Mike Foster's IT Security & Best Practices Blog

Latest Posts

Executives Appreciate it when IT Professionals Communicate Effectively

Today, an IT Guru called to gather more information as he prepared to meet with his executives. His methodology was impressive, and executives might want to forward this to your IT professionals. IT professionals want to do a great job of communicating with executives and they welcome guidance for communication. A while ago, the executives […]

Continue reading Executives Appreciate it when IT Professionals Communicate Effectively


Remember to Give Your IT Pros a Holiday Gift

Your IT Team pours out so much time and energy. If you aren’t already, you can brighten their holidays by giving them a gift. The work they do is often so complicated, yet they make it look easy. Unless you are a high-tech executive, it can be difficult to appreciate how sometimes your team accomplishes […]

Continue reading Remember to Give Your IT Pros a Holiday Gift


Good News for Windows 7 Users

Microsoft stops supporting Windows 7 on January 14, 2020. If you are not going to upgrade, there are options.

Continue reading Good News for Windows 7 Users


A Huge Data Leak Exposed Your Personal Information

The most massive data leak that’s ever happened includes neatly bundled information for more than 1 billion people. Keep in mind that the estimated population of the United States is only 330 million. If you use email, you are probably exposed.

Continue reading A Huge Data Leak Exposed Your Personal Information


Protect your Company from the Imminent Threat called Eternal Blue

In 2017, the NSA made headlines after developing a hacking tool called Eternal Blue. The NSA did not notify Microsoft of the stockpiled vulnerabilities, so Microsoft didn’t know what holes to seal. The hacker group called Shadow Brokers acquired this powerful hacking tool developed by some of our nation’s best and brightest.

Continue reading Protect your Company from the Imminent Threat called Eternal Blue


A Quick Way to Automatically Help Users Identify Impersonation Email Messages

Fraudsters can pretend to be an executive at a company to request wire transfers or gift card purchases. To reduce the chance of a message duping someone at your company:

Continue reading A Quick Way to Automatically Help Users Identify Impersonation Email Messages


You Do Not Need to Understand Computers to Make Ransomware

There is a new program that is designed to help even non-technical people to create ransomware. The tool is called Inpivx, and it is designed to provide easy point-and-click functionality.

Continue reading You Do Not Need to Understand Computers to Make Ransomware


What to Do if Someone Hacks Your Email Account

How to protect yourself if, or even before, an unauthorized spammer uses one of your email accounts to send out spam:

Continue reading What to Do if Someone Hacks Your Email Account


How to Stop the Annoying Phone Calls

Continue reading How to Stop the Annoying Phone Calls


How to Best Protect Your Mobile Devices

Continue reading How to Best Protect Your Mobile Devices