Mike Foster's IT Security & Best Practices Blog

Latest Posts

Protect your Company from the Imminent Threat called Eternal Blue

In 2017, the NSA made headlines after developing a hacking tool called Eternal Blue. The NSA did not notify Microsoft of the stockpiled vulnerabilities, so Microsoft didn’t know what holes to seal. The hacker group called Shadow Brokers acquired this powerful hacking tool developed by some of our nation’s best and brightest.

Continue reading Protect your Company from the Imminent Threat called Eternal Blue


You Do Not Need to Understand Computers to Make Ransomware

There is a new program that is designed to help even non-technical people to create ransomware. The tool is called Inpivx, and it is designed to provide easy point-and-click functionality.

Continue reading You Do Not Need to Understand Computers to Make Ransomware


Attackers are Targeting High Net Worth Individuals

An experienced high-level executive shared his concern about how attackers are investing more time targeting high net worth individuals.

Continue reading Attackers are Targeting High Net Worth Individuals


Happy Computer Security Day!

November 30th is Computer Security Day. Today is a great day to remind your team members to continue to be extra vigilant as they watch for spam email messages. 

Continue reading Happy Computer Security Day!


One Setting Can Protect Your Network from Ransomware

Once an attacker accesses one computer, they attempt to traverse the network and infect other computers too. That’s how ransomware spreads on a network.

Continue reading One Setting Can Protect Your Network from Ransomware


Recover Quickly if Ransomware Attacks at Remote Worker and Home Computers

Ransomware is a common problem. If an attacker encrypts all your files and demands that you pay ransom to unlock your files, you will want to be able to recover quickly. Regular backups are not enough.

Continue reading Recover Quickly if Ransomware Attacks at Remote Worker and Home Computers


Protect Yourself and Your Organization – New Ransomware Outbreak with Added Poison

A new strain of Ransomware, dubbed P e t y a, is gaining momentum infecting companies and home users. Worst of all, in addition to holding files ransom until you pay up, it appears to be infiltrating corporate networks to steal usernames and passwords too. Be sure that you:

Continue reading Protect Yourself and Your Organization – New Ransomware Outbreak with Added Poison


Patching – 10 Steps to Seal the Holes in Your Armor

You’ve likely heard of the massive ransomware attack that has taken down so many organizations, including hospitals, around the world. The ransomware appears to have exploited a bug for which Microsoft released a fix a little over a month ago. Follow these 10 steps to help protect your organization from this, and from future attacks:

Continue reading Patching – 10 Steps to Seal the Holes in Your Armor


E-Mail Protection Solution

Everyone is concerned about the danger of a user clicking on a link in an email message, perhaps invoking a ransomware attack, or users responding to requests to transfer money. There are tools that will help.

Continue reading E-Mail Protection Solution


Protect Against Bad Attachments and Employee Downloads

Imagine giving each of your team members a loaner computer every time they need to open a file that they download or receive as an attachment. The loaner computers won’t be connected to your network, so if a file is infected, ransomware and other viruses would not affect your network.

Continue reading Protect Against Bad Attachments and Employee Downloads