Mike Foster's IT Security & Best Practices Blog

Latest Posts

Avoid These 3 Really Good Hacker Tricks

Attackers prey on people trusting others. Watch out for these three common tricks.

Continue reading Avoid These 3 Really Good Hacker Tricks


Be Secure or Be Compliant – Which Should You Do First?

If your organization meets requirements so that you are compliant with HIPAA, PCI DSS, SOC 2, or any other standard it does not mean you are secure. In fact,

Continue reading Be Secure or Be Compliant – Which Should You Do First?


This Hacker Tells All

CNN Money just published an insightful interview with a hacker. You may find it interesting. Read the interview by entering this search phrase into Google: My hack stole your credit card site:money.cnn.com Forward this to your friends who want to discover this hacker’s point of view on attacking tens of thousands of companies…

Continue reading This Hacker Tells All


Cyber Security’s Three Essential Steps

In this time of gratitude, which is perhaps the most important foundation of happiness and success, it is important to thank you for helping make the world a safer place. Three controls, perhaps the most important three controls, help protect you from cyber-threats. They are:

Continue reading Cyber Security’s Three Essential Steps