Mike Foster's IT Security & Best Practices Blog

Latest Posts

Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks

Will running one rarely used program stop future attacks? It will in the SolarWinds attack and perhaps stop future compromises too.

Continue reading Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks


Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks

Bad Actors compromised a product called SolarWinds Orion and then used that as a vector attack organization. Ask your IT team if they use SolarWinds products, and if so, they must

Continue reading Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks


Beware: Attackers Buy Top Search Engine Results to Trick You

What seems to be the best way to find a company’s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site.

Continue reading Beware: Attackers Buy Top Search Engine Results to Trick You


Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them

An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network.

Continue reading Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them


If You Get Hacked, Do Not Email Anyone About It

You’ve trained your users to be vigilant for symptoms of cybersecurity issues. Now teach them to share their concerns confidentially.

Continue reading If You Get Hacked, Do Not Email Anyone About It


Zoom Security – Follow Along to Set Security Settings

Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings. This video is […]

Continue reading Zoom Security – Follow Along to Set Security Settings


Make your Zoom Secure

Tomorrow (Friday) morning, expect a completed guide that is quick for you to implement to lock down your Zoom security. Get started now on a few settings:

Continue reading Make your Zoom Secure


Information that You Need to Know About the California Consumer Privacy Act

California’s CCPA act went into effect on January 1, but you have until July 1, 2020 when it is enforced. Get started now. First, you need to

Continue reading Information that You Need to Know About the California Consumer Privacy Act


Remember to Give Your IT Pros a Holiday Gift

Your IT Team pours out so much time and energy. If you aren’t already, you can brighten their holidays by giving them a gift. The work they do is often so complicated, yet they make it look easy. Unless you are a high-tech executive, it can be difficult to appreciate how sometimes your team accomplishes […]

Continue reading Remember to Give Your IT Pros a Holiday Gift


Good News for Windows 7 Users

Microsoft stops supporting Windows 7 on January 14, 2020. If you are not going to upgrade, there are options.

Continue reading Good News for Windows 7 Users