Mike Foster's IT Security & Best Practices Blog

Latest Posts

A Hacker Profile – Who Are They?

I experienced a presentation by the US Secret Service last week, and they provided the common background they’ve identified in attackers:

Continue reading A Hacker Profile – Who Are They?


Power Down to Boost Security

One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don’t want to power it down, at least disconnect from your network.

Continue reading Power Down to Boost Security


Zoom Security – Follow Along to Set Security Settings

Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings. This video is […]

Continue reading Zoom Security – Follow Along to Set Security Settings


Avoid These 3 Really Good Hacker Tricks

Attackers prey on people trusting others. Watch out for these three common tricks.

Continue reading Avoid These 3 Really Good Hacker Tricks


Why is it not Google’s fault?

After last week’s post about the stolen Google and Gmail passwords, one of our valued subscribers wrote back asking why it isn’t Google’s fault that the passwords were stolen.

Continue reading Why is it not Google’s fault?


Gmail Passwords Stolen, Possibly Millions of Them

This applies to everyone, not just Gmail users. A researcher at Hold Security bought 272 million stolen passwords on the dark web. Some of the credentials were for Gmail. This is not Google’s fault. Whether you use Gmail or not, everyone, if they haven’t already, needs to enable

Continue reading Gmail Passwords Stolen, Possibly Millions of Them


Security Version 2.0

Here is another powerful way to strengthen security – upgrade to the newest versions. Just like last week, your key tool will be your application inventory. It will look something like this…

Continue reading Security Version 2.0


Smooth and Slippery for IT Security

When talking about security, a good example is the large polished stainless steel sculpture commonly known as The Bean. If someone wanted to climb the bean, they would quickly find that the smooth surface provides no place to get a foothold. Make your computers like The Bean. Every single program installed on your computers provides […]

Continue reading Smooth and Slippery for IT Security


Know About this IT Networking Strategy Change

Executives – There is a new strategy to consider moving toward that can save you money, increase security, speed up your networks and help you get ahead of your competition. What should you do about your Cisco stocks? Even the WSJ is talking about…

Continue reading Know About this IT Networking Strategy Change


See the Real-Time Attack Luring iTunes Users

Google the word iTunes, and examine the search results. You’ll notice the top Google result for the word “iTunes” is a site that hackers put up in order to redirect unsuspecting users to a potentially malicious hacking site. CAUTION: Do not click on the link.

Continue reading See the Real-Time Attack Luring iTunes Users