Mike Foster's IT Security & Best Practices Blog

Latest Posts

Easily Lock the Data on USB Drives

People sometimes lose or misplace USB memory sticks, SD Cards, and other external storage media. Help protect your data from prying eyes and cyber thieves: Encrypt your drive in 3 easy steps…

Continue reading Easily Lock the Data on USB Drives


Reduce Your Risk of a Workplace Shooter

It happens too often: An employer terminates an employee, and then the employee comes back to shoot their supervisors. There is a simple way to reduce the likelihood…

Continue reading Reduce Your Risk of a Workplace Shooter


What to Do About Your Passwords

You probably heard that a group of hackers has collected more than a billion passwords – so far. The best password strategies:

Continue reading What to Do About Your Passwords


As if Heartbleed Wasn’t Enough, Here is Another Emergency:

Please forward this to your IT Techs immediately. As with Heartbleed, this is a vulnerability that attackers are already using against you and nobody knew until right now. These are called “zero-day attacks.”

Continue reading As if Heartbleed Wasn’t Enough, Here is Another Emergency:


Use Windows 7 with Windows 8’s Benefits

As businesses transition to Windows 8, they don’t want to train their user in Windows 8. Here is a short 90 second video that shows the secret about how you can give Windows 7 all the great new stability, security, and speed that Windows 8 has to offer.

Continue reading Use Windows 7 with Windows 8’s Benefits


Heartbleed Hack Impacts You Too

There is a zero-day attack (meaning there was no patch) that allows attackers to bypass your encryption. Attackers can bypass your website’s security, as well as access all of the information you thought was “secure” at the websites you use – like banking sites.

Continue reading Heartbleed Hack Impacts You Too


Annihilate Sensitive Data

A chief executive asked this week about, if he is going to donate a computer to a good cause, how can he erase all of his sensitive data from the hard drive first? Here is how – complete with a video.

Continue reading Annihilate Sensitive Data


Linksys products – if you use them at home or work – you may be vulnerable to an attack

Your IT professionals are very busy and often don’t have time to keep up with what are called “firmware updates.” It turns out that many manufacturer’s products, including Linksys products that are common in smaller businesses and in homes, are getting hacked. Ask your IT professional to update your firmware. They may need to disable […]

Continue reading Linksys products – if you use them at home or work – you may be vulnerable to an attack


Attn: There is a Serious Mac Virus Circulating Right Now

There is a virus attacking Mac users that infects your computer and steals copies of your data files including .pdf documents. The virus has been named OSX/LaoShu-A. The way to protect yourself is to not click on any links in email messages that you don’t recognize. Historically, Mac users were targeted less often than Windows […]

Continue reading Attn: There is a Serious Mac Virus Circulating Right Now


The Bank Tells Us To Disable Security!

Ask your IT Professionals, “Has any vendor, even the bank, asked us to reduce security levels on any of our machines or the network?” Counterintuitively, the bank often tells your IT professionals to disable important security protection. This happens when your bank gives you a program or web site in order for your users to […]

Continue reading The Bank Tells Us To Disable Security!