Mike Foster's IT Security & Best Practices Blog

Latest Posts

Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated Problems

A friend contacted me a few days ago and said, “Every few weeks, I’ll go to a site, and it will say that this appears to be a new device? For example, I’ve looked at my Twitter account this morning, and it put up my username and asked me for my password again. Is this […]

Continue reading Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated Problems


Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them

An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network.

Continue reading Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them


Zoom Security – Set Up Two-Step Login

Protect your Zoom account. If someone discovers your username and password for Zoom, two-step login should block them from logging in as you.

Continue reading Zoom Security – Set Up Two-Step Login


Zoom Security Settings – The Concise Details

Zoom has many security settings. This is a detailed but concise guide to the settings and how they work.

Continue reading Zoom Security Settings – The Concise Details


Zoom Security – Follow Along to Set Security Settings

Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings. This video is […]

Continue reading Zoom Security – Follow Along to Set Security Settings


Make your Zoom Secure

Tomorrow (Friday) morning, expect a completed guide that is quick for you to implement to lock down your Zoom security. Get started now on a few settings:

Continue reading Make your Zoom Secure


Plan Now for Slow Internet and Dropped Phone Calls

Prepare now for slow Internet speeds and dropped mobile phone calls. Some customers report that their remote workers experience slow Internet speeds. The sheer number of people working from home, and others watching videos at home, is causing the Internet to experience slowdowns similar to traffic during rush hour.

Continue reading Plan Now for Slow Internet and Dropped Phone Calls


Recommendations for Cybersecurity for Remote Workers During Coronavirus

The rapidly changing situation of potential school closures, self-quarantines, and public reaction to the coronavirus guarantees that at some point you will have employees who need to work from home.

Continue reading Recommendations for Cybersecurity for Remote Workers During Coronavirus


What Will You Do if Your Customers’ Spam Filters Block Your Messages?

One of the ways your spam filter helps to stop unwanted messages is to block messages from mail servers with a bad reputation for spamming. What will you do if your company gets labeled as a spammer? First of all, nobody will receive your company’s messages.

Continue reading What Will You Do if Your Customers’ Spam Filters Block Your Messages?


Protect Your Network Even when Attackers Trick Your Users

A business contacted our office last week because a bad actor tricked an employee to give them full access to their computer. The bad actor immediately took over the network and started performing highly illegal activities that appeared to come from the victim’s systems.  User training is not enough. It is essential to take additional […]

Continue reading Protect Your Network Even when Attackers Trick Your Users