Mike Foster's IT Security & Best Practices Blog

Latest Posts

Zoom Security – Follow Along to Set Security Settings

Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings. This video is […]

Continue reading Zoom Security – Follow Along to Set Security Settings


Make your Zoom Secure

Tomorrow (Friday) morning, expect a completed guide that is quick for you to implement to lock down your Zoom security. Get started now on a few settings:

Continue reading Make your Zoom Secure


Information that You Need to Know About the California Consumer Privacy Act

California’s CCPA act went into effect on January 1, but you have until July 1, 2020 when it is enforced. Get started now. First, you need to

Continue reading Information that You Need to Know About the California Consumer Privacy Act


Remember to Give Your IT Pros a Holiday Gift

Your IT Team pours out so much time and energy. If you aren’t already, you can brighten their holidays by giving them a gift. The work they do is often so complicated, yet they make it look easy. Unless you are a high-tech executive, it can be difficult to appreciate how sometimes your team accomplishes […]

Continue reading Remember to Give Your IT Pros a Holiday Gift


Good News for Windows 7 Users

Microsoft stops supporting Windows 7 on January 14, 2020. If you are not going to upgrade, there are options.

Continue reading Good News for Windows 7 Users


Avoid Opening Word Attachments – Check with IT First

When you receive an email message with a PDF attached, it is always best to confirm that you are expecting the attachment before opening it.  However, if you receive a Word, Excel, or another file type other than a pdf, beware.

Continue reading Avoid Opening Word Attachments – Check with IT First


Find Out if You Can Collect a Bundle from the Equifax Breach

There is a strong chance that hackers obtained your identity information in the Equifax breach. It exposed 148 million American’s sensitive information, and that sets you and your family up for identity theft. If you already suffered identity theft and can prove Equifax was the source, you might get up to twenty thousand dollars.

Continue reading Find Out if You Can Collect a Bundle from the Equifax Breach


You Do Not Need to Understand Computers to Make Ransomware

There is a new program that is designed to help even non-technical people to create ransomware. The tool is called Inpivx, and it is designed to provide easy point-and-click functionality.

Continue reading You Do Not Need to Understand Computers to Make Ransomware


What to Do if Someone Hacks Your Email Account

How to protect yourself if, or even before, an unauthorized spammer uses one of your email accounts to send out spam:

Continue reading What to Do if Someone Hacks Your Email Account


How to Stop the Annoying Phone Calls

Continue reading How to Stop the Annoying Phone Calls