Foster Institute
  • What Keeps You
    Up At Night?
  • Cybersecurity Services
  • Professional Speaking
  • FAQs
  • Testimonials
  • Blog
  • Contact
  • 800-657-7107
Select Page

How To Know if a Password Attack Succeeded

by Mike Foster | Apr 7, 2016 | Account Lockout Policy, Alerts, Best Practices, Cyber Security, Cyber Security Breach, Cybersecurity, Data Loss Prevention, Executive Tips, Hacker Insight, Hackers, IT Best Practices, IT Pro Tips, Password Security, Technology Safety Tips

Last week, you saw an example of a list of passwords that an attacker used to attack a server more than 41,000 times. But the worst part was the server that underwent a short attack… As demonstrated last week, attackers attempt to guess usernames and passwords on...

Anatomy of a Password Attack

by Mike Foster | Mar 31, 2016 | Alerts, Cyber Security, Cyber Security Breach, Cybersecurity, Password Security, Preventative IT Security Breach

Password attacks against businesses happen all the time. You may find it interesting to see the list of usernames that attackers guess are on your system, and how many passwords they try for each username. Notice that, for the usernames most likely to exist on...

When Attackers Come Knocking

by Mike Foster | Mar 28, 2016 | Alerts, Cyber Security, Cyber Security Breach, Cybersecurity, Data Loss Prevention, Password Safety, Password Security, Technology Safety Tips, Windows 10

Earlier this year, we discovered that an angry ex-employee at one of our customer’s organization tried to guess the CEO’s password more than 300 times. The day he was fired, he went to work trying to crack the CEO’s password. What if he had been able to break in? It...

The Invisible Threat Can Kill Your Company

by Mike Foster | Mar 24, 2016 | Best Practices, Cyber Security, Cybersecurity, Executives and IT, Invisible Security Threats, IT Best Practices, IT Discussions, Technology Safety Tips

Executives: How could any responsible IT professional, who is devoted to you and very capable, fail to protect your network? Simple. Executives, please recognize that there are two categories of problems IT professionals need to solve. Problems that are visible, and...
« Older Entries
Next Entries »

  • E-Savvy Newsletter Sign-Up

    Plain English IT Security Solutions and Best Practices for Executives

Recent Blog Post

  • Wire Transfer Fraud Just Got Smarter – Your Defenses Need to Catch Up
  • Executives – Any User Can Accidentally Expose All Your Data Unless IT Changes This Default Setting
  • AI is Listening: What Executives Must Know about Privacy in the Age of Workplace AI Assistants
  • The Executive’s AI Policy Checklist: Is Yours Missing These Essential Clauses?
The Foster Institute
PO Box 11030
Bozeman, MT, 59719

USA / Canada:  1-800-657-7107

International: 707-200-2095

Fax: 1-800-657-8564

International Fax: 1-305-503-9500

Contact

About

  • About Mike Foster
  • What Keeps You Up At Night?
  • Speaking and Training
  • Testimonials
  • Schedule a Consultation

Services

  • IT Vital Systems Security Review and Audit
  • Cybersecurity for Small Businesses
  • Cloud Security
  • Website/Web Application Security
  • Mobile Device Security
  • Penetration Testing
  • Training and Phishing
  • NIST CMMC Compliance
  • Physical Security Evaluation and Red Team Exercises

Resources

  • Help! I’ve Been Hacked
  • Message for CEOs and Executives
  • Message for IT Professionals
  • Home
  • E-Savvy Newsletter
  • FAQs

Contact

The Foster Institute
PO Box 11030
Bozeman, MT, 59719

USA / Canada:  1-800-657-7107

International: 707-200-2095

Fax: 1-800-657-8564

International Fax: 1-305-503-9500

Contact
  • Follow
  • Follow

Subscribe to the E-Savvy Newsletter

Plain English IT Security Solutions and Best Practices for Executives

Proudly Serving the Entire USA

©MMXX The Foster Institute Inc. All Rights Reserved. Legal Forms. Sitemap.Web design & SEO by Prime Concepts Group, Inc.