Foster Institute
  • What Keeps You
    Up At Night?
  • Cybersecurity Services
  • Professional Speaking
  • FAQs
  • Testimonials
  • Blog
  • Contact
  • 800-657-7107
Select Page

Annihilate Sensitive Data

by Mike Foster | Mar 6, 2014 | Best Practices, Cybersecurity, Technology, Technology Tips

A chief executive asked this week about, if he is going to donate a computer to a good cause, how can he erase all of his sensitive data from the hard drive first? Here is how – complete with a video. If you would rather just watch the video, it is here: While the...

Adding Security Makes Systems Unusable!

by Mike Foster | Feb 20, 2014 | Best Practices, Cybersecurity, IT Settings, Technology

Ask your IT Professional: “Are you implementing the protections that users won’t notice anyway?” … The reality is that you can have, contrary to what some people believe, both security and productivity at the same time. Enforcing security policies that dictate...

Linksys products – if you use them at home or work – you may be vulnerable to an attack

by Mike Foster | Feb 19, 2014 | Best Practices, Cybersecurity, IT Settings, Security Breach, Technology Tips

Your IT professionals are very busy and often don’t have time to keep up with what are called “firmware updates.” It turns out that many manufacturer’s products, including Linksys products that are common in smaller businesses and in homes, are getting hacked. Ask...

Attn: There is a Serious Mac Virus Circulating Right Now

by Mike Foster | Feb 18, 2014 | Best Practices, Cybersecurity, Technology Tips

There is a virus attacking Mac users that infects your computer and steals copies of your data files including .pdf documents. The virus has been named OSX/LaoShu-A. The way to protect yourself is to not click on any links in email messages that you don’t recognize....
« Older Entries
Next Entries »

  • E-Savvy Newsletter Sign-Up

    Plain English IT Security Solutions and Best Practices for Executives

Recent Blog Post

  • How Hackers Hijack Your AI to Steal from Your Organization
  • Six Essential AI Safety Practices for Leaders
  • Wire Transfer Fraud Just Got Smarter – Your Defenses Need to Catch Up
  • Executives – Any User Can Accidentally Expose All Your Data Unless IT Changes This Default Setting
The Foster Institute
PO Box 11030
Bozeman, MT, 59719

USA / Canada:  1-800-657-7107

International: 707-200-2095

Fax: 1-800-657-8564

International Fax: 1-305-503-9500

Contact

About

  • About Mike Foster
  • What Keeps You Up At Night?
  • Speaking and Training
  • Testimonials
  • Schedule a Consultation

Services

  • IT Vital Systems Security Review and Audit
  • Cybersecurity for Small Businesses
  • Cloud Security
  • Website/Web Application Security
  • Mobile Device Security
  • Penetration Testing
  • Training and Phishing
  • NIST CMMC Compliance
  • Physical Security Evaluation and Red Team Exercises

Resources

  • Help! I’ve Been Hacked
  • Message for CEOs and Executives
  • Message for IT Professionals
  • Home
  • E-Savvy Newsletter
  • FAQs

Contact

The Foster Institute
PO Box 11030
Bozeman, MT, 59719

USA / Canada:  1-800-657-7107

International: 707-200-2095

Fax: 1-800-657-8564

International Fax: 1-305-503-9500

Contact
  • Follow
  • Follow

Subscribe to the E-Savvy Newsletter

Plain English IT Security Solutions and Best Practices for Executives

Proudly Serving the Entire USA

©MMXX The Foster Institute Inc. All Rights Reserved. Legal Forms. Privacy Policy, Sitemap. Web design & SEO by Prime Concepts Group, Inc.