Mike Foster's IT Security & Best Practices Blog

Latest Posts

Two Tips to Make Your Online Meetings Better

Everyone is concerned about video conferencing security, and they should be. But when the hardware and software are not working right, safety seems like a distraction.

Continue reading Two Tips to Make Your Online Meetings Better


Video Conferencing – Avoid Installing Meeting Programs When Possible

CEOs and Executives: Avoid installing video conferencing software on your computer just because some other company tells you to. When you launch video conferencing programs, many of them ask you to install a program or app on your computer or device. What if the program is a virus?

Continue reading Video Conferencing – Avoid Installing Meeting Programs When Possible


Zoom Security – Set Up Two-Step Login

Protect your Zoom account. If someone discovers your username and password for Zoom, two-step login should block them from logging in as you.

Continue reading Zoom Security – Set Up Two-Step Login


Zoom Security Settings – The Concise Details

Zoom has many security settings. This is a detailed but concise guide to the settings and how they work.

Continue reading Zoom Security Settings – The Concise Details


Zoom Security Issues – Protect Yourself

Every business is concerned and should be, about cybersecurity during online meetings. Due to its popularity, Zoom is an attractive target for the bad actors. There are hundreds, maybe more, people working all the time to break Zoom’s security.

Continue reading Zoom Security Issues – Protect Yourself


Zoom Security – Follow Along to Set Security Settings

Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings. This video is […]

Continue reading Zoom Security – Follow Along to Set Security Settings


Alert Your Team – USB Devices, Login Prompts, and Apps

Warn your users about three ways attackers continue to exploit the COVID-19 crisis:

Continue reading Alert Your Team – USB Devices, Login Prompts, and Apps


Recommendations for Cybersecurity for Remote Workers During Coronavirus

The rapidly changing situation of potential school closures, self-quarantines, and public reaction to the coronavirus guarantees that at some point you will have employees who need to work from home.

Continue reading Recommendations for Cybersecurity for Remote Workers During Coronavirus


Prepare Your Organization for a Reaction to Coronavirus

The city of San Francisco just declared a state of emergency over the Coronavirus. Other cities will follow suit – maybe yours.

Continue reading Prepare Your Organization for a Reaction to Coronavirus


Adobe Flash Stops on December 31, 2020. Are You Ready?

For more than 20 years, Adobe Flash helped websites deliver video content to your screen. However, attackers use Flash to inject ransomware and other malicious code into computers. The bad actors are usually one step ahead of security patches.

Continue reading Adobe Flash Stops on December 31, 2020. Are You Ready?