<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Applying IT Patches Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/applying-it-patches/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/applying-it-patches/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Thu, 06 May 2021 16:03:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Applying IT Patches Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/applying-it-patches/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Urgent Security Patch for Hundreds of Millions of Dell Computers</title>
		<link>https://fosterinstitute.com/urgent-security-patch-for-hundreds-of-millions-of-dell-computers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 06 May 2021 15:43:21 +0000</pubDate>
				<category><![CDATA[Application Updates]]></category>
		<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=4656</guid>

					<description><![CDATA[<p>Your IT Team has an opportunity to patch a security weakness in your Dell computers. If you facilitate them acting now, you will probably be one step ahead of attackers. The good news is Dell&#8217;s not detected any attacks in the wild. However, now bad actors have a new challenge, a puzzle to solve, a [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/urgent-security-patch-for-hundreds-of-millions-of-dell-computers/">Urgent Security Patch for Hundreds of Millions of Dell Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Your IT Team has an opportunity to patch a security weakness in your Dell computers. If you facilitate them acting now, you will probably be one step ahead of attackers.</p>



<p>The good news is Dell&#8217;s not detected any attacks in the wild. However, now bad actors have a new challenge, a puzzle to solve, a game with payoffs for them, and potential tragedy for their targets. Dell urges companies to install the update immediately.</p>



<p>Executives decide whether to accept the risk or provide teams with time to implement the two-step solution from Dell.</p>



<p>To exploit the security weakness, bad actors might effectively social engineer at least one user to click on a malicious link, open an infected attachment, or grant access to someone pretending to be a technical support professional.</p>



<p>Alternatively, the attacker can steal or guess the user&#8217;s password. For example, we are auditing a business right now and discovered the following passwords: Password, Password!, Password1, and Password123. Users choosing those passwords is NOT the IT professional&#8217;s fault.</p>



<p>Please forward this to your associates so they know that Dell is urging all affected customers to address this problem immediately.</p>



<p>Time is your team&#8217;s most precious asset, and this fix takes time. Discuss ways they can postpone other projects to address the problem before attackers start exploiting the vulnerability to potentially:</p>



<ul class="wp-block-list"><li>Shut down systems</li><li>Spread ransomware</li><li>Threaten to expose stolen data</li><li>Delete your data stored in the cloud or on your servers</li><li>Or otherwise devastate organizations</li></ul>



<p>Dell recommends acting immediately: <a href="http://dell.com/support/kbdoc/en-us/000186019/dsa-2021-088-dell-client-platform-security-update-for-dell-driver-insufficient-access-control-vulnerability" target="_blank" rel="noreferrer noopener">dell.com/support/kbdoc/en-us/000186019/dsa-2021-088-dell-client-platform-security-update-for-dell-driver-insufficient-access-control-vulnerability</a></p>



<p>During the recent Pwn2own competition, a team demonstrated exploiting Exchange servers. With the new knowledge, attackers infiltrated servers before IT Professionals could apply patches. The Dell vulnerability could have the same outcome. Keep in mind that there are vastly more Dell computers in businesses than there are on-prem Exchange servers.</p>



<p>Interestingly, the vulnerability only exists if the IT Team is applying Dell&#8217;s patches and updates. However, if your team is not using Dell&#8217;s other security updates, that is a problem too. They might not have enough time and need your understanding when they need to reprioritize their tasks, have additional help, or automate some processes they must do manually.</p>
<p>The post <a href="https://fosterinstitute.com/urgent-security-patch-for-hundreds-of-millions-of-dell-computers/">Urgent Security Patch for Hundreds of Millions of Dell Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Patching Nightmare – Please Forward to Your IT Pros</title>
		<link>https://fosterinstitute.com/patching-nightmare-please-forward-to-your-it-pros/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 23 Jan 2018 17:55:51 +0000</pubDate>
				<category><![CDATA[Adobe]]></category>
		<category><![CDATA[Adobe Flash]]></category>
		<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Patch Updates]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[CPU Chip Flaws]]></category>
		<category><![CDATA[CPU Chips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[deploying patches]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Intel]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[Java SE patch]]></category>
		<category><![CDATA[Oracle patches]]></category>
		<category><![CDATA[patching nightmare]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2607</guid>

					<description><![CDATA[<p>Intel says, again, to stop deploying patches. Java and other new patches need handling. Intel advises that IT Professionals stop deploying the current versions of patches for the recently discovered security flaws in CPU chips. Find details, just updated, by searching: Root Cause of Reboot Issue Identified Updated Guidance for Customers and Partners site:intel.com Do [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/patching-nightmare-please-forward-to-your-it-pros/">Patching Nightmare – Please Forward to Your IT Pros</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Intel says, again, to stop deploying patches. Java and other new patches need handling.<span id="more-2607"></span></p>
<p>Intel advises that IT Professionals stop deploying the current versions of patches for the recently discovered security flaws in CPU chips. Find details, just updated, by searching:<br />
Root Cause of Reboot Issue Identified Updated Guidance for Customers and Partners site:intel.com</p>
<p>Do not insert a space after the colon.</p>
<p>For most of you, deploying Microsoft patches is easy compared to managing Flash, Java, and browser updates. Oracle is releasing multiple security patches for Java SE. Additionally, if you are upgrading Chrome to the 64 bit version, Google is releasing new patches for that browser.</p>
<p>For executives wondering what to do at home, you may find it best to download fresh versions of any non-Microsoft browsers you use, and reinstall the most recent versions of Flash and Java, if you still use either, from <a href="https://get.adobe.com/flashplayer/">https://get.adobe dot com/flashplayer/</a> or <a href="https://www.java.com/en/">java dot com</a> . Your Microsoft and/or Apple patches are likely configured to install automatically.</p>
<p>For both organizations and home office users, if you can remove Flash and/or Java from some or all of your computers, then you can forget about patching them. If you haven’t already, try it on a few computers. You may find that all of the websites essential to your business no longer require either. Worst case, you can re-install the most recent version.</p>
<p>Executives, please forward this to your IT Professionals. Be sure to, if you have not already, have a conversation with them about how aggressive you want them to be with patching. They can share the pros and cons with you. These days, an aggressive posture related to patches can increase your security dramatically, when handled properly. Provide them time to test the patches, test un-installing the patches, and then to deploy the patches in stages. They will also need to contact your cloud providers to discuss how they are handling the flaws and patches.</p>
<p>The post <a href="https://fosterinstitute.com/patching-nightmare-please-forward-to-your-it-pros/">Patching Nightmare – Please Forward to Your IT Pros</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Get Apple’s Urgent Patches that Fix Dozens of Security Holes</title>
		<link>https://fosterinstitute.com/get-apples-urgent-patches-that-fix-dozens-of-security-holes/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 17 May 2017 16:08:20 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Patch Release]]></category>
		<category><![CDATA[Patch Updates]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[apple patch]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[fix security holes]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[how to apply apple patch]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[ipad updates]]></category>
		<category><![CDATA[iphone updates]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[updating apple products]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2495</guid>

					<description><![CDATA[<p>For those of you with Apple products, Apple just released some important updates. Knowing that updates might cause a problem, please back up your computer first. You are backing up all the time already, right? Time Machine is a wonderful tool and is built in. If you want to supplement Time Machine with an additional [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/get-apples-urgent-patches-that-fix-dozens-of-security-holes/">Get Apple’s Urgent Patches that Fix Dozens of Security Holes</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>For those of you with Apple products, Apple just released some important updates.</p>
<p>Knowing that updates might cause a problem, please back up your computer first. You are backing up all the time already, right? Time Machine is a wonderful tool and is built in. If you want to supplement Time Machine with an additional backup, Carbon Copy Cloner from Bombich dot com is very popular and clients experience great results. You’ll need a couple of external USB drives, but the investment is worth it.</p>
<p>In case you are not familiar with how to apply patches, here are instructions:</p>
<p>On your Apple computer, even if your computer is set for automatic updates, it is good to verify that you have the most recent patches. Click on the image of the apple in the top left corner, and choose App Store. If not already selected, choose Updates inside the title bar that already contains the words: Featured, Top Charts, Categories, Purchased, and Updates. You may see many updates for your applications, and those are fine to apply, but the urgent one is the update called macOS Sierra Update and the version is 10.12.5. If you’ve not updated in a while, you may see other macOS updates too.</p>
<p>iPhone and iPad users, press on the Settings icon that looks like a gear. In the left-hand column, select General, and you’ll see Software Update on the right-hand column near the top. The most recent patch is for iOS 10.3.2.</p>
<p>If you want to configure automatic updates for your Apple computers, find instructions by searching for this phrase in Google: Automatic security updates os x site:apple.com</p>
<p>If you want to configure automatic updates for the iPhone and iPad, find instructions by searching for this phrase in Google: Automatic security downloads iOS site:apple.com</p>
<p>Please forward this to everyone you know who uses Apple devices and you want to help be more secure…</p>
<p>The post <a href="https://fosterinstitute.com/get-apples-urgent-patches-that-fix-dozens-of-security-holes/">Get Apple’s Urgent Patches that Fix Dozens of Security Holes</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Patching – 10 Steps to Seal the Holes in Your Armor</title>
		<link>https://fosterinstitute.com/patching-10-steps-to-seal-the-holes-in-your-armor/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 15 May 2017 15:42:19 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Patch Updates]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[applying patches]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[ipad security]]></category>
		<category><![CDATA[iphone Security]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Microsoft patch]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[patch deployment]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[patches]]></category>
		<category><![CDATA[ransomware attack]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[updating patches]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2482</guid>

					<description><![CDATA[<p>You’ve likely heard of the massive ransomware attack that has taken down so many organizations, including hospitals, around the world. The ransomware appears to have exploited a bug for which Microsoft released a fix a little over a month ago. Follow these 10 steps to help protect your organization from this, and from future attacks: [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/patching-10-steps-to-seal-the-holes-in-your-armor/">Patching – 10 Steps to Seal the Holes in Your Armor</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You’ve likely heard of the massive ransomware attack that has taken down so many organizations, including hospitals, around the world. The ransomware appears to have exploited a bug for which Microsoft released a fix a little over a month ago. Follow these 10 steps to help protect your organization from this, and from future attacks:<span id="more-2482"></span></p>
<p>Instructions for Windows and Apple home users are listed below the numbers. For organizations, here are 10 Steps To Avoid Incidents Including the Massive Ransomware Attack:</p>
<p>1. The reality is that most organizations are missing critical security patches and there is a very strong likelihood that yours is too.</p>
<p>2. Provide your team with extra time, and perhaps additional personnel, to test and then deploy patches ASAP. Some organizations are adding a new IT professional to their team whose sole responsibility is to manage patches. If the patch fails testing, then time must be invested to resolve the issue or implement compensating controls.</p>
<p>3. Prioritize critical security patches for the operating system, all the browsers, Flash, Java, your PDF Reader, and Microsoft Office. They are usually the easiest to attack and form your first line of defense.</p>
<p>4. Many IT teams are very reluctant to apply patches for fear of breaking your systems that are already running. Help remove their fears by reassuring them that you take on responsibility if the patch causes a problem. Encourage them to follow a procedure that mitigates risks:</p>
<p>5. Test Patches in a test environment that uses the same applications as the rest of your network. For very small companies, your test environment might be a single computer. For larger organizations, and organizations that stand to lose a great deal in the event of an attack, create a separate testing environment that is isolated from the production environment.</p>
<p>6. Have a pre-tested rollback plan so that, if the patch does cause a problem, your IT team will already know what they need to do right away to roll back a patch that causes an unexpected problem. They will then go back to the testing phase.</p>
<p>7. Deploy the patches in stages rather than patching all machines simultaneously. That way, even if the patch does cause a problem, not all your machines will be affected.</p>
<p>8. You may decide to empower your IT team with a patch management tool such as Ninite, LANGuard, Shavlik, or others. Allow them to test and choose a tool, and provide them with the means and time to do so, ASAP.</p>
<p>9. Ask IT, perhaps weekly and at least monthly, to provide you with a list of missing patches, not a pie chart.</p>
<p>10. You must upgrade from older operating systems, any of the ones that Microsoft no longer supports. If some machines cannot be upgraded, then they must be isolated or some other compensating control put into place. Microsoft clearly states when they stop producing patches for old operating systems.  So, there was no patch available for Windows XP and others.</p>
<p>Call me if they are not able to apply patches. Let’s team up to help prevent this.</p>
<p>At home, or if your organization is so small that you do not have an IT team or have an outsourced IT company that takes care of your patches, be sure that the option that provides automatic updates to Microsoft is enabled. The instructions are easy to find – just google the phrase: configure automatic updates site:Microsoft.com</p>
<p>Apple computer users, google: Automatic security updates os x site:apple.com</p>
<p>iPhone and iPad users, google: Automatic security downloads ios site:apple.com</p>
<p>Additionally, manually check for updates in Microsoft Office to be sure those are applied. Be sure that automatic updates are enabled in your browsers. Regularly download and apply patches to, or new versions of, Flash, Java, and your PDF reader.</p>
<p>Please forward this to everyone you care about and want to help stay secure.</p>
<p>The post <a href="https://fosterinstitute.com/patching-10-steps-to-seal-the-holes-in-your-armor/">Patching – 10 Steps to Seal the Holes in Your Armor</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Alert Your IT Team &#8211; Urgent Patch for Network Servers</title>
		<link>https://fosterinstitute.com/alert-your-it-team-urgent-patch-for-network-servers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 18 Apr 2017 15:36:47 +0000</pubDate>
				<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Patch Release]]></category>
		<category><![CDATA[Patch Updates]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT professionals]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[patch deployment]]></category>
		<category><![CDATA[patches]]></category>
		<category><![CDATA[Patching]]></category>
		<category><![CDATA[pre-testing patches]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[VMware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2460</guid>

					<description><![CDATA[<p>Many organizations use VMware to host their servers. VMware has released an urgent update they label as Critical. Patching VMware, which is often used as a platform for many of your other servers, can be frustrating. If the patch causes a problem, there is a risk that all your servers hosted on that machine will [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/alert-your-it-team-urgent-patch-for-network-servers/">Alert Your IT Team &#8211; Urgent Patch for Network Servers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Many organizations use VMware to host their servers. VMware has released an urgent update they label as <span id="more-2460"></span>Critical.</p>
<p>Patching VMware, which is often used as a platform for many of your other servers, can be frustrating. If the patch causes a problem, there is a risk that all your servers hosted on that machine will go down.</p>
<p>This is one of those risk vs. benefit decisions that is so important, business executives must be involved.</p>
<p>On the one hand, the patch could interrupt business, but not applying the patch could be considered reckless.</p>
<p>Test the patch prior to deployment, when possible. Having a pre-planned, if not pre-tested, roll-back plan is crucial in case the patch causes a problem.</p>
<p>Preferably patch one server at a time so that, if the patch does cause a problem, at least the interruption is limited to that server.</p>
<p>Without the patch, someone could run programs on your computer, potentially taking control of the server.</p>
<p>The patch fixes a vulnerability in the VMware Customer Experience Improvement Program, even if a customer is not participating in the program.</p>
<p>Please emphasize the last phrase to your IT pros.</p>
<p>Ask your IT pros to look at VMware’s information by searching for VMSA-2017-0007.</p>
<p>Please forward this to everyone who may be using VMware, so that they can alert their IT pros just in case they don’t know already.</p>
<p>The post <a href="https://fosterinstitute.com/alert-your-it-team-urgent-patch-for-network-servers/">Alert Your IT Team &#8211; Urgent Patch for Network Servers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Only One Virus is a Huge Problem</title>
		<link>https://fosterinstitute.com/only-one-virus-is-a-huge-problem/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 03 Nov 2016 15:34:55 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Application Updates]]></category>
		<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Infected Apps]]></category>
		<category><![CDATA[Invisible Security Threats]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Virus]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Virus]]></category>
		<category><![CDATA[Click to Play]]></category>
		<category><![CDATA[cyber infection]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[cyber security warning IT Pro Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[network security protections]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[updating patches]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[virus infections]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2390</guid>

					<description><![CDATA[<p>If your office has even one instance of a virus, ransomware, or any other kind of malware, that is a huge symptom. Yesterday, someone told me their security was good since they only get infected by a few viruses each year. Even a single infection means there is a possibility that their machines are already [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/only-one-virus-is-a-huge-problem/">Only One Virus is a Huge Problem</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If your office has even one instance of a virus, ransomware, or any other kind of malware, that is a huge symptom. <span id="more-2390"></span></p>
<p>Yesterday, someone told me their security was good since they only get infected by a few viruses each year. </p>
<p>Even a single infection means there is a possibility that their machines are already infected. </p>
<p>If one virus can get in, other undetectable viruses can too.</p>
<p>Unless security protections are very poor on a network or computer, visible virus infections are rare these days. </p>
<p>People who see virus infections need to act, including patching their Internet facing applications and enabling click-to-play. Those features already come with Windows and applications so there is nothing to buy or download. For more information, see foster institute dot come slash blog.</p>
<p>If you know someone whose computers on their network catch viruses, tell them the viruses are more like chest pain, not like the common cold. Infections are the sign of some greater damage that is about to, or already has, occurred.</p>
<p>The post <a href="https://fosterinstitute.com/only-one-virus-is-a-huge-problem/">Only One Virus is a Huge Problem</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Security’s Three Essential Steps</title>
		<link>https://fosterinstitute.com/cyber-securitys-three-essential-steps/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 25 Nov 2015 19:12:03 +0000</pubDate>
				<category><![CDATA[Application Whitelisting]]></category>
		<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[application patches]]></category>
		<category><![CDATA[application whitelisting]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[cyber security business strategy]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Local Admin rights]]></category>
		<category><![CDATA[patch updates]]></category>
		<category><![CDATA[program installation]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2228</guid>

					<description><![CDATA[<p>In this time of gratitude, which is perhaps the most important foundation of happiness and success, it is important to thank you for helping make the world a safer place. Three controls, perhaps the most important three controls, help protect you from cyber-threats. They are: 1. Keep critical operating system and application patches up to [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/cyber-securitys-three-essential-steps/">Cyber Security’s Three Essential Steps</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In this time of gratitude, which is perhaps the most important foundation of happiness and success, it is important to thank you for helping make the world a safer place. Three controls, perhaps the most important three controls, help protect you from cyber-threats. They are:<span id="more-2228"></span></p>
<p>1. Keep critical operating system and application patches up to date, especially Flash, Java, Reader, and your browsers. Updates fix security loopholes in programs. The fear of a patch causing a program to malfunction can be reduced with proper testing, performing a staged rollout, and having a rollback plan.</p>
<p>2. Utilize Application Whitelisting. Application whitelisting allows you to specify what programs are permitted to run, such as Microsoft Office, your accounting program, and anything else your team needs for business purposes. Because of not being on the ok list, the majority of malicious software is blocked from running. The reason most companies don&#8217;t use application whitelisting is that their IT Pros know it can be a daunting process to set up and make it work well. Therefore, we can set that up for your IT pros. Why should they need to learn something when it only needs to be done once? The upkeep can be simple from then on.</p>
<p>3. Reduce the number of users with Local Admin rights as much as possible. This removes a user&#8217;s ability to install programs on their computer. As a result, it greatly hinders the ability for attackers to install malicious software too.</p>
<p>Other than implementation, none of those cost any money. You already paid for the technology. Emphasize the importance of, and support your IT Pros, as they implement these 3 powerful controls in your network. </p>
<p>Wishing you a thankful week and thank you all for remembering cyber-security as part of your main strategy for successful business operations!</p>
<p>The post <a href="https://fosterinstitute.com/cyber-securitys-three-essential-steps/">Cyber Security’s Three Essential Steps</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hacking Easier than Protection</title>
		<link>https://fosterinstitute.com/hacking-easier-than-protection/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 27 Oct 2015 14:48:39 +0000</pubDate>
				<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[cyber protection]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT knowledge]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[organization security]]></category>
		<category><![CDATA[patches]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2190</guid>

					<description><![CDATA[<p>The shocking truth: In some ways, it is easier to hack systems than it is to protect them. There are many automated tools that greatly simplify the art of hacking yet it often takes someone with IT knowledge to protect a system. You will have to find thousands of ways to protect against, but an [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/hacking-easier-than-protection/">Hacking Easier than Protection</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The shocking truth: In some ways, it is easier to hack systems than it is to protect them. There are many automated tools that greatly simplify the art of hacking <span id="more-2190"></span>yet it often takes someone with IT knowledge to protect a system. You will have to find thousands of ways to protect against, but an attacker only needs to find one way in.</p>
<p>Help protect yourself at the foundation: First, discuss and determine how aggressive you want to be with your patches – and get them applied. Second, be sure to make users something other than local administrators.</p>
<p>The post <a href="https://fosterinstitute.com/hacking-easier-than-protection/">Hacking Easier than Protection</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Microsoft Using Your Computer To Deliver Software</title>
		<link>https://fosterinstitute.com/microsoft-using-your-computer-to-deliver-software/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 31 Aug 2015 16:00:17 +0000</pubDate>
				<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[hotspot safety]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Microsoft Settings]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Delivery Optimization]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2144</guid>

					<description><![CDATA[<p>Microsoft built a feature into Windows 10 called Delivery Optimization. Your computer may deliver and receive apps and patches to and from computers belonging to complete strangers. Your computer becomes a server to deliver patches and apps to people on the Internet. Though it is likely enabled on your computers, you can turn this feature [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/microsoft-using-your-computer-to-deliver-software/">Microsoft Using Your Computer To Deliver Software</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Microsoft built a feature into Windows 10 called Delivery Optimization. Your computer may deliver and receive apps and patches to and from computers belonging to complete strangers. Your computer becomes a server to deliver patches and apps to people on the Internet. Though it is likely enabled on your computers, you can turn this feature off. <span id="more-2144"></span></p>
<p>Microsoft presents the feature to users saying, “Download apps and OS updates from multiple sources to get them more quickly&#8221;.</p>
<p>Think about it and it sort of makes sense. Rather than every computer on the planet having to go to Microsoft’s servers to download patches and apps, Windows 10 computers can reach out to other Windows 10 computers and obtain the patch from them. This helps prevent Microsoft’s servers from becoming overloaded, and can allow your computer to receive patches and apps sooner. Ultimately, this can even reduce the amount of traffic flowing on the Internet in general.</p>
<p>Microsoft has built in strong security – though security can be broken. </p>
<p>Microsoft does their best not to use your computer to deliver patches if you are connected to the Internet using a mobile hotspot – helping you avoid unexpected data charges. You can also specify what Wi-Fi connections are charged as metered networks.</p>
<p>One concern is that, if your computer is being used to deliver updates, your Internet connection may slow down. Or, perhaps you don’t want your computer to be, what some users may feel is, a zombie for Microsoft to use as part of their patch delivery mechanism.</p>
<p>How to turn this feature off in Windows 10: Go to the Start button icon, choose Settings > Update &#038; Security > Windows Update > Advanced Options. You can choose to not participate, or to select either PCs on your local network only, or PCs on your local network and PCs on the Internet” </p>
<p>Please help spread the word and forward this newsletter on to those you care about! </p>
<p>The post <a href="https://fosterinstitute.com/microsoft-using-your-computer-to-deliver-software/">Microsoft Using Your Computer To Deliver Software</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Huge Change in Scheduled Patches</title>
		<link>https://fosterinstitute.com/huge-change-in-scheduled-patches/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 07 May 2015 16:26:44 +0000</pubDate>
				<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[Patch Release]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[adobe patches]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Microsoft patches]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[patch deployment]]></category>
		<category><![CDATA[patch release]]></category>
		<category><![CDATA[patches]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[scheduled patches]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2089</guid>

					<description><![CDATA[<p>IT Pros know to clear their calendars right after the second Tuesday of the month. Dubbed “Patch Tuesday,” that’s when Microsoft releases most patches. Microsoft announced they are abandoning that practice and will release patches ASAP when they are available. What it means for your IT Pros… A benefit of knowing when to expect patches is that [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/huge-change-in-scheduled-patches/">Huge Change in Scheduled Patches</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>IT Pros know to clear their calendars right after the second Tuesday of the month. Dubbed “Patch Tuesday,” that’s when Microsoft releases most patches. Microsoft announced they are abandoning that practice and will release patches ASAP when they are available. What it means for your IT Pros…<span id="more-2089"></span></p>
<p>A benefit of knowing when to expect patches is that patch time could be planned in advance. Now your IT Pros will have to be vigilant about applying Microsoft patches any time of the month. That’s the way it is with Adobe Flash, Java, PDF Reader, and browser patches.</p>
<p>And, patches do you no good until they are installed on your systems.</p>
<p>Applying patches is one of the best things you can do to protect against hacker attacks.</p>
<p>3 Cardinal rules for patches:</p>
<p>First, test the patches. Patches sometimes cause problems, especially Java patches, so they have to be tested. Test them ASAP so you can deploy them ASAP.</p>
<p>Second, use a staged deployment. Patches need to be deployed first to a few machines, then more, then to the rest of your network. That way, if a patch causes a problem, not everyone is down at the same time.</p>
<p>Third, always have a plan on how to “roll back” the patches if they do cause a problem. That’s just another reason to always have good backups and test your ability to restore.</p>
<p>Microsoft says the new “ASAP” patch release proactive will start when Windows 10 is released. That will probably be in July 2015.</p>
<p>Please post your comments below&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/huge-change-in-scheduled-patches/">Huge Change in Scheduled Patches</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
