Mike Foster's IT Security & Best Practices Blog

Latest Posts

Essential Equipment for Work From Home Users During Power Outages

Assuming your remote workers’ do not get too cold, they can continue to work at home during short power outages. You can encourage them to buy, or even issue them, a small uninterruptable power supply UPS for their Internet router. Laptops have built-in battery power. If a worker has a desktop computer or other networking […]

Continue reading Essential Equipment for Work From Home Users During Power Outages


Prepare Now to Recover Quickly from Ransomware on Mac and Windows Computers

Equip all of your Work from Home users with a cloned drive so they can help protect your network and get up and running quickly if they get ransomware or if their hard drive crashes. Protect your home family computers the same way.

Continue reading Prepare Now to Recover Quickly from Ransomware on Mac and Windows Computers


Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks

Will running one rarely used program stop future attacks? It will in the SolarWinds attack and perhaps stop future compromises too.

Continue reading Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks


Three of the Most Useful Links About the SolarWinds Attack:

Even if you don’t use SolarWinds, your suppliers and customers might. In some cases, your security is only as good as their security. There are so many webpages about the Solar Winds attack. Here are three of the most useful. Please forward this to your IT team.

Continue reading Three of the Most Useful Links About the SolarWinds Attack:


The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.

The investigation into the SolarWinds breach keeps revealing more shocking ways attackers infiltrated organizations. Even if your organization doesn’t use SolarWinds, you must take action.

Continue reading The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.


Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks

Bad Actors compromised a product called SolarWinds Orion and then used that as a vector attack organization. Ask your IT team if they use SolarWinds products, and if so, they must

Continue reading Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks


Beware: Attackers Buy Top Search Engine Results to Trick You

What seems to be the best way to find a company’s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site.

Continue reading Beware: Attackers Buy Top Search Engine Results to Trick You


Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them

An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network.

Continue reading Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them


If You Get Hacked, Do Not Email Anyone About It

You’ve trained your users to be vigilant for symptoms of cybersecurity issues. Now teach them to share their concerns confidentially.

Continue reading If You Get Hacked, Do Not Email Anyone About It


One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself

Workers who use their personal home computers for business put you at significant risk.

Continue reading One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself