Mike Foster's IT Security & Best Practices Blog

Latest Posts

If You Get Hacked, Do Not Email Anyone About It

You’ve trained your users to be vigilant for symptoms of cybersecurity issues. Now teach them to share their concerns confidentially.

Continue reading If You Get Hacked, Do Not Email Anyone About It


One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself

Workers who use their personal home computers for business put you at significant risk.

Continue reading One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself


Be Smart and Avoid This Comforting Belief

Someone told me today, as is common: Attackers are only interested in hacking large businesses.

Continue reading Be Smart and Avoid This Comforting Belief


Your Work From Home Users are Like a Box of Chocolates

Because of so many work from home users, the Internet is like a box of chocolates for attackers.

Continue reading Your Work From Home Users are Like a Box of Chocolates


Power Down to Boost Security

One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don’t want to power it down, at least disconnect from your network.

Continue reading Power Down to Boost Security


Two Tips to Make Your Online Meetings Better

Everyone is concerned about video conferencing security, and they should be. But when the hardware and software are not working right, safety seems like a distraction.

Continue reading Two Tips to Make Your Online Meetings Better


Video Conferencing – Avoid Installing Meeting Programs When Possible

CEOs and Executives: Avoid installing video conferencing software on your computer just because some other company tells you to. When you launch video conferencing programs, many of them ask you to install a program or app on your computer or device. What if the program is a virus?

Continue reading Video Conferencing – Avoid Installing Meeting Programs When Possible


Zoom Security – Set Up Two-Step Login

Protect your Zoom account. If someone discovers your username and password for Zoom, two-step login should block them from logging in as you.

Continue reading Zoom Security – Set Up Two-Step Login


Zoom Security Settings – The Concise Details

Zoom has many security settings. This is a detailed but concise guide to the settings and how they work.

Continue reading Zoom Security Settings – The Concise Details


Zoom Security Issues – Protect Yourself

Every business is concerned and should be, about cybersecurity during online meetings. Due to its popularity, Zoom is an attractive target for the bad actors. There are hundreds, maybe more, people working all the time to break Zoom’s security.

Continue reading Zoom Security Issues – Protect Yourself