Foster Institute
  • What Keeps You
    Up At Night?
  • Cybersecurity Services
  • Professional Speaking
  • FAQs
  • Testimonials
  • Blog
  • Contact
  • 800-657-7107
Select Page
Why Phishing Messages Contain Such Accurate Information

Why Phishing Messages Contain Such Accurate Information

by Mike Foster | Nov 19, 2021 | Cybersecurity, Family Security, Hacking, Password Security

Data aggregation firms gather information on human beings and sell data to marketing companies, insurance companies, creditors, even employers. Sources of information include public records, loyalty programs, credit and gift cards, social media, web searches, apps,...
Help Your Third-Party Providers Be More Secure Because Your Security is Only as Good as Their Security

Help Your Third-Party Providers Be More Secure Because Your Security is Only as Good as Their Security

by Mike Foster | Nov 12, 2021 | Cybersecurity, Cybersecurity Audits, Supporting IT Professionals

Below is a letter you can send your third-party service providers if you want to give them pointers on being more secure. We’ve done the work to make this quicker for you. None of these are unreasonable for you to request. You and your IT team can customize the letter...
One Way to Identify Dangerous Text Message Scams

One Way to Identify Dangerous Text Message Scams

by Mike Foster | Oct 28, 2021 | Cybersecurity, Hacking, Mobile Devices

If you haven’t already, you will receive text messages that entice you to respond. Some of the messages contain links that can infect your phone with spyware and other malicious programs. Before you click a link, follow instructions, or consider believing a text...
Be Sure to Back Up Your Cloud Data

Be Sure to Back Up Your Cloud Data

by Mike Foster | Oct 22, 2021 | Cloud Security, Cybersecurity, Cybersecurity Audits, Hacking

Some organizations move their data to the cloud and stop backing it up. Cloud services offer ways to restore the data. But what happens if an attacker deletes your files and deletes the backup at the cloud service too? Consider backing up your data at a different...
« Older Entries
Next Entries »

  • E-Savvy Newsletter Sign-Up

    Plain English IT Security Solutions and Best Practices for Executives

Recent Blog Post

  • Six Essential AI Safety Practices for Leaders
  • Wire Transfer Fraud Just Got Smarter – Your Defenses Need to Catch Up
  • Executives – Any User Can Accidentally Expose All Your Data Unless IT Changes This Default Setting
  • AI is Listening: What Executives Must Know about Privacy in the Age of Workplace AI Assistants
The Foster Institute
PO Box 11030
Bozeman, MT, 59719

USA / Canada:  1-800-657-7107

International: 707-200-2095

Fax: 1-800-657-8564

International Fax: 1-305-503-9500

Contact

About

  • About Mike Foster
  • What Keeps You Up At Night?
  • Speaking and Training
  • Testimonials
  • Schedule a Consultation

Services

  • IT Vital Systems Security Review and Audit
  • Cybersecurity for Small Businesses
  • Cloud Security
  • Website/Web Application Security
  • Mobile Device Security
  • Penetration Testing
  • Training and Phishing
  • NIST CMMC Compliance
  • Physical Security Evaluation and Red Team Exercises

Resources

  • Help! I’ve Been Hacked
  • Message for CEOs and Executives
  • Message for IT Professionals
  • Home
  • E-Savvy Newsletter
  • FAQs

Contact

The Foster Institute
PO Box 11030
Bozeman, MT, 59719

USA / Canada:  1-800-657-7107

International: 707-200-2095

Fax: 1-800-657-8564

International Fax: 1-305-503-9500

Contact
  • Follow
  • Follow

Subscribe to the E-Savvy Newsletter

Plain English IT Security Solutions and Best Practices for Executives

Proudly Serving the Entire USA

©MMXX The Foster Institute Inc. All Rights Reserved. Legal Forms. Privacy Policy, Sitemap. Web design & SEO by Prime Concepts Group, Inc.