by Mike Foster | Dec 24, 2015 | Alerts, Best Practices, Cyber Future, Cyber Security, Cybersecurity, IT Best Practices, IT Future, password, Password Safety, phones, Technology Safety, Technology Safety Tips, two set logon
How do you feel about giving up passwords entirely? You may have that option soon. You’ll enter a username, and your phone will buzz to ask you if it is really you who is attempting to log in. Just keep your phone with you, and passwords may be a thing of the past....
by Mike Foster | Dec 17, 2015 | Cyber Security, Cyber Security Breach, Cybersecurity, Data Loss Prevention, Disaster Recovery, IT Best Practices, IT Compliance
If your organization meets requirements so that you are compliant with HIPAA, PCI DSS, SOC 2, or any other standard it does not mean you are secure. In fact, many organizations that are compliant are some of the least secure. Some executives, understandably, believe...
by Mike Foster | Dec 8, 2015 | Cyber Security, Cybersecurity, Hacker Insight, Hackers
CNN Money just published an insightful interview with a hacker. You may find it interesting. Read the interview by entering this search phrase into Google: My hack stole your credit card site:money.cnn.com Forward this to your friends who want to discover this...
by Mike Foster | Nov 25, 2015 | Application Whitelisting, Applying IT Patches, Cyber Security, Cybersecurity, Patches, Preventative IT Security Breach, Technology Safety, Technology Safety Tips, Technology Tips
In this time of gratitude, which is perhaps the most important foundation of happiness and success, it is important to thank you for helping make the world a safer place. Three controls, perhaps the most important three controls, help protect you from cyber-threats....