by Mike Foster | Sep 10, 2018 | Best Practices, Cyber Security Breach, Cybersecurity, IT Best Practices, IT Pro Tips, password, Password Safety, Password Security
Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet. You assign your IT team the responsibility to secure and manage the keys to the vehicles, so you give each...
by Mike Foster | Jul 23, 2018 | Adobe Flash, Best Practices, browser security, Cyber Security, Cybersecurity, Encrypted Attachments, Executive Tips, Service Provider Breach, Service Provider Safety
Many organizations outsource to service providers that are not cyber-secure. It is common for companies to experience a significant security breach that originated at a third party. Just ask Target. Forward this request to your small outsourced providers asking them...
by Mike Foster | Jul 9, 2018 | Alerts, Attachments, Best Practices, Cybersecurity, Disabling Macros, Email
When you receive an email attachment, even when you are expecting the document and know the sender, the attached file can be poisoned. And the friend or associate who sends you the attachment probably does not know that the file is infected. A term to know is macro....
by Mike Foster | Jun 28, 2018 | Best Practices, Cybersecurity, Firewall Security, Web Content Filtering
We audited a company last week and discovered that their web filtering tools, designed to stop users from accidentally landing on malicious websites, was not blocking dangerous sites. In these days with ransomware and bad actors tricking users into clicking on...