I’ve Been Hacked
  • Message for CEOs and Executives
  • Message for IT Professionals
  • Home
  • E-Savvy Newsletter
  • FAQs

Contact

The Foster Institute
PO Box 11030
Bozeman, MT, 59719

USA / Canada:  1-800-657-7107

International: 707-200-2095

Fax: 1-800-657-8564

International Fax: 1-305-503-9500

Contact
  • Follow
  • Follow

Subscribe to the E-Savvy Newsletter

Plain English IT Security Solutions and Best Practices for Executives

Proudly Serving the Entire USA

©MMXX The Foster Institute Inc. All Rights Reserved. Legal Forms. Sitemap.Web design & SEO by Prime Concepts Group, Inc.