Mike Foster's IT Security & Best Practices Blog

Latest Posts

Beware: Attackers Buy Top Search Engine Results to Trick You

What seems to be the best way to find a company’s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site.

Continue reading Beware: Attackers Buy Top Search Engine Results to Trick You


Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them

An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network.

Continue reading Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them


One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself

Workers who use their personal home computers for business put you at significant risk.

Continue reading One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself


A Hacker Profile – Who Are They?

I experienced a presentation by the US Secret Service last week, and they provided the common background they’ve identified in attackers:

Continue reading A Hacker Profile – Who Are They?


Power Down to Boost Security

One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don’t want to power it down, at least disconnect from your network.

Continue reading Power Down to Boost Security


Two Tips to Make Your Online Meetings Better

Everyone is concerned about video conferencing security, and they should be. But when the hardware and software are not working right, safety seems like a distraction.

Continue reading Two Tips to Make Your Online Meetings Better


Video Conferencing – Avoid Installing Meeting Programs When Possible

CEOs and Executives: Avoid installing video conferencing software on your computer just because some other company tells you to. When you launch video conferencing programs, many of them ask you to install a program or app on your computer or device. What if the program is a virus?

Continue reading Video Conferencing – Avoid Installing Meeting Programs When Possible


Zoom Security – Set Up Two-Step Login

Protect your Zoom account. If someone discovers your username and password for Zoom, two-step login should block them from logging in as you.

Continue reading Zoom Security – Set Up Two-Step Login


Zoom Security Settings – The Concise Details

Zoom has many security settings. This is a detailed but concise guide to the settings and how they work.

Continue reading Zoom Security Settings – The Concise Details


Zoom Security – Follow Along to Set Security Settings

Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings. This video is […]

Continue reading Zoom Security – Follow Along to Set Security Settings