Foster Institute
  • What Keeps You
    Up At Night?
  • Cybersecurity Services
  • Professional Speaking
  • FAQs
  • Testimonials
  • Blog
  • Contact
  • 800-657-7107
Select Page

If Someone Impersonates You on Facebook

by Mike Foster | Oct 21, 2016 | Cybersecurity, Facebook, Hackers, Identity Theft, Online Impersonators, Online Security

Twice recently, I’ve been contacted by executives who explain that someone was impersonating them on Facebook. They used my friends’ own pictures, sent messages, posted information, and everything was very inappropriate. Each friend asked what to do, and here is the...

How to Find Out if Your Password Might Have Been Hacked

by Mike Foster | Oct 14, 2016 | browser security, Cybersecurity, Password Safety, Password Security, Technology Safety, Technology Safety Tips, Technology Security

You hear in the news that Yahoo, or some other company, got hacked and your username and password may be in the hands of attackers. There is a way to find out if your credentials were exposed. An Australian Web Security Specialist, Troy Hunt, has compiled a database...

“This is Your Captain Speaking – No Samsung Phones Allowed”

by Mike Foster | Sep 13, 2016 | Cybersecurity, IT Professionals, Technology Safety, Technology Safety Tips, Technology Security, Technology Tips

Yesterday afternoon, I and some of the more than 100 other passengers on our jet were paying attention to the safety demo. Unexpectedly, the announcement included a statement that prohibited the use of a Samsung Galaxy Note 7 phone. Additionally, charging such a...

A Way to Control Consultant Access – Every Time

by Mike Foster | Aug 29, 2016 | Cyber Security, Cybersecurity, Data Loss Prevention, IT Pro Tips, IT Professionals, IT Settings, Technology Safety, Technology Safety Tips, two set logon, two step login

What if you’d like to know each and every time a consultant attempted to access your systems? And would you like the ability to approve or deny each attempt? At a client’s office this week, one of the IT Professionals had an interesting idea. He can configure two-step...
« Older Entries
Next Entries »

  • E-Savvy Newsletter Sign-Up

    Plain English IT Security Solutions and Best Practices for Executives

Recent Blog Post

  • How Hackers Hijack Your AI to Steal from Your Organization
  • Six Essential AI Safety Practices for Leaders
  • Wire Transfer Fraud Just Got Smarter – Your Defenses Need to Catch Up
  • Executives – Any User Can Accidentally Expose All Your Data Unless IT Changes This Default Setting
The Foster Institute
PO Box 11030
Bozeman, MT, 59719

USA / Canada:  1-800-657-7107

International: 707-200-2095

Fax: 1-800-657-8564

International Fax: 1-305-503-9500

Contact

About

  • About Mike Foster
  • What Keeps You Up At Night?
  • Speaking and Training
  • Testimonials
  • Schedule a Consultation

Services

  • IT Vital Systems Security Review and Audit
  • Cybersecurity for Small Businesses
  • Cloud Security
  • Website/Web Application Security
  • Mobile Device Security
  • Penetration Testing
  • Training and Phishing
  • NIST CMMC Compliance
  • Physical Security Evaluation and Red Team Exercises

Resources

  • Help! I’ve Been Hacked
  • Message for CEOs and Executives
  • Message for IT Professionals
  • Home
  • E-Savvy Newsletter
  • FAQs

Contact

The Foster Institute
PO Box 11030
Bozeman, MT, 59719

USA / Canada:  1-800-657-7107

International: 707-200-2095

Fax: 1-800-657-8564

International Fax: 1-305-503-9500

Contact
  • Follow
  • Follow

Subscribe to the E-Savvy Newsletter

Plain English IT Security Solutions and Best Practices for Executives

Proudly Serving the Entire USA

©MMXX The Foster Institute Inc. All Rights Reserved. Legal Forms. Privacy Policy, Sitemap. Web design & SEO by Prime Concepts Group, Inc.