Foster Institute
  • What Keeps You
    Up At Night?
  • Cybersecurity Services
  • Professional Speaking
  • FAQs
  • Testimonials
  • Blog
  • Contact
  • 800-657-7107
Select Page

Heartbleed – Urgent Steps to Take

by Mike Foster | Apr 14, 2014 | Best Practices, Cybersecurity, Hackers, Heartbleed, Security Breach, Technology Tips

Heartbleed not only affects websites, it also affects equipment that your organization uses including VPNs, Firealls, and Android phones. It affects tools you use like online backup, password managers, and tools such as Dropbox. If you are in a huge hurry, just scroll...

Heartbleed Hack Impacts You Too

by Mike Foster | Apr 10, 2014 | Best Practices, Cybersecurity, Security Breach, Technology Tips

There is a zero-day attack (meaning there was no patch) that allows attackers to bypass your encryption. Attackers can bypass your website’s security, as well as access all of the information you thought was “secure” at the websites you use –...

Stonewall, not Firewall: Use Application Whitelisting

by Mike Foster | Mar 31, 2014 | Application Whitelisting, Best Practices, Cybersecurity, IT Professionals, Technology Tips

Protect yourself when a user plugs in a USB device that is infected. Reduce the risk of devastation when a user accidentally clicks on a bad link. There is a program built in to Windows that can protect you, and it is one of the most important strategies to use. What...

See the Real-Time Attack Luring iTunes Users

by Mike Foster | Mar 11, 2014 | Best Practices, Cybersecurity, Hackers, Security Breach

Google the word iTunes, and examine the search results. You’ll notice the top Google result for the word “iTunes” is a site that hackers put up in order to redirect unsuspecting users to a potentially malicious hacking site. CAUTION: Do not click on the link. If you...
« Older Entries
Next Entries »

  • E-Savvy Newsletter Sign-Up

    Plain English IT Security Solutions and Best Practices for Executives

Recent Blog Post

  • How Hackers Hijack Your AI to Steal from Your Organization
  • Six Essential AI Safety Practices for Leaders
  • Wire Transfer Fraud Just Got Smarter – Your Defenses Need to Catch Up
  • Executives – Any User Can Accidentally Expose All Your Data Unless IT Changes This Default Setting
The Foster Institute
PO Box 11030
Bozeman, MT, 59719

USA / Canada:  1-800-657-7107

International: 707-200-2095

Fax: 1-800-657-8564

International Fax: 1-305-503-9500

Contact

About

  • About Mike Foster
  • What Keeps You Up At Night?
  • Speaking and Training
  • Testimonials
  • Schedule a Consultation

Services

  • IT Vital Systems Security Review and Audit
  • Cybersecurity for Small Businesses
  • Cloud Security
  • Website/Web Application Security
  • Mobile Device Security
  • Penetration Testing
  • Training and Phishing
  • NIST CMMC Compliance
  • Physical Security Evaluation and Red Team Exercises

Resources

  • Help! I’ve Been Hacked
  • Message for CEOs and Executives
  • Message for IT Professionals
  • Home
  • E-Savvy Newsletter
  • FAQs

Contact

The Foster Institute
PO Box 11030
Bozeman, MT, 59719

USA / Canada:  1-800-657-7107

International: 707-200-2095

Fax: 1-800-657-8564

International Fax: 1-305-503-9500

Contact
  • Follow
  • Follow

Subscribe to the E-Savvy Newsletter

Plain English IT Security Solutions and Best Practices for Executives

Proudly Serving the Entire USA

©MMXX The Foster Institute Inc. All Rights Reserved. Legal Forms. Privacy Policy, Sitemap. Web design & SEO by Prime Concepts Group, Inc.