by Mike Foster | Jan 4, 2018 | Computer Processor, Cybersecurity, Linux Patch, Microsoft Patch
A security vulnerability, that has existed for 10 years, has only recently been discovered. A patch for Linux has been released and Microsoft plans to release a patch next Tuesday. Apple will release a patch for OSX. For understandable reasons, many organizations are...
by Mike Foster | Jan 2, 2018 | Android, Apple, Children, Cyber Security, Cybersecurity, Family Cyber Safety, Security Breach, Technology Safety Tips
Because many families, and business professionals, received new tablets for the holidays, it is important to consider security. Families, as well as businesses, may choose to restrict permissions on devices. Here’s how: Set a passcode on the device. Even a 4-digit...
by Mike Foster | Dec 21, 2017 | Alerts, Best Practices, Cyber Security Breach, Cybersecurity, Executive Tips, Ransomware, Service Provider Breach
First, the attacker population is outpacing the ability to control them. Attacks are trending higher at an ever-increasing rate. Be extra security-diligent. Second, ransomware, software that prevents you from accessing your information until you pay a ransom,...
by Mike Foster | Dec 14, 2017 | Best Practices, Cyber Security Breach, Cyber Security Training, Cybersecurity, IT Best Practices, Preventative IT Security Breach, Security Breach
In our experience of auditing after breaches have happened, about half were caused by a service provider working for the company that gets breached. Almost always, the vendor or contractor had no malicious intent. Their organization’s own IT systems were not secure,...