Mike Foster's IT Security & Best Practices Blog

Latest Posts

A Hacker Profile – Who Are They?

I experienced a presentation by the US Secret Service last week, and they provided the common background they’ve identified in attackers: Continue reading ‘A Hacker Profile – Who Are They?’


Geo-Blocking is an Essential Protection

Your security logs for your firewall, for Azure, Office 365, and more, might show attacks from countries worldwide. Continue reading ‘Geo-Blocking is an Essential Protection’


Your Work From Home Users are Like a Box of Chocolates

Because of so many work from home users, the Internet is like a box of chocolates for attackers. Continue reading ‘Your Work From Home Users are Like a Box of Chocolates’


Did you Fail to Plan for the Pandemic? Plan for a Microsoft Outage or a GPS Provider Attack.

Last weekend, our family drove to southwestern Montana looking for Coolidge, a thriving mining town turned Ghost Town. After we entered a remote valley, Continue reading ‘Did you Fail to Plan for the Pandemic? Plan for a Microsoft Outage or a GPS Provider Attack.’


Power Down to Boost Security

One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don’t want to power it down, at least disconnect from your network.

Continue reading ‘Power Down to Boost Security’


Two Tips to Make Your Online Meetings Better

Everyone is concerned about video conferencing security, and they should be. But when the hardware and software are not working right, safety seems like a distraction. Continue reading ‘Two Tips to Make Your Online Meetings Better’


Video Conferencing – Avoid Installing Meeting Programs When Possible

CEOs and Executives: Avoid installing video conferencing software on your computer just because some other company tells you to. When you launch video conferencing programs, many of them ask you to install a program or app on your computer or device. What if the program is a virus? Continue reading ‘Video Conferencing – Avoid Installing Meeting Programs When Possible’


Two-Step Logon – You Only Need to do it Once

Using two-step logon is one of the best things you can do to keep unauthorized people from logging into your account. Use the checkbox to “remember this device” Continue reading ‘Two-Step Logon – You Only Need to do it Once’


Zoom Security Settings – The Concise Details

Zoom has many security settings. This is a detailed but concise guide to the settings and how they work.
Continue reading ‘Zoom Security Settings – The Concise Details’