Mike Foster's IT Security & Best Practices Blog

Latest Posts

How to Find Out if Your Password Might Have Been Hacked

You hear in the news that Yahoo, or some other company, got hacked and your username and password may be in the hands of attackers. There is a way to find out if your credentials were exposed.

Continue reading How to Find Out if Your Password Might Have Been Hacked


“This is Your Captain Speaking – No Samsung Phones Allowed”

Yesterday afternoon, I and some of the more than 100 other passengers on our jet were paying attention to the safety demo. Unexpectedly, the announcement included a statement that prohibited the use of a Samsung Galaxy Note 7 phone. Additionally, charging such a device is prohibited too. Now that’s harsh… or is it?

Continue reading “This is Your Captain Speaking – No Samsung Phones Allowed”


A Way to Control Consultant Access – Every Time

What if you’d like to know each and every time a consultant attempted to access your systems? And would you like the ability to approve or deny each attempt?

Continue reading A Way to Control Consultant Access – Every Time


Delta Airlines Believes their Epic Technology Failure is like Painting a Bridge

On August 8, Delta had to cancel 2,000 flights due to a major technology malfunction. It could have been prevented.

Continue reading Delta Airlines Believes their Epic Technology Failure is like Painting a Bridge