Mike Foster's IT Security & Best Practices Blog

Latest Posts

Please Alert Your IT Pros – Increase Your Security Log File Capacity

Windows computers can keep a log of security events, such as failed logon attempts. It is helpful to know if attackers are trying to gain access to your network. When the log fills up, it overwrites itself with the oldest events first. By default, the log files are very small, and that makes it much […]

Continue reading Please Alert Your IT Pros – Increase Your Security Log File Capacity


How To Know if a Password Attack Succeeded

Last week, you saw an example of a list of passwords that an attacker used to attack a server more than 41,000 times. But the worst part was the server that underwent a short attack…

Continue reading How To Know if a Password Attack Succeeded


Anatomy of a Password Attack

Password attacks against businesses happen all the time. You may find it interesting to see the list of usernames that attackers guess are on your system, and how many passwords they try for each username.

Continue reading Anatomy of a Password Attack


When Attackers Come Knocking

Earlier this year, we discovered that an angry ex-employee at one of our customer’s organization tried to guess the CEO’s password more than 300 times. The day he was fired, he went to work trying to crack the CEO’s password. What if he had been able to break in? It would have been devastating for […]

Continue reading When Attackers Come Knocking