by Mike Foster | Aug 7, 2015 | Cyber Security, Cybersecurity, DEF CON, Hackers, Identity Theft
Am at the famous DEF CON ® Hacking Conference. One of the presentations today is entitled, “I Will Kill You.” A skilled hacker will show how he can do so by creating a doctor’s medical document showing cause of death, how to create a funeral director record showing...
by Mike Foster | Jul 22, 2015 | Best Practices, Cyber Security, Cyber Security Breach, Cybersecurity, IT Best Practices, Preventative IT Security Breach, Security Breach, Technology Safety
After security breaches, in order for the victim companies to feel better, executives are often led to believe that and they choose to announce that, “There is nothing we could have done to prevent the breach anyway”. So, in their minds, they validate that it is ok...
by Mike Foster | Jun 16, 2015 | Best Practices, Cyber Security, Cybersecurity, Hackers, Password Safety, Password Security, Technology Safety Tips
LastPass password manager announced that they were hacked. That means that attackers might be able to find out all of your passwords. Do this immediately: Change your LastPass password. If you use any password manager, LastPass or otherwise, two of the most important...
by Mike Foster | Jun 11, 2015 | Best Practices, Cyber Security, Cybersecurity, Family Cyber Safety, free wifi, hotspot, hotspot safety, phones, Technology Safety, Technology Safety Tips, wi-fi best practices, wi-fi safety, wi-fi security
As executives take summer vacations, they will be tempted to connect to public WiFi wireless network hotspots at airports, coffee shops, hotels, etc. Before you connect, know the risks. When you connect to a network that isn’t under your control, someone else...