Mike Foster's IT Security & Best Practices Blog

Latest Posts

Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks

Will running one rarely used program stop future attacks? It will in the SolarWinds attack and perhaps stop future compromises too.

Continue reading Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks


The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.

The investigation into the SolarWinds breach keeps revealing more shocking ways attackers infiltrated organizations. Even if your organization doesn’t use SolarWinds, you must take action.

Continue reading The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.


If You Get Hacked, Do Not Email Anyone About It

You’ve trained your users to be vigilant for symptoms of cybersecurity issues. Now teach them to share their concerns confidentially.

Continue reading If You Get Hacked, Do Not Email Anyone About It


One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself

Workers who use their personal home computers for business put you at significant risk.

Continue reading One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself


Zoom Security – Set Up Two-Step Login

Protect your Zoom account. If someone discovers your username and password for Zoom, two-step login should block them from logging in as you.

Continue reading Zoom Security – Set Up Two-Step Login


Prepare Your Organization for a Reaction to Coronavirus

The city of San Francisco just declared a state of emergency over the Coronavirus. Other cities will follow suit – maybe yours.

Continue reading Prepare Your Organization for a Reaction to Coronavirus


Microsoft Will Stop Protecting Windows 7 on January 14, 2020

Windows 7 computers will still run, your anti-virus will still work, as will your other programs. But you are taking a significant risk because Microsoft will no longer provide security updates that help keep attackers out of your network.

Continue reading Microsoft Will Stop Protecting Windows 7 on January 14, 2020


Find Out if You Can Collect a Bundle from the Equifax Breach

There is a strong chance that hackers obtained your identity information in the Equifax breach. It exposed 148 million American’s sensitive information, and that sets you and your family up for identity theft. If you already suffered identity theft and can prove Equifax was the source, you might get up to twenty thousand dollars.

Continue reading Find Out if You Can Collect a Bundle from the Equifax Breach


Never Permit Tech Support to Access your Computer

A company had a problem with their bank’s remote deposit software. They called technical support, and the bank’s software support person announced, “First, I need to connect to your computer to see what is going on.” Fortunately, the company’s team member told the bank’s technical support person,

Continue reading Never Permit Tech Support to Access your Computer


Mac Vulnerability Permits Unauthorized Login

Apple’s newest operating system has a serious vulnerability that can allow someone else to logon to your Mac. Here’s what to do: 

Continue reading Mac Vulnerability Permits Unauthorized Login