by Mike Foster | Oct 17, 2017 | Cyber Security, Cyber Security Breach, Cybersecurity, KRACK, wi-fi best practices, wi-fi safety, wi-fi security
Many organizations rely on a wireless password to protect their Wi-Fi networks. Behind the scenes, that password is used as part of a security protocol called WPA2. An attack, dubbed KRACK, has been announced that breaks that security. The attack can permit attackers...
by Mike Foster | Oct 6, 2017 | Cybersecurity, Kasperski, Ransomware, Whitelisting
According to the Wall Street Journal, followed by the Washington Post, Russian hackers used Kaspersky anti-virus to steal NSA cyber defense information off of an employee’s home computer. Even if you do not use Kaspersky, you still need to take 5 important steps....
by Mike Foster | Oct 6, 2017 | Best Practices, Cybersecurity, Data Loss Prevention, IT Best Practices, Preventative IT Security Breach, Security Logs
Windows computers can keep a log of security events, such as failed logon attempts. It is helpful to know if attackers are trying to gain access to your network. When the log fills up, it overwrites itself with the oldest events first. By default, the log files are...
by Mike Foster | Sep 29, 2017 | AI, Alerts, Best Practices, Cybersecurity, Executive Tips, IT Best Practices, Preventative IT Security Breach, Threat Protection Software
This week, someone told me about a group of CEOs who came to the conclusion that their IT security was handled since they installed an artificial intelligence (AI) based threat protection tool. They didn’t know it, but they were wrong. Having a false sense of security...