by Mike Foster | Feb 20, 2015 | Best Practices, Cyber Security, Cybersecurity, IT Best Practices, IT Settings, Security Breach, Technology Safety Tips
Urgent bulletin: Lenovo pre-installed software called SuperFish on computers that is a security risk. This is just another example of why it is so important to remove the junk-ware from new computers. Follow these instructions from Lenovo:...
by Mike Foster | Feb 16, 2015 | Best Practices, Cyber Security, Cybersecurity, Technology Safety Tips
Especially after the recent Anthem cyber-security breach, people are writing to us who are concerned about identity theft. Below are 5 concise articles, written in plain English, related to identity theft; and you may want to forward this to your friends as well:...
by Mike Foster | Feb 9, 2015 | Best Practices, browser security, Cyber Security, Cybersecurity, IT Best Practices, Technology Safety
A CFO asked, “I would really love to hear your take on Google vs Microsoft 365 and see if you fall on one side or the other.” When it comes to cyber-security for those two big players… Both Google and Microsoft strive to have great security. In most cases, the weak...
by Mike Foster | Feb 5, 2015 | Best Practices, Cyber Security, Cybersecurity, IT Best Practices, IT Professionals, Technology Safety Tips
A CFO told me today that he feels challenged because his VP of IT is “very sensitive to being too ‘Big Brother’ in his approach to security.” The CFO wants his VP of IT to increase cyber-security, “even if it means taking away some latitude for employees,...