by Mike Foster | Nov 12, 2021 | Cybersecurity, Cybersecurity Audits, Supporting IT Professionals
Below is a letter you can send your third-party service providers if you want to give them pointers on being more secure. We’ve done the work to make this quicker for you. None of these are unreasonable for you to request. You and your IT team can customize the letter...
by Mike Foster | Oct 28, 2021 | Cybersecurity, Hacking, Mobile Devices
If you haven’t already, you will receive text messages that entice you to respond. Some of the messages contain links that can infect your phone with spyware and other malicious programs. Before you click a link, follow instructions, or consider believing a text...
by Mike Foster | Oct 22, 2021 | Cloud Security, Cybersecurity, Cybersecurity Audits, Hacking
Some organizations move their data to the cloud and stop backing it up. Cloud services offer ways to restore the data. But what happens if an attacker deletes your files and deletes the backup at the cloud service too? Consider backing up your data at a different...
by Mike Foster | Oct 1, 2021 | Cybersecurity, Cybersecurity Audits, Supporting IT Professionals
After we performed a cybersecurity audit for a company many years ago, the President and CEO assigned the recommendations to their IT consulting firm. What is different about this lead executive is that he gently applies firm pressure on their IT consultants to...