Mike Foster's IT Security & Best Practices Blog

Latest Posts

Two Tips to Make Your Online Meetings Better

Everyone is concerned about video conferencing security, and they should be. But when the hardware and software are not working right, safety seems like a distraction.

Continue reading Two Tips to Make Your Online Meetings Better


Video Conferencing – Avoid Installing Meeting Programs When Possible

CEOs and Executives: Avoid installing video conferencing software on your computer just because some other company tells you to. When you launch video conferencing programs, many of them ask you to install a program or app on your computer or device. What if the program is a virus?

Continue reading Video Conferencing – Avoid Installing Meeting Programs When Possible


Zoom Security – Set Up Two-Step Login

Protect your Zoom account. If someone discovers your username and password for Zoom, two-step login should block them from logging in as you.

Continue reading Zoom Security – Set Up Two-Step Login


Zoom Security Settings – The Concise Details

Zoom has many security settings. This is a detailed but concise guide to the settings and how they work.

Continue reading Zoom Security Settings – The Concise Details


Zoom Security – Follow Along to Set Security Settings

Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings. This video is […]

Continue reading Zoom Security – Follow Along to Set Security Settings


Make your Zoom Secure

Tomorrow (Friday) morning, expect a completed guide that is quick for you to implement to lock down your Zoom security. Get started now on a few settings:

Continue reading Make your Zoom Secure


Warn Your Workers about Attacker Decoy Tactics

Alert your workers to be on guard looking for fake, decoy websites about coronavirus,

Continue reading Warn Your Workers about Attacker Decoy Tactics


Recommendations for Cybersecurity for Remote Workers During Coronavirus

The rapidly changing situation of potential school closures, self-quarantines, and public reaction to the coronavirus guarantees that at some point you will have employees who need to work from home.

Continue reading Recommendations for Cybersecurity for Remote Workers During Coronavirus


Prepare Your Organization for a Reaction to Coronavirus

The city of San Francisco just declared a state of emergency over the Coronavirus. Other cities will follow suit – maybe yours.

Continue reading Prepare Your Organization for a Reaction to Coronavirus


Executives Appreciate it when IT Professionals Communicate Effectively

Today, an IT Guru called to gather more information as he prepared to meet with his executives. His methodology was impressive, and executives might want to forward this to your IT professionals. IT professionals want to do a great job of communicating with executives and they welcome guidance for communication. A while ago, the executives […]

Continue reading Executives Appreciate it when IT Professionals Communicate Effectively