<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>browser security Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/browser-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/browser-security/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Wed, 18 Nov 2020 16:40:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>browser security Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/browser-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Beware: Attackers Buy Top Search Engine Results to Trick You</title>
		<link>https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 16:40:14 +0000</pubDate>
				<category><![CDATA[browser security]]></category>
		<category><![CDATA[Credit Card Security]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[Malicious Advertising]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Website Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3351</guid>

					<description><![CDATA[<p>What seems to be the best way to find a company&#8217;s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site. Here is how the scam works: Suppose you want to look up a company online [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/">Beware: Attackers Buy Top Search Engine Results to Trick You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>What seems to be the best way to find a company&#8217;s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site. <span id="more-3351"></span></p>
<p>Here is how the scam works: Suppose you want to look up a company online named Super Duper, so you type the store&#8217;s name into your favorite search engine. An attacker might have purchased the top result to take you to the website superduperco.com. However, if you knew to scroll down past the paid-for-results, you would have seen that the real website is superduper.com. Attackers set up a website and named it superduperco.com.</p>
<p>Their deceptive site might contain malicious advertising, ask you to enter credit card numbers during checkout, or tempt you to download malicious programs and apps. They might ask you to login or reset a password, and they capture the password you type in.</p>
<p>If you look up a retailer in a search engine, skip past the ads and paid results. Scroll down to see real search results. Even then, be skeptical in case attackers used SEO techniques to appear at the top of the actual search results.</p>
<p>Please forward this to your friends to alert their users that top search engine results can be a trap.</p>
<p>The post <a href="https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/">Beware: Attackers Buy Top Search Engine Results to Trick You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Adobe Flash Stops on December 31, 2020. Are You Ready?</title>
		<link>https://fosterinstitute.com/adobe-flash-stops-on-december-31-2020-are-you-ready/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 03 Jan 2020 17:09:55 +0000</pubDate>
				<category><![CDATA[Adobe Flash]]></category>
		<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3022</guid>

					<description><![CDATA[<p>For more than 20 years, Adobe Flash helped websites deliver video content to your screen. However, attackers use Flash to inject ransomware and other malicious code into computers. The bad actors are usually one step ahead of security patches. To end this security nightmare, Adobe set Flash&#8217;s official termination date to December 31, 2020. Expect [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/adobe-flash-stops-on-december-31-2020-are-you-ready/">Adobe Flash Stops on December 31, 2020. Are You Ready?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>For more than 20 years, Adobe Flash helped websites deliver video content to your screen. However, attackers use Flash to inject ransomware and other malicious code into computers. The bad actors are usually one step ahead of security patches.<span id="more-3022"></span></p>
<p>To end this security nightmare, Adobe set Flash&#8217;s official termination date to December 31, 2020. Expect your browsers, Firefox, Chrome, Edge, etc. to disable and remove Flash on or before that date.</p>
<p>That helps security, but Flash&#8217;s demise could negatively impact your organization. If one of your websites requires your customers to use Flash, it is time to convert the content asap. Unless you are sure, meet with your web development team and confirm your visitors and customers do not need Flash to use your sites. If so, your developers can convert your content to use supported technologies.</p>
<p>Additionally, ask your IT professionals if your team members rely on sites that require Flash. If so, now is the time to work with those providers to spur them to transition away from Flash. If they refuse to move, you need to find other options. </p>
<p>While frustrating to many, especially frustrating to attackers, the ultimate demise of Flash helps make the world a safer place!</p>
<p>Please forward this to your friends in case they aren&#8217;t aware that Flash&#8217;s termination date is December 31, 2020.</p>
<p>The post <a href="https://fosterinstitute.com/adobe-flash-stops-on-december-31-2020-are-you-ready/">Adobe Flash Stops on December 31, 2020. Are You Ready?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Updated: Forward these 7 Minimum Security Requirements for Your Small Service Providers</title>
		<link>https://fosterinstitute.com/forward-these-7-minimum-security-requirements-for-your-small-service-providers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 23 Jul 2018 13:00:16 +0000</pubDate>
				<category><![CDATA[Adobe Flash]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Encrypted Attachments]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Service Provider Breach]]></category>
		<category><![CDATA[Service Provider Safety]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2648</guid>

					<description><![CDATA[<p>Many organizations outsource to service providers that are not cyber-secure. It is common for companies to experience a significant security breach that originated at a third party. Just ask Target. Forward this request to your small outsourced providers asking them to do these seven things. This newsletter is much more lengthy than usual, but it [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/forward-these-7-minimum-security-requirements-for-your-small-service-providers/">Updated: Forward these 7 Minimum Security Requirements for Your Small Service Providers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Many organizations outsource to service providers that are not cyber-secure. It is common for companies to experience a significant security breach that originated at a third party. Just ask Target. Forward this request to your small outsourced providers asking them to do these seven things.<span id="more-2648"></span><br />
This newsletter is much more lengthy than usual, but it is essential to provide you with comprehensive information to forward to your smaller service providers.</p>
<p>Of course, large service providers are expected to do much more for their security. But what about your service providers that have 10 or fewer employees and cyber-security has never been appropriately addressed? The chances are that they are hungry for some detailed security guidance. Once they implement some or all of the following recommendations, they can sleep better at night too.</p>
<p>None of these are unreasonable for you to request. And, a massive benefit to your service provider is that they can improve their cyber-security and that helps their own company and other customers, too. Everyone wins!</p>
<p>If you want to, send your contractors and service providers something like this. You may want to ask your IT team to review and perhaps edit it since your organization may already have security measures in place that eliminate the need for your providers to perform some of these recommendations:</p>
<p>Dear – you fill in the blank,</p>
<p>Cyber-security is a big concern these days, and we are checking in with all of our valued service providers, including you.</p>
<p>Our cyber-security depends to some degree on your level of cyber-security.</p>
<p>Below are cyber-security recommendations for you to follow in your organization. You may fall under laws and regulations that are even more stringent than these.</p>
<p>If you have any questions or decide not to follow the recommendations for any reason, please say so, and that will start a dialogue that can be beneficial for all parties.</p>
<p>First and foremost, you should always have great backups, and the ability to restore, because you accept full responsibility if you experience any problems as you implement these recommendations.</p>
<p>Unless you use patch management, and maybe nobody ever told you what that is, then to help ensure you are receiving protective patches from Microsoft and Apple, strongly consider enabling the automatic update feature in Windows and Mac OSX. There is a good chance it is activated already, but be sure. Installing critical security patches is essential since it increases security dramatically. There is always a small risk that a security patch could cause problems, but not installing a critical security update can put you at a much higher risk.</p>
<p>Patch your browsers too. Browser security patches are critical since, if a user clicks a malicious link in an email message, the attack usually makes a mad dash to poison that user’s browser quietly.</p>
<p>Uninstall all programs on each computer that you don’t think you will use. It is ok to start with the programs that are easy to recognize and skip the rest for now. That speeds and simplifies implementing this recommendation. Every program installed on a computer is a potential toe-hold for an attacker to gain access to a system. Worst case, if you delete an application now that you need later, you can usually re-install it quickly and easily.</p>
<p>In particular, remove Java and Flash. These are two tools that are frequently hacked and are likely unnecessary for your organization. Leaving them installed creates a significant security risk in your organization. If you later discover that you do need either, you can reinstall them with the newest version. Make sure to only get Java from java dot com and Flash from get dot adobe dot com forward-slash flash player Do not insert the space between the words flash and player.</p>
<p>If you do leave Java or Flash installed, investigate the click-to-play option that could protect you from unauthorized attacks based on Java and Flash.</p>
<p>Make sure to make your user accounts a “standard user” on your computers. Implementing this recommendation is slightly more complicated, especially if you are unfamiliar with creating new users. But it is included in these recommendations because it can increase your security immensely. If you use a third party IT company, you may choose to ask them to do this part for you.<br />
The necessary steps for Windows and Mac: 1) Create a new local user account 2) Promote that user to be a local administrator 3) Demote the computer user’s current account to a standard user and use that account. Perform this change on each computer separately. It is rare that a user will notice there has been a change. If you ever need administrative access to a computer, you can use the new user account that you created and promoted to have administrative access. In rare circumstances, a program you use may require each user to be a local administrator. Needing to configure users to be local administrators is unfortunate indeed since it is so damaging to security.</p>
<p>The previous recommendation is all about local user accounts. Larger organizations especially will use something called the Active Directory. However, even when using the Active Directory, this recommendation about local administrators still applies.</p>
<p>Enable two-step verification on all the websites that require a login. In its most basic form, once two-step login is turned on, then when a user enters a username and password, their phone will receive a text message with a code to use to complete the login process. This added protection helps you tremendously if an attacker steals one of your website passwords. The setting is usually in the security settings of the website.</p>
<p>Even if your screen is set to lock after a brief period automatically, an insider can easily bypass that will artificially jiggle the mouse. The computer will think you are there, even if you are not, and the computer will not lock automatically. Before you ever move away from your computer, manually lock the screen. One way to quickly accomplish locking the screen in Windows is to hold down the Windows key and then tap the L key. On Macs, utilize the hot-corners feature to lock the screen when you move the mouse to one of the corners of your screen. Require a password to unlock the screen.</p>
<p>Before you send us a file that contains sensitive information, encrypt the file. It is straightforward to encrypt Microsoft Office and PDF documents using settings within the software. If you are emailing a file, do not email the password too, not even in a separate email message. If an attacker has access to the email accounts, they will have both the file and the password. Instead, exchange the passwords via a phone call or a text message. Unless required by regulation or law, use a passphrase at least 15 characters long, but you do not need to use the upper case, lower case letters, numbers, and symbols. Making passwords complex interferes with productivity and doesn’t help as much as using longer passphrases. An example passphrase could be: thanks for being secure. Just be sure you still comply with rules and regulations.</p>
<p>Know that it is an excellent practice to avoid connecting to Wi-Fi services at hotels, airports, coffee shops, etc. It is more secure to use a phone or personal hot-spot to connect a computer to the Internet. The added phone charges may be lower than you expect, especially if you change to a plan with unlimited data.</p>
<p>Please forward this to your smaller service providers; it can help prevent some big heartaches and expenses for you and them both.</p>
<p>The post <a href="https://fosterinstitute.com/forward-these-7-minimum-security-requirements-for-your-small-service-providers/">Updated: Forward these 7 Minimum Security Requirements for Your Small Service Providers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Moms, Dads, and Friends: Take 7 Steps to Secure Your Students’ Computers</title>
		<link>https://fosterinstitute.com/moms-dads-and-friends-take-7-steps-to-secure-your-students-computers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 29 Aug 2017 15:58:37 +0000</pubDate>
				<category><![CDATA[Adobe Flash]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[hotspot safety]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[Student Cyber Security]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[coffee shop wi-fi]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Flash]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[parent cyber safety tips]]></category>
		<category><![CDATA[program safety]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[sandard users]]></category>
		<category><![CDATA[School computers]]></category>
		<category><![CDATA[school laptop]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[Stucent Computers]]></category>
		<category><![CDATA[student cyber-security]]></category>
		<category><![CDATA[Student Safety]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2528</guid>

					<description><![CDATA[<p>School is starting again and many students need computers. Take these important steps to help make them more secure:In addition to how they back up now, they also need to perform image backups that will back up everything, even programs, so that restore operations can go quickly and not interfere with schoolwork. Image backup tools [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/moms-dads-and-friends-take-7-steps-to-secure-your-students-computers/">Moms, Dads, and Friends: Take 7 Steps to Secure Your Students’ Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>School is starting again and many students need computers. Take these important steps to help make them more secure:<span id="more-2528"></span>In addition to how they back up now, they also need to perform image backups that will back up everything, even programs, so that restore operations can go quickly and not interfere with schoolwork. Image backup tools include Shadow Protect Desktop from Storage Craft, and Acronis True Image. For Macs, use Carbon Copy Cloner.</p>
<p>Be sure the “automatic update” feature is turned on in Windows and in Mac OS. Students must have the critical security patches installed to dramatically increase security. They’ll need to patch their browsers separately.</p>
<p>Uninstall all programs that they don’t think they will use. Start with the programs that are easy to recognize and skip the rest for now. Each program is a potential toe-hold for an attacker to gain access to a system. Worst case, if they delete something now that they need later, they can re-install it. In particular, remove Java and Flash. These are two tools that are frequently hacked and may be unnecessary. If a student finds they need either, he or she can reinstall them with the newest version. Make sure they get Java only from java dot com and Flash from get.adobe dot com/flashplayer/</p>
<p>Make sure they make their user account a “standard user” on their computer. This helps block attackers. Steps for Windows and Mac: 1) Create a new user 2) promote that user to be a local administrator 3) Demote your account to a standard user and use your own account.</p>
<p>Turn on two-step verifications on all the websites they visit. The setting is usually in the security settings of the website.</p>
<p>They need to keep their computer physically secure. Someone could access their files, social media, and e-mail accounts easily and without their knowledge. Passwords aren’t that helpful. It is usually trivial to bypass passwords on computers once an attacker gains physical access to a computer.</p>
<p>And though they may not heed this last step, it is a really good idea to avoid connoting to Wi-Fi services at school, coffee shops, etc. It is better if they use their phone or personal hot-spot to connect their computer to the Internet when they need to. The phone charges may be lower than you expect, especially if you call your phone provider and check about new data plan options.</p>
<p>Please forward this to your friends who have students; it can help prevent some big heartaches.</p>
<p>The post <a href="https://fosterinstitute.com/moms-dads-and-friends-take-7-steps-to-secure-your-students-computers/">Moms, Dads, and Friends: Take 7 Steps to Secure Your Students’ Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Patching – 10 Steps to Seal the Holes in Your Armor</title>
		<link>https://fosterinstitute.com/patching-10-steps-to-seal-the-holes-in-your-armor/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 15 May 2017 15:42:19 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Patch Updates]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[applying patches]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[ipad security]]></category>
		<category><![CDATA[iphone Security]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Microsoft patch]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[patch deployment]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[patches]]></category>
		<category><![CDATA[ransomware attack]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[updating patches]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2482</guid>

					<description><![CDATA[<p>You’ve likely heard of the massive ransomware attack that has taken down so many organizations, including hospitals, around the world. The ransomware appears to have exploited a bug for which Microsoft released a fix a little over a month ago. Follow these 10 steps to help protect your organization from this, and from future attacks: [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/patching-10-steps-to-seal-the-holes-in-your-armor/">Patching – 10 Steps to Seal the Holes in Your Armor</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You’ve likely heard of the massive ransomware attack that has taken down so many organizations, including hospitals, around the world. The ransomware appears to have exploited a bug for which Microsoft released a fix a little over a month ago. Follow these 10 steps to help protect your organization from this, and from future attacks:<span id="more-2482"></span></p>
<p>Instructions for Windows and Apple home users are listed below the numbers. For organizations, here are 10 Steps To Avoid Incidents Including the Massive Ransomware Attack:</p>
<p>1. The reality is that most organizations are missing critical security patches and there is a very strong likelihood that yours is too.</p>
<p>2. Provide your team with extra time, and perhaps additional personnel, to test and then deploy patches ASAP. Some organizations are adding a new IT professional to their team whose sole responsibility is to manage patches. If the patch fails testing, then time must be invested to resolve the issue or implement compensating controls.</p>
<p>3. Prioritize critical security patches for the operating system, all the browsers, Flash, Java, your PDF Reader, and Microsoft Office. They are usually the easiest to attack and form your first line of defense.</p>
<p>4. Many IT teams are very reluctant to apply patches for fear of breaking your systems that are already running. Help remove their fears by reassuring them that you take on responsibility if the patch causes a problem. Encourage them to follow a procedure that mitigates risks:</p>
<p>5. Test Patches in a test environment that uses the same applications as the rest of your network. For very small companies, your test environment might be a single computer. For larger organizations, and organizations that stand to lose a great deal in the event of an attack, create a separate testing environment that is isolated from the production environment.</p>
<p>6. Have a pre-tested rollback plan so that, if the patch does cause a problem, your IT team will already know what they need to do right away to roll back a patch that causes an unexpected problem. They will then go back to the testing phase.</p>
<p>7. Deploy the patches in stages rather than patching all machines simultaneously. That way, even if the patch does cause a problem, not all your machines will be affected.</p>
<p>8. You may decide to empower your IT team with a patch management tool such as Ninite, LANGuard, Shavlik, or others. Allow them to test and choose a tool, and provide them with the means and time to do so, ASAP.</p>
<p>9. Ask IT, perhaps weekly and at least monthly, to provide you with a list of missing patches, not a pie chart.</p>
<p>10. You must upgrade from older operating systems, any of the ones that Microsoft no longer supports. If some machines cannot be upgraded, then they must be isolated or some other compensating control put into place. Microsoft clearly states when they stop producing patches for old operating systems.  So, there was no patch available for Windows XP and others.</p>
<p>Call me if they are not able to apply patches. Let’s team up to help prevent this.</p>
<p>At home, or if your organization is so small that you do not have an IT team or have an outsourced IT company that takes care of your patches, be sure that the option that provides automatic updates to Microsoft is enabled. The instructions are easy to find – just google the phrase: configure automatic updates site:Microsoft.com</p>
<p>Apple computer users, google: Automatic security updates os x site:apple.com</p>
<p>iPhone and iPad users, google: Automatic security downloads ios site:apple.com</p>
<p>Additionally, manually check for updates in Microsoft Office to be sure those are applied. Be sure that automatic updates are enabled in your browsers. Regularly download and apply patches to, or new versions of, Flash, Java, and your PDF reader.</p>
<p>Please forward this to everyone you care about and want to help stay secure.</p>
<p>The post <a href="https://fosterinstitute.com/patching-10-steps-to-seal-the-holes-in-your-armor/">Patching – 10 Steps to Seal the Holes in Your Armor</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization</title>
		<link>https://fosterinstitute.com/finally-a-solution-to-solve-what-may-be-the-biggest-cyber-security-risk-at-your-organization/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 12 Dec 2016 17:00:32 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Spam Phishing]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[Wire Transfer Fraud]]></category>
		<category><![CDATA[Authetnic8]]></category>
		<category><![CDATA[Bad Link]]></category>
		<category><![CDATA[Biggest Security Risk]]></category>
		<category><![CDATA[Citrix]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Email Link]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hosted browser]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[malicious websites]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Wire transfer fraud]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2404</guid>

					<description><![CDATA[<p>It happens all the time: A user clicks on a link in an email message, and the computer gets infected. Ransomware can lock up the data on the drive or even your servers. Sensitive data can be stolen, wire transfers attempted, and other bad things can happen. When a user is tricked into clicking on [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/finally-a-solution-to-solve-what-may-be-the-biggest-cyber-security-risk-at-your-organization/">Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It happens all the time: A user clicks on a link in an email message, and the computer gets infected. Ransomware can lock up the data on the drive or even your servers. Sensitive data can be stolen, wire transfers attempted, and other bad things can happen. When a user is tricked into clicking on a bad link, the link instantaneously takes the user to a malicious website. It may even look like a real website or pop-up window. Now the attackers win.</p>
<p>A drastic solution is to <span id="more-2404"></span>uninstall all browsers. Browsers can’t get hacked when they don’t exist. You can switch to hosted browser service that runs browsers in the cloud, not on your computer.</p>
<p>To see how this works, watch the short videos at authentic8 dot com and Citrix dot com/virtualization/secure-browser </p>
<p>This newsletter is targeted to executives who don’t need to understand technology, so you may choose to forward the following technical information to your IT Department.</p>
<p>And please forward this to anyone whose cybersecurity you care about.</p>
<p>For our more technical audience: As of today, only authentic8’s solution supports general web browsing, but both support web applications.</p>
<p>Since these services put security first, and functionality a close second, you may still need a local browser for some applications if they don’t function properly in the hosted browser environment. But, if that is the case, you may be able to remove Flash and Java from your systems to make your local browsers more secure.</p>
<p>The biggest problem with both products is that they do not have a way to be set as the default browser to be used if a user clicks inside an email message. So, if you must leave a local browser installed, your users will still need to be careful about clicking links in email messages. The solution may be available soon.</p>
<p>Hosted browsers still protect your computers during web browsing sessions. And it becomes practically impossible for an attacker to use a hosted browser to access the sensitive data stored on your network drives.</p>
<p>Investigate using a hosted browser for added protection against the many threats on the Internet that exploit browsers and plugins such as Flash and Java.</p>
<p>The post <a href="https://fosterinstitute.com/finally-a-solution-to-solve-what-may-be-the-biggest-cyber-security-risk-at-your-organization/">Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Find Out if Your Password Might Have Been Hacked</title>
		<link>https://fosterinstitute.com/how-to-find-out-if-your-password-might-have-been-hacked/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 14 Oct 2016 14:34:49 +0000</pubDate>
				<category><![CDATA[browser security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Hacked Passwords]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Have I been hacked]]></category>
		<category><![CDATA[Have I Been Pwned]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pro tips]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[login credential safety]]></category>
		<category><![CDATA[Preventative IT Maintenance Cyber]]></category>
		<category><![CDATA[pwned]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Troy Hung]]></category>
		<category><![CDATA[Web Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2381</guid>

					<description><![CDATA[<p>You hear in the news that Yahoo, or some other company, got hacked and your username and password may be in the hands of attackers. There is a way to find out if your credentials were exposed. An Australian Web Security Specialist, Troy Hunt, has compiled a database containing usernames that have been stolen in [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/how-to-find-out-if-your-password-might-have-been-hacked/">How to Find Out if Your Password Might Have Been Hacked</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You hear in the news that Yahoo, or some other company, got hacked and your username and password may be in the hands of attackers. There is a way to find out if your credentials were exposed.<span id="more-2381"></span></p>
<p>An Australian Web Security Specialist, Troy Hunt, has compiled a database containing usernames that have been stolen in hacks and then published or sold.  Some people use his site to look up their own email address or username.<br />
His website is haveibeenpwned dot com.  (In this case, Pwned refers to a condition of someone else having access to your login credentials.) </p>
<p>At his site, people enter their email address or any usernames they’ve used for online logins. Sometimes, they look up addresses of their family members. If there is a hit, the details of the breach are displayed on the site.</p>
<p>Even if not on the list, there is no guarantee that person’s credentials haven’t been stolen, but it still helps to know.</p>
<p>If you ever suspect that your login credentials to any website have been exposed, it is very important that you reset the password on that site, as well as any other sites where you may have used the same password.</p>
<p>There are other strategies to protect yourself. Enabling two-step-logon is very important these days since it can thwart attackers who know your username and password. Using a password manager, as opposed to letting your browser store passwords, can help make password security more convenient, but it still needs to be used carefully. These strategies are explained in detail elsewhere in this blog.</p>
<p>Forward this to anyone who might want to know if their username and password has been hacked… </p>
<p>The post <a href="https://fosterinstitute.com/how-to-find-out-if-your-password-might-have-been-hacked/">How to Find Out if Your Password Might Have Been Hacked</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security Version 2.0</title>
		<link>https://fosterinstitute.com/security-version-2-0/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 28 Apr 2016 13:00:20 +0000</pubDate>
				<category><![CDATA[Adobe Flash]]></category>
		<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Application Updates]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Application List]]></category>
		<category><![CDATA[Application Safety]]></category>
		<category><![CDATA[business IT security]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[essential programs]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[non-essential programs]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Summarized Application Inventory]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2306</guid>

					<description><![CDATA[<p>Here is another powerful way to strengthen security – upgrade to the newest versions. Just like last week, your key tool will be your application inventory. It will look something like this… The application inventory shows how many machines have a specific program installed on them, such as: Qty &#8211; Application 18 &#8211; Adobe Flash [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/security-version-2-0/">Security Version 2.0</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Here is another powerful way to strengthen security – upgrade to the newest versions. Just like last week, your key tool will be your application inventory. It will look something like this…<span id="more-2306"></span></p>
<p>The application inventory shows how many machines have a specific program installed on them, such as:</p>
<p>Qty &#8211; Application<br />
18 &#8211; Adobe Flash Player version 11<br />
22 &#8211; Adobe Flash Player version 16<br />
79 &#8211; Adobe Flash Player version 20<br />
29 &#8211; Mozilla Firefox version 38.0.1<br />
99 &#8211; Mozilla Firefox version 44.0.2</p>
<p>Your list will be longer.</p>
<p>Notice that there are three versions of Adobe Flash Player and two versions of Firefox. </p>
<p>As you can imagine, more recent versions of software are generally the most secure. Most organizations such as Adobe and Mozilla recommend that you always use the most recent versions of their tools.</p>
<p>Using the most secure versions of applications is especially important for programs that interface directly to the Internet, such as Flash, Java, and your browsers. </p>
<p>Ask your IT Professionals to update, when possible, those kind of applications. Then, they can show you an updated application inventory report, one that shows the machines being all up-to-date. And, you’ll be able to sleep better at night.</p>
<p>Please forward this email message to everyone you care about…</p>
<p>The post <a href="https://fosterinstitute.com/security-version-2-0/">Security Version 2.0</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>No Flash Attacks After June 30</title>
		<link>https://fosterinstitute.com/no-flash-attacks-after-june-30/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 19 Feb 2016 13:00:18 +0000</pubDate>
				<category><![CDATA[Adobe Flash]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Adobe]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[flash content]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[organization security]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[website security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2259</guid>

					<description><![CDATA[<p>Starting June 30, 2016, Google will no longer accept advertisements that use Flash. What this means: Better security for you and your organization. You needn’t buy anything or change anything. It will all happen automatically. Flash is a tool used on web-sites to, among other things, play videos. When people visit websites, they can be [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/no-flash-attacks-after-june-30/">No Flash Attacks After June 30</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Starting June 30, 2016, Google will no longer accept advertisements that use Flash. What this means: Better security for you and your organization. You needn’t buy anything or change anything. It will all happen automatically.<span id="more-2259"></span></p>
<p>Flash is a tool used on web-sites to, among other things, play videos. </p>
<p>When people visit websites, they can be vulnerable to what is referred to as a drive by download. Just by visiting a site, even a legitimate site, their computer may be exposed to an attack. </p>
<p>That attack can happen via a Flash video within an advertisement that was surreptitiously posted by an attacker.</p>
<p>It is always a good idea to use “click to play” functionality that prevents Flash content from running automatically.</p>
<p>Now, when Google stops accepting advertisements with Flash content, that will significantly diminish the Flash vector of attack. </p>
<p>The post <a href="https://fosterinstitute.com/no-flash-attacks-after-june-30/">No Flash Attacks After June 30</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Know Before You Click</title>
		<link>https://fosterinstitute.com/know-before-you-click/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 07 Apr 2015 11:00:46 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Download]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[VirtusTotal.com]]></category>
		<category><![CDATA[Virus]]></category>
		<category><![CDATA[Click]]></category>
		<category><![CDATA[Clicking]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[download]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[Virus Total]]></category>
		<category><![CDATA[viruses]]></category>
		<category><![CDATA[Virustotal.com]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2081</guid>

					<description><![CDATA[<p>Before you click on a link, if you want input about whether or not the link takes you to a dangerous site, Google provides a tool that can help you know… Google’s VirusTotal.com is an online service that checks websites for viruses using 54 antivirus products. Before you click – check that website! FYI, the [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/know-before-you-click/">Know Before You Click</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Before you click on a link, if you want input about whether or not the link takes you to a dangerous site, Google provides a tool that can help you know…<span id="more-2081"></span></p>
<p>Google’s <a title="VirusTotal.com" href="https://www.virustotal.com/">VirusTotal.com</a> is an online service that checks websites for viruses using 54 antivirus products. Before you click – check that website!</p>
<p>FYI, the site also allows you to upload program files. The file is checked against all of the antivirus products too.</p>
<p>So, before you open a file, get a second opinion from Google by using <a href="https://www.virustotal.com/">Virus Total</a>. Forward this to everyone you care about, including your IT Pro – and they may want to send it to everyone in the organization!</p>
<p>The post <a href="https://fosterinstitute.com/know-before-you-click/">Know Before You Click</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
