Mike Foster's IT Security & Best Practices Blog

Latest Posts

How to Best Protect Your Mobile Devices

Continue reading How to Best Protect Your Mobile Devices


Online Password Warehouse, OneLogin, Discovers Massive Breach

Without getting complicated, OneLogin, Okta, Centrify, Microsoft, RSA SecureID Access, SalesForce App Cloud, and even more basic password managers store user identities, and login information. Using these services means that users only need to remember one password and all of their other logins are handled for them. The most important thing about the OneLogin breach: […]

Continue reading Online Password Warehouse, OneLogin, Discovers Massive Breach


Protect Against Bad Attachments and Employee Downloads

Imagine giving each of your team members a loaner computer every time they need to open a file that they download or receive as an attachment. The loaner computers won’t be connected to your network, so if a file is infected, ransomware and other viruses would not affect your network.

Continue reading Protect Against Bad Attachments and Employee Downloads