by Mike Foster | Sep 11, 2020 | Alerts, Best Practices, Coronavirus, covid-19, Cyber Security, Cyber Security Breach, Cyber Security Training, Remote Worker Security, Remote Workers, Uncategorized
Because of so many work from home users, the Internet is like a box of chocolates for attackers. Step 1: Attackers compromise work-from-home users. Step 2: They gain access to their company. Step 3: They bite into the company to discover what’s inside. There are...
by Mike Foster | Jul 28, 2020 | Uncategorized
Last weekend, our family drove to southwestern Montana looking for Coolidge, a thriving mining town turned Ghost Town. After we entered a remote valley, cell service went away. I handed our road atlas to my 18-year-old son, appointed him navigator, and asked for our...
by Mike Foster | Jun 5, 2020 | Alerts, Best Practices, Cyber Security, Cyber Security Training, Cybersecurity, Executive Tips, IT Risk Management
One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don’t want to power it down, at least disconnect from your network. You’ll make your computer less attractive to attackers, and it limits the...
by Mike Foster | May 15, 2020 | Executive Tips, Online Meetings, Zoom
Everyone is concerned about video conferencing security, and they should be. But when the hardware and software are not working right, safety seems like a distraction. Use at least two monitors. You can often separate the presentation so that you see slides on one...