Mike Foster's IT Security & Best Practices Blog

Latest Posts

Alert Your Team – USB Devices, Login Prompts, and Apps

Warn your users about three ways attackers continue to exploit the COVID-19 crisis:

Continue reading Alert Your Team – USB Devices, Login Prompts, and Apps


Information that You Need to Know About the California Consumer Privacy Act

California’s CCPA act went into effect on January 1, but you have until July 1, 2020 when it is enforced. Get started now. First, you need to

Continue reading Information that You Need to Know About the California Consumer Privacy Act


Executives Give Clues Before Firing IT Firms

Not all top-level executives, owners, and other decision makers are pleased with their outsourced IT firm. What signs should a service provider notice?

Continue reading Executives Give Clues Before Firing IT Firms


Fire Phone at Work

Amazon just announced the new Amazon Fire phone. The first thing I wanted to know was about BYOD (Bring Your Own Device) features. How will your business utilize this great new device? The news is good…

Continue reading Fire Phone at Work


5 More Things to Love about Apple

Apple has wonderful traits. Last week were the first 5 of 10, and here are the remaining 5 things Apple does so well…

Continue reading 5 More Things to Love about Apple


5 Things to Love about Apple

Apple has a lot of great things going for it. Here are 5 of the biggest ones:

Continue reading 5 Things to Love about Apple


Keeping Hackers from Stealing Your Online Identity

Too often you visit a website, after you place an order, transfer money, or update a profile, you just close the window when you are finished. You just skipped one of the most important parts for security…

Continue reading Keeping Hackers from Stealing Your Online Identity


These Short and Fun IT Videos Can Protect You!

Always remember: The best IT security controls can be thwarted by human ignorance. Here are fun videos to help you train your users in an enjoyable way. One of our training videos currently holds the #1 spot

Continue reading These Short and Fun IT Videos Can Protect You!


Turn Off Computers for Security?

A common question is: “Does turning off a computer when not in use help with security?”

Continue reading Turn Off Computers for Security?


How to Cause IT to Fail

Many organizations reward IT professionals for solving IT problems. That is not only ineffective, it is counterproductive. Become aware of what you are incentivizing IT to do.

Continue reading How to Cause IT to Fail