Mike Foster's IT Security & Best Practices Blog

Latest Posts

A New Opportunity for Your IT Pros to Protect your Servers

Attackers can take advantage of a large attack surface on your servers. Your IT professionals can drastically reduce the attack surface, and potentially save you money.

Continue reading A New Opportunity for Your IT Pros to Protect your Servers


How Buying a Spare Printer can Vastly Improve Your Cyber Security

Imagine a scenario when an IT professional knows there is an urgent security problem in your firewall that needs to be addressed. And at the same time, your multi-function printer is broken. What problem will the IT professional address first?

Continue reading How Buying a Spare Printer can Vastly Improve Your Cyber Security


IT Professionals: 3 Things IT Professionals Must Do to Avoid Being Fired

To keep their job, IT Professionals must do three things.

Continue reading IT Professionals: 3 Things IT Professionals Must Do to Avoid Being Fired


If Someone Impersonates You on Facebook

Twice recently, I’ve been contacted by executives who explain that someone was impersonating them on Facebook. They used my friends’ own pictures, sent messages, posted information, and everything was very inappropriate. Each friend asked what to do, and here is the answer in case this happens to you…

Continue reading If Someone Impersonates You on Facebook


How to Find Out if Your Password Might Have Been Hacked

You hear in the news that Yahoo, or some other company, got hacked and your username and password may be in the hands of attackers. There is a way to find out if your credentials were exposed.

Continue reading How to Find Out if Your Password Might Have Been Hacked


“This is Your Captain Speaking – No Samsung Phones Allowed”

Yesterday afternoon, I and some of the more than 100 other passengers on our jet were paying attention to the safety demo. Unexpectedly, the announcement included a statement that prohibited the use of a Samsung Galaxy Note 7 phone. Additionally, charging such a device is prohibited too. Now that’s harsh… or is it?

Continue reading “This is Your Captain Speaking – No Samsung Phones Allowed”


A Way to Control Consultant Access – Every Time

What if you’d like to know each and every time a consultant attempted to access your systems? And would you like the ability to approve or deny each attempt?

Continue reading A Way to Control Consultant Access – Every Time


How To Know if a Password Attack Succeeded

Last week, you saw an example of a list of passwords that an attacker used to attack a server more than 41,000 times. But the worst part was the server that underwent a short attack…

Continue reading How To Know if a Password Attack Succeeded