Mike Foster's IT Security & Best Practices Blog

Latest Posts

Alert Your Team – USB Devices, Login Prompts, and Apps

Warn your users about three ways attackers continue to exploit the COVID-19 crisis:

Continue reading Alert Your Team – USB Devices, Login Prompts, and Apps


Plan Now for Slow Internet and Dropped Phone Calls

Prepare now for slow Internet speeds and dropped mobile phone calls. Some customers report that their remote workers experience slow Internet speeds. The sheer number of people working from home, and others watching videos at home, is causing the Internet to experience slowdowns similar to traffic during rush hour.

Continue reading Plan Now for Slow Internet and Dropped Phone Calls


Warn Your Workers about Attacker Decoy Tactics

Alert your workers to be on guard looking for fake, decoy websites about coronavirus,

Continue reading Warn Your Workers about Attacker Decoy Tactics


Protect Your Network Even when Attackers Trick Your Users

A business contacted our office last week because a bad actor tricked an employee to give them full access to their computer. The bad actor immediately took over the network and started performing highly illegal activities that appeared to come from the victim’s systems.  User training is not enough. It is essential to take additional […]

Continue reading Protect Your Network Even when Attackers Trick Your Users


773 Million Passwords Exposed – Were You Exposed?

Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords

Continue reading 773 Million Passwords Exposed – Were You Exposed?


Attackers are Targeting High Net Worth Individuals

An experienced high-level executive shared his concern about how attackers are investing more time targeting high net worth individuals.

Continue reading Attackers are Targeting High Net Worth Individuals


Happy Computer Security Day!

November 30th is Computer Security Day. Today is a great day to remind your team members to continue to be extra vigilant as they watch for spam email messages. 

Continue reading Happy Computer Security Day!


You Might Stop Receiving Essential Email Messages, and What to Do About It

If someone ever impersonates you via email, you may stop receiving legitimate email messages too. Computers belonging to people who received a fake email message may automatically send all new messages to the phony address instead of yours. Senders don’t realize what is happening, and you stop receiving essential email messages.

Continue reading You Might Stop Receiving Essential Email Messages, and What to Do About It


Stealing Tesla Cars, and Stealing Your Network with Agent Tesla

The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization’s security too.

Continue reading Stealing Tesla Cars, and Stealing Your Network with Agent Tesla


Can you Trust the Kindness of Tech Support Strangers?

If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your computer, think twice.

Continue reading Can you Trust the Kindness of Tech Support Strangers?