Mike Foster's IT Security & Best Practices Blog

Latest Posts

Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated Problems

A friend contacted me a few days ago and said, “Every few weeks, I’ll go to a site, and it will say that this appears to be a new device? For example, I’ve looked at my Twitter account this morning, and it put up my username and asked me for my password again. Is this […]

Continue reading Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated Problems


Three of the Most Useful Links About the SolarWinds Attack:

Even if you don’t use SolarWinds, your suppliers and customers might. In some cases, your security is only as good as their security. There are so many webpages about the Solar Winds attack. Here are three of the most useful. Please forward this to your IT team.

Continue reading Three of the Most Useful Links About the SolarWinds Attack:


The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.

The investigation into the SolarWinds breach keeps revealing more shocking ways attackers infiltrated organizations. Even if your organization doesn’t use SolarWinds, you must take action.

Continue reading The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.


Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them

An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network.

Continue reading Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them


One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself

Workers who use their personal home computers for business put you at significant risk.

Continue reading One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself


Be Smart and Avoid This Comforting Belief

Someone told me today, as is common: Attackers are only interested in hacking large businesses.

Continue reading Be Smart and Avoid This Comforting Belief


A Hacker Profile – Who Are They?

I experienced a presentation by the US Secret Service last week, and they provided the common background they’ve identified in attackers:

Continue reading A Hacker Profile – Who Are They?


Power Down to Boost Security

One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don’t want to power it down, at least disconnect from your network.

Continue reading Power Down to Boost Security


Two Tips to Make Your Online Meetings Better

Everyone is concerned about video conferencing security, and they should be. But when the hardware and software are not working right, safety seems like a distraction.

Continue reading Two Tips to Make Your Online Meetings Better


Video Conferencing – Avoid Installing Meeting Programs When Possible

CEOs and Executives: Avoid installing video conferencing software on your computer just because some other company tells you to. When you launch video conferencing programs, many of them ask you to install a program or app on your computer or device. What if the program is a virus?

Continue reading Video Conferencing – Avoid Installing Meeting Programs When Possible