Mike Foster's IT Security & Best Practices Blog

Latest Posts

Prepare Your Organization for a Reaction to Coronavirus

The city of San Francisco just declared a state of emergency over the Coronavirus. Other cities will follow suit – maybe yours.

Continue reading Prepare Your Organization for a Reaction to Coronavirus


Executives Appreciate it when IT Professionals Communicate Effectively

Today, an IT Guru called to gather more information as he prepared to meet with his executives. His methodology was impressive, and executives might want to forward this to your IT professionals. IT professionals want to do a great job of communicating with executives and they welcome guidance for communication. A while ago, the executives […]

Continue reading Executives Appreciate it when IT Professionals Communicate Effectively


Adobe Flash Stops on December 31, 2020. Are You Ready?

For more than 20 years, Adobe Flash helped websites deliver video content to your screen. However, attackers use Flash to inject ransomware and other malicious code into computers. The bad actors are usually one step ahead of security patches.

Continue reading Adobe Flash Stops on December 31, 2020. Are You Ready?


Remember to Give Your IT Pros a Holiday Gift

Your IT Team pours out so much time and energy. If you aren’t already, you can brighten their holidays by giving them a gift. The work they do is often so complicated, yet they make it look easy. Unless you are a high-tech executive, it can be difficult to appreciate how sometimes your team accomplishes […]

Continue reading Remember to Give Your IT Pros a Holiday Gift


Protect Your Network Even when Attackers Trick Your Users

A business contacted our office last week because a bad actor tricked an employee to give them full access to their computer. The bad actor immediately took over the network and started performing highly illegal activities that appeared to come from the victim’s systems.  User training is not enough. It is essential to take additional […]

Continue reading Protect Your Network Even when Attackers Trick Your Users


Microsoft Will Stop Protecting Windows 7 on January 14, 2020

Windows 7 computers will still run, your anti-virus will still work, as will your other programs. But you are taking a significant risk because Microsoft will no longer provide security updates that help keep attackers out of your network.

Continue reading Microsoft Will Stop Protecting Windows 7 on January 14, 2020


Never Permit Tech Support to Access your Computer

A company had a problem with their bank’s remote deposit software. They called technical support, and the bank’s software support person announced, “First, I need to connect to your computer to see what is going on.” Fortunately, the company’s team member told the bank’s technical support person,

Continue reading Never Permit Tech Support to Access your Computer


When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6

Wi-Fi technology is always changing. When you buy new Wi-Fi equipment, be sure to ask if there is a Wi-Fi version 6 option available. You will increase speed, security, and help futureproof your investment. Wi-Fi version 6 will become the new standard for several reasons:

Continue reading When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6


Protect your Company from the Imminent Threat called Eternal Blue

In 2017, the NSA made headlines after developing a hacking tool called Eternal Blue. The NSA did not notify Microsoft of the stockpiled vulnerabilities, so Microsoft didn’t know what holes to seal. The hacker group called Shadow Brokers acquired this powerful hacking tool developed by some of our nation’s best and brightest.

Continue reading Protect your Company from the Imminent Threat called Eternal Blue


A Quick Way to Automatically Help Users Identify Impersonation Email Messages

Fraudsters can pretend to be an executive at a company to request wire transfers or gift card purchases. To reduce the chance of a message duping someone at your company:

Continue reading A Quick Way to Automatically Help Users Identify Impersonation Email Messages