Mike Foster's IT Security & Best Practices Blog

Latest Posts

Protect Your Network Even when Attackers Trick Your Users

A business contacted our office last week because a bad actor tricked an employee to give them full access to their computer. The bad actor immediately took over the network and started performing highly illegal activities that appeared to come from the victim’s systems.  User training is not enough. It is essential to take additional […]

Continue reading Protect Your Network Even when Attackers Trick Your Users


Microsoft Will Stop Protecting Windows 7 on January 14, 2020

Windows 7 computers will still run, your anti-virus will still work, as will your other programs. But you are taking a significant risk because Microsoft will no longer provide security updates that help keep attackers out of your network.

Continue reading Microsoft Will Stop Protecting Windows 7 on January 14, 2020


Never Permit Tech Support to Access your Computer

A company had a problem with their bank’s remote deposit software. They called technical support, and the bank’s software support person announced, “First, I need to connect to your computer to see what is going on.” Fortunately, the company’s team member told the bank’s technical support person,

Continue reading Never Permit Tech Support to Access your Computer


When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6

Wi-Fi technology is always changing. When you buy new Wi-Fi equipment, be sure to ask if there is a Wi-Fi version 6 option available. You will increase speed, security, and help futureproof your investment. Wi-Fi version 6 will become the new standard for several reasons:

Continue reading When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6


Protect your Company from the Imminent Threat called Eternal Blue

In 2017, the NSA made headlines after developing a hacking tool called Eternal Blue. The NSA did not notify Microsoft of the stockpiled vulnerabilities, so Microsoft didn’t know what holes to seal. The hacker group called Shadow Brokers acquired this powerful hacking tool developed by some of our nation’s best and brightest.

Continue reading Protect your Company from the Imminent Threat called Eternal Blue


A Quick Way to Automatically Help Users Identify Impersonation Email Messages

Fraudsters can pretend to be an executive at a company to request wire transfers or gift card purchases. To reduce the chance of a message duping someone at your company:

Continue reading A Quick Way to Automatically Help Users Identify Impersonation Email Messages


Watch for Threatening Email Messages that Contain Your Actual Passwords

You may receive a threatening email message that shows you your actual username and password. The attacker may demand you pay them 2900, or some other significant amount. They threaten horrible things if you do not pay.

Continue reading Watch for Threatening Email Messages that Contain Your Actual Passwords


Stop Hidden Attacks Buried in Email Attachments

When you receive an email attachment, even when you are expecting the document and know the sender, the attached file can be poisoned. 

Continue reading Stop Hidden Attacks Buried in Email Attachments


Ask IT Pros to Check Your Routers and Firewalls

We audited a company last week and discovered that their web filtering tools, designed to stop users from accidentally landing on malicious websites, was not blocking dangerous sites. In these days with ransomware and bad actors tricking users into clicking on dangerous links, it is essential to have web content filtering in place.

Continue reading Ask IT Pros to Check Your Routers and Firewalls


How to E-Mail Encrypted Attachments

E-mail messages can be intercepted or read by an unauthorized individual.

Continue reading How to E-Mail Encrypted Attachments