Foster Institute
  • What Keeps You
    Up At Night?
  • Cybersecurity Services
  • Professional Speaking
  • FAQs
  • Testimonials
  • Blog
  • Contact
  • 800-657-7107
Select Page

Portable Radios Can Replace Family Phones

by Mike Foster | Nov 21, 2017 | Family Cyber Safety, phones

This is the time of the year when youngsters remind parents that all of their friends have phones, the latest model is out, and everyone is getting one! Some parents ask if there is an alternative. Yes. If you want to be able to reach them when they are off playing...

Wireless Security is Broken & What You Need to Do

by Mike Foster | Oct 17, 2017 | Cyber Security, Cyber Security Breach, Cybersecurity, KRACK, wi-fi best practices, wi-fi safety, wi-fi security

Many organizations rely on a wireless password to protect their Wi-Fi networks. Behind the scenes, that password is used as part of a security protocol called WPA2. An attack, dubbed KRACK, has been announced that breaks that security. The attack can permit attackers...

5 Steps to Take Now Even if You do not use Kasperski Anti-Virus

by Mike Foster | Oct 6, 2017 | Cybersecurity, Kasperski, Ransomware, Whitelisting

According to the Wall Street Journal, followed by the Washington Post, Russian hackers used Kaspersky anti-virus to steal NSA cyber defense information off of an employee’s home computer. Even if you do not use Kaspersky, you still need to take 5 important steps....

Please Alert Your IT Pros – Increase Your Security Log File Capacity

by Mike Foster | Oct 6, 2017 | Best Practices, Cybersecurity, Data Loss Prevention, IT Best Practices, Preventative IT Security Breach, Security Logs

Windows computers can keep a log of security events, such as failed logon attempts. It is helpful to know if attackers are trying to gain access to your network. When the log fills up, it overwrites itself with the oldest events first. By default, the log files are...
« Older Entries
Next Entries »

  • E-Savvy Newsletter Sign-Up

    Plain English IT Security Solutions and Best Practices for Executives

Recent Blog Post

  • Six Essential AI Safety Practices for Leaders
  • Wire Transfer Fraud Just Got Smarter – Your Defenses Need to Catch Up
  • Executives – Any User Can Accidentally Expose All Your Data Unless IT Changes This Default Setting
  • AI is Listening: What Executives Must Know about Privacy in the Age of Workplace AI Assistants
The Foster Institute
PO Box 11030
Bozeman, MT, 59719

USA / Canada:  1-800-657-7107

International: 707-200-2095

Fax: 1-800-657-8564

International Fax: 1-305-503-9500

Contact

About

  • About Mike Foster
  • What Keeps You Up At Night?
  • Speaking and Training
  • Testimonials
  • Schedule a Consultation

Services

  • IT Vital Systems Security Review and Audit
  • Cybersecurity for Small Businesses
  • Cloud Security
  • Website/Web Application Security
  • Mobile Device Security
  • Penetration Testing
  • Training and Phishing
  • NIST CMMC Compliance
  • Physical Security Evaluation and Red Team Exercises

Resources

  • Help! I’ve Been Hacked
  • Message for CEOs and Executives
  • Message for IT Professionals
  • Home
  • E-Savvy Newsletter
  • FAQs

Contact

The Foster Institute
PO Box 11030
Bozeman, MT, 59719

USA / Canada:  1-800-657-7107

International: 707-200-2095

Fax: 1-800-657-8564

International Fax: 1-305-503-9500

Contact
  • Follow
  • Follow

Subscribe to the E-Savvy Newsletter

Plain English IT Security Solutions and Best Practices for Executives

Proudly Serving the Entire USA

©MMXX The Foster Institute Inc. All Rights Reserved. Legal Forms. Privacy Policy, Sitemap. Web design & SEO by Prime Concepts Group, Inc.