<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cloud Security Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/cloud-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/cloud-security/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Thu, 05 Jun 2025 01:48:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Cloud Security Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/cloud-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Executives &#8211; Any User Can Accidentally Expose All Your Data Unless IT Changes This Default Setting</title>
		<link>https://fosterinstitute.com/executives-your-employees-might-be-one-click-away-from-exposing-all-sensitive-data-heres-how-to-stop-it/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 04 Jun 2025 21:08:04 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Microsoft Settings]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=6097</guid>

					<description><![CDATA[<p>Your employees might be one click away from exposing all sensitive data. Here&#8217;s how to stop it. We&#8217;re receiving calls from our cybersecurity customers when the IT Team discovers that ordinary users have given third-party applications access to all their organization&#8217;s files, email messages, calendar events, Teams chats and channels, and other data. How can [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/executives-your-employees-might-be-one-click-away-from-exposing-all-sensitive-data-heres-how-to-stop-it/">Executives &#8211; Any User Can Accidentally Expose All Your Data Unless IT Changes This Default Setting</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Your employees might be one click away from exposing all sensitive data. Here&#8217;s how to stop it.</p>
<p>We&#8217;re receiving calls from our cybersecurity customers when the IT Team discovers that ordinary users have given third-party applications access to all their organization&#8217;s files, email messages, calendar events, Teams chats and channels, and other data.</p>
<p>How can ordinary users have that much power?</p>
<p>By default.</p>
<p><strong>Situation:</strong> This configuration affects most companies. While the default settings for your Microsoft 365 system allow your users to approve third-party access, Microsoft recommends the following more restrictive settings to increase security.</p>
<p><strong>The Risk:</strong> Without this setting, workers may override protections without oversight and allow any application to access your company data, create and delete files in SharePoint and OneDrive, read and send email messages, edit calendar events, access and modify Teams chats and channels, update user profile information, and perform other tasks. While some applications might need this level of access, it must be granted only after the appropriate authorities, including your IT Team, thoroughly consider it.</p>
<p><strong>Reality Check:</strong> This setting catches many IT Teams by surprise. Microsoft is updating its security controls quickly, and it is nearly impossible for IT Teams to keep up with the changes. And when defaults promote ease-of-use over security, like this one, your systems can become at risk quickly without the team realizing it. Know that your IT Team&#8217;s level of expertise can be excellent, and situations like this sneak up on them anyway.</p>
<p><strong>Urgent Quick Verification:</strong> Your IT Team can quickly access the Microsoft Entra admin center &gt; Enterprise applications &gt; Consent and permissions &gt; User consent settings. There are three options:</p>
<ul>
<li>&#8220;Do not allow user consent.&#8221;</li>
<li>&#8220;Allow user consent for apps from verified publishers, for selected permissions.&#8221;</li>
<li>&#8220;Allow user consent for all apps&#8221; (the current risky default value)</li>
</ul>
<p><strong>Update If Necessary:</strong> Microsoft recommends you select “Allow user consent for apps from verified publishers, for selected permissions.” Different organizations have different data access needs. Your IT and compliance teams must determine the appropriate level for your situation. Smaller organizations might choose the first option if they don&#8217;t want users to expose data to third-party applications without checking with the IT team. Larger organizations with more complex needs often prefer the middle option with careful permission management to take some of the workload off busy IT professionals while providing protection.</p>
<p><strong>Next Step:</strong> Your Administrators will also need to specify which permissions are low-impact, as detailed in Microsoft&#8217;s article &#8220;Overview of user and admin consent.&#8221;</p>
<p><strong>Facilitate the Approval Process:</strong> Your team can optionally set up an admin consent workflow that users must follow when they want to provide permissions.</p>
<p>Forward this to your friends who are executives at other organizations so they can give their teams this heads-up, too.</p>
<p>The post <a href="https://fosterinstitute.com/executives-your-employees-might-be-one-click-away-from-exposing-all-sensitive-data-heres-how-to-stop-it/">Executives &#8211; Any User Can Accidentally Expose All Your Data Unless IT Changes This Default Setting</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI Scams in the Spotlight: Essential Tips to Protect You and Your Family</title>
		<link>https://fosterinstitute.com/ai-scams-in-the-spotlight-essential-tips-to-protect-you-and-your-family/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sat, 15 Jul 2023 15:20:44 +0000</pubDate>
				<category><![CDATA[ACH Fraud]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Family Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5537</guid>

					<description><![CDATA[<p>AI helps bad actors be more effective than ever. They create deep fake videos, AI-generated phone calls, and other scams, some of which have led to devastating consequences. Use these tips to protect yourself from AI-generated scams: Realize Even Photos Can Give an AI Attacker All they Need to Know: AI-based facial recognition enables bad [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/ai-scams-in-the-spotlight-essential-tips-to-protect-you-and-your-family/">AI Scams in the Spotlight: Essential Tips to Protect You and Your Family</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>AI helps bad actors be more effective than ever. They create deep fake videos, AI-generated phone calls, and other scams, some of which have led to devastating consequences. Use these tips to protect yourself from AI-generated scams:</p>
<p><strong>Realize Even Photos Can Give an AI Attacker All they Need to Know:</strong><br />
AI-based facial recognition enables bad actors to link you to locations, people, and your daily activities. Some photos you take with your phone contain exact location data. Protect yourself and inform your friends:<br />
-Adjust privacy settings on social media, making profiles private and sharing only with trusted connections.<br />
-Be cautious when posting photos that reveal sensitive details about you and your loved ones.<br />
-Disable geotagging on your smartphone&#8217;s camera app to prevent automatic location embedding.</p>
<p><strong>Verify the Identity of the Caller:</strong><br />
Attackers can change their Caller-ID to match whomever they’re impersonating. When receiving a suspicious call, verify the caller&#8217;s identity by asking a question that only they would know the answer to. Avoid questions that could be answered with information on social media or online. If you receive a call from a loved one in distress, hang up and call them back on a known number.</p>
<p><strong>Set a Code Word with Loved Ones:</strong><br />
Set a &#8216;code word&#8217; with your kids, family members, or trusted close friends that only you and they would know. They can use this code word to confirm their identity in a genuine emergency and contact you.</p>
<p><strong>Educate Yourself About Deepfakes:</strong><br />
Deepfakes are AI-generated videos or audio that can convincingly mimic real people. Familiarize yourself with the signs of a deepfake, such as suspiciously good voice recording quality, no discernible background noise, unnatural blinking patterns, poor lip-syncing, or anything that seems a little off. People can use AI to put your face on a scantily clad body doing embarrassing things. The deepfake videos look convincing, and the bad actors will threaten to share the pictures online or with your friends or family and demand money. Cyberbullying is real.</p>
<p><strong>Be Aware of Current AI Scams:</strong><br />
Common scams include a caller claiming they are from the IRS or that you have a warrant out for your arrest. The IRS provides an updated list of scams here: <a href="https://www.irs.gov/newsroom/tax-scams-consumer-alerts">https://www.irs.gov/newsroom/tax-scams-consumer-alerts</a>. One of the most prominent organizations in the UK that provides information and guidance on scams is the &#8220;Action Fraud&#8221; website: <a href="http://www.actionfraud.police.uk">www.actionfraud.police.uk</a></p>
<p><strong>Recognize AI Hallucinations:</strong><br />
Another red flag is inconsistency in the story or information provided. Like when using a chatbot, you sometimes identify responses sounding goofy. If you notice contradictions or a seemingly confused train of thought, that is a clue that AI might be generating the audio.</p>
<p><strong>Teach Your Youngsters:</strong><br />
Teach them that AI can allow attackers to figure out lots about them, and they should not share their real names, family members&#8217; names, city names, addresses, phone numbers, school names, or birthday information. They must assume that every person they chat with or meet in games may not be who they claim to be, even if they sound like friends from school, due to knowing accurate details. You don’t want to terrify your young people to the point that they cannot sleep, so you might choose to limit the number of and how frequently you share horror stories.</p>
<p><strong>Use Verified Communication Channels:</strong><br />
Whenever possible, use verified communication channels, especially for sensitive conversations. For example, use your bank&#8217;s official app for financial transactions instead of a link sent via email. Use encrypted email to communicate sensitive information.</p>
<p><strong>Keep Your Cool:</strong><br />
Scammers often impersonate trusted individuals or organizations in some crisis or drama to trigger your brain into fight or flight mode. Attackers try to freak you out so you make poor choices. Beware of urgent, unexpected, or out-of-character phone calls.</p>
<p>Please forward this to your friends and coworkers so they know these top strategies to protect themselves from falling victim to AI-generated scams.</p>
<p>Subscribe to maximize your executive potential with Foster Institute&#8217;s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>The post <a href="https://fosterinstitute.com/ai-scams-in-the-spotlight-essential-tips-to-protect-you-and-your-family/">AI Scams in the Spotlight: Essential Tips to Protect You and Your Family</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Rise of Passkeys: A Paradigm Shift in Authentication Technology</title>
		<link>https://fosterinstitute.com/the-rise-of-passkeys-a-paradigm-shift-in-authentication-technology/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 15 May 2023 16:17:51 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Password Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5466</guid>

					<description><![CDATA[<p>Be sure you, and your IT team, know about passkeys. Passkeys are the future, and the future is arriving now. Passkey authentication can be configured to be very secure based on four conditions: You must have your mobile device with you. (An attacker is unlikely to have the device with them.) You must be able [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/the-rise-of-passkeys-a-paradigm-shift-in-authentication-technology/">The Rise of Passkeys: A Paradigm Shift in Authentication Technology</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Be sure you, and your IT team, know about passkeys. Passkeys are the future, and the future is arriving now.</p>
<p>Passkey authentication can be configured to be very secure based on four conditions:</p>
<ol>
<li>You must have your mobile device with you. (An attacker is unlikely to have the device with them.)</li>
<li>You must be able to log in to your mobile device using facial recognition, a fingerprint, PIN, pattern, USB token, etc. Some people call passkeys a &#8220;Face&#8221; or &#8220;Fingerprint&#8221; sign-in.</li>
<li>Your device must have a unique key assigned to you that ties to a unique key at the site or application.</li>
<li>If you log into a site or application from a computer, the mobile device must be physically close to the computer where you&#8217;re logging in.</li>
</ol>
<p>Passkeys are new, and there is varying support for specific browsers, operating systems, and devices.</p>
<h2>Tips for Using Passkeys:</h2>
<ol>
<li>Start setting passkeys up on your mobile device, such as a smartphone, before you use your computer.</li>
<li>If the website or application does not allow you to set up a passkey on your computer:
<ul>
<li>Look for and select an option on the computer that says, &#8220;Use a passkey to log in,&#8221; Your computer will display a QR code image.</li>
<li>Use your phone&#8217;s camera to scan the QR code image displayed on your computer.</li>
<li>After scanning the QR code, your phone completes the passkey login process.</li>
</ul>
</li>
<li>It&#8217;s essential to confirm that passkeys work on all devices and browsers before disabling the old login method for each website or application. This way, you can avoid problems accessing your account if the passkey login method doesn&#8217;t work on some of your devices or browsers.</li>
</ol>
<p>As the adoption is just starting, you might discover limitations or frustrations, but they&#8217;ll disappear soon. Some people have great luck experimenting with setting up their first passkey at best buy dot com even if they don&#8217;t shop there.</p>
<p>Apple uses the Apple Keychain to store a passkey that should work on all your Apple devices after enrolling one. Google uses the Google Password Manager in the Chrome browser and Android. Microsoft uses Microsoft Hello. Some password managers store keys.</p>
<p>Mobile device backups and some password managers are designed to back up the passkeys in case you lose your phone. If you do lose your phone, it is a good idea to go to the apps and sites to set up a new key and disable your old key. One concern is that, if an attacker can access your backups or the passkey manager and obtain a key from there, they might find a way to bypass passkey protection. But that doesn&#8217;t necessarily make passkeys less secure than other authentication methods; they may well be the best protection available when implemented properly since they offer so many benefits:</p>
<ol>
<li>Users cannot be tricked into giving away passkey values they do not know in social engineering and phishing attacks.</li>
<li>Since passkeys come in unique pairs, users cannot re-use passwords, another user mistake that leads to compromised passwords.</li>
<li>Keyloggers cannot capture passwords since users are not typing passwords.</li>
</ol>
<p>Your IT team might choose to eliminate your existing Multi-Factor authentication process since using passkeys involves multiple factors already. Unlike SMS text messages, passkeys cannot be redirected to attackers. Passkeys are immune to MFA Fatigue addressed here <a href="https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/">https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/</a></p>
<p>Please forward this to your friends so they can explore eliminating passwords and eventually start adopting passkeys as Passkey support expands.</p>
<p>Prepare yourself for what would happen if an attacker steals a phone containing passkeys: <a href="https://fosterinstitute.com/the-risk-iphone-theft-poses-to-your-passkeys-and-what-to-do-now/" target="_blank" rel="noopener">https://fosterinstitute.com/the-risk-iphone-theft-poses-to-your-passkeys-and-what-to-do-now/</a></p>
<h2>Technical Details &#8211; If You are Interested</h2>
<p>You do not need to know this to use passkeys. But if you wonder how these keys can be so secure, read on.</p>
<p>Passkeys are much more secure because passkeys come in key pairs. When you use one key of the pair to lock something, you must use the paired key to unlock it. Only the paired key can unlock what the first key locked.</p>
<p>So for each site or application you set up to use a passkey, your mobile device generates a pair of keys:<br />
&#8211; A unique private key for that site or application is stored on your device.<br />
&#8211; A paired key that your device sends to the site or application which stores the key just for you.</p>
<p>If you have a passkey set up for 100 sites or applications, your device will store 100 keys. Sites that have 100 million users will have 100 million keys. Each key is half of a pair. The private key must be kept secret on your device to be secure. Even if attackers access all the keys for a site or application, your account is still protected since they won&#8217;t have the second key stored solely on your device.</p>
<p>If you want to get more technical and understand why passkeys are so resistant to person-in-the-middle attacks: Websites that start with https:// and most web applications use PKI encryption to protect data during transit. SSL (deprecated) and TLS (use the newest version) protocols use public-private key pairs to initiate a multi-step process to secure traffic to websites or web applications. Attackers can use person-in-the-middle attacks to defeat that encryption. They generate key pairs to make the user&#8217;s connection think the attacker is the website and make the website believe the attacker is the user&#8217;s connection. Bad actors insert themselves between the user and the website and can access the data as it goes through their connection.</p>
<p>When a user creates a passkey, the user’s device generates a key pair. It stores one key locally on the device and sends the other to the site or application for passkey authentication. The site or web application stores a unique key for each passkey a user generates. The secret key never leaves the user&#8217;s device during the authentication process, and the unique paired key is stored at the website or application. Hence, passkeys are extremely resistant to person-in-the-middle attacks.</p>
<p>Where supported, consider using passkeys. Hopefully they&#8217;ll be the common standard soon.</p>
<p>Subscribe to maximize your executive potential with Foster Institute&#8217;s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/the-rise-of-passkeys-a-paradigm-shift-in-authentication-technology/">The Rise of Passkeys: A Paradigm Shift in Authentication Technology</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ditch Passwords for Good: The Ultimate Guide to Passkeys and Passwordless Authentication</title>
		<link>https://fosterinstitute.com/ditch-passwords-for-good-the-ultimate-guide-to-passkeys-and-passwordless-authentication/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 04 May 2023 20:06:50 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Password Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5450</guid>

					<description><![CDATA[<p>Why to Go Passwordless: When you eliminate passwords: &#8211; You don&#8217;t need to worry about creating, forgetting, or re-using passwords because you don&#8217;t use passwords. &#8211; IT Helpdesk Professionals save time since they don&#8217;t have to help users who forget their passwords. &#8211; Hackers will not try to trick users into disclosing passwords because the [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/ditch-passwords-for-good-the-ultimate-guide-to-passkeys-and-passwordless-authentication/">Ditch Passwords for Good: The Ultimate Guide to Passkeys and Passwordless Authentication</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Why to Go Passwordless:</h2>
<p>When you eliminate passwords:<br />
&#8211; You don&#8217;t need to worry about creating, forgetting, or re-using passwords because you don&#8217;t use passwords.<br />
&#8211; IT Helpdesk Professionals save time since they don&#8217;t have to help users who forget their passwords.<br />
&#8211; Hackers will not try to trick users into disclosing passwords because the user won&#8217;t know passwords.</p>
<p>Microsoft, and others, continue to make their big push for people to go passwordless.</p>
<h2>Alternatives to Passwords:</h2>
<p>Today, determine where and how you can eliminate passwords from your life. Focus on using:</p>
<p>Something you have:<br />
&#8211; A USB Token such as a YubiKey<br />
&#8211; A proximity badge you wear around your neck or carry in your pocket<br />
&#8211; An authenticator app on your smartphone or tablet<br />
&#8211; A text message, phone call, or email with a one-time code</p>
<p>Or, something you are:<br />
&#8211; A fingerprint scan<br />
&#8211; Facial recognition<br />
&#8211; Eye recognition</p>
<p>And the real magic is when you combine two for multi-factor authentication (MFA) without passwords.</p>
<p>Note that USB tokens can include fingerprint scanners for built-in MFA. Your IT Team might need to get creative using mobile phone technology to accomplish both. If you decide to use push notifications, be sure to refer to <a href="https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/">https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/</a></p>
<p>There are few ways attackers can exploit some of these login methods, and your IT Team can help you shore up weaknesses. Visit with your IT Team about ways you can eliminate passwords. Be sure they&#8217;ve seen this post: <a href="https://fosterinstitute.com/the-risk-iphone-theft-poses-to-your-passkeys-and-what-to-do-now/" target="_blank" rel="noopener">https://fosterinstitute.com/the-risk-iphone-theft-poses-to-your-passkeys-and-what-to-do-now/</a></p>
<h2>Know About Passkeys:</h2>
<p>Be sure you, and your IT team, know about passkeys. Passkeys are the future, and the future is arriving now: <a href="https://fosterinstitute.com/the-rise-of-passkeys-a-paradigm-shift-in-authentication-technology/">https://fosterinstitute.com/the-rise-of-passkeys-a-paradigm-shift-in-authentication-technology/</a></p>
<p>Subscribe to maximize your executive potential with Foster Institute&#8217;s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/ditch-passwords-for-good-the-ultimate-guide-to-passkeys-and-passwordless-authentication/">Ditch Passwords for Good: The Ultimate Guide to Passkeys and Passwordless Authentication</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Concerns and Fun with ChatGPT</title>
		<link>https://fosterinstitute.com/cybersecurity-concerns-and-fun-with-chatgpt/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 25 Jan 2023 23:13:06 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5368</guid>

					<description><![CDATA[<p>If you’ve not tried Open AI ChatGPT yet, you must. It has changed the world forever and the sooner you try it, the better. You can go to the web address: chat.openai.com/chat. Read the privacy warnings and, if you agree, sign up. When you start having conversations, prepare to be amazed. Most people I encounter [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/cybersecurity-concerns-and-fun-with-chatgpt/">Cybersecurity Concerns and Fun with ChatGPT</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you’ve not tried Open AI ChatGPT yet, you must. It has changed the world forever and the sooner you try it, the better. You can go to the web address: <a href="http://chat.openai.com/chat" target="_blank" rel="noopener">chat.openai.com/chat</a>. Read the privacy warnings and, if you agree, sign up. When you start having conversations, prepare to be amazed.</p>
<p>Most people I encounter talk about their fun with ChatGPT, and I can relate. Type “Write a Valentine’s day note to my lover who likes (activities). I’m attracted to their (attractions) and want them to know (details).” Keep adding details. And, of course, you can say, “Make it rhyme” or “write it like Shakespeare.” You’ll have a smile on your face.</p>
<p>Be sure to select “New chat” whenever you change topics. After you get a surprisingly fun Valentine’s message, open a new chat to ask, “Remind me of the Excel formula to return the first twenty characters of a string.” ChatGPT remembers conversations in chat segments, so avoid mixing topics to get the best results.</p>
<p>AI has given a new meaning to the term Virtual Assistant. Sometimes I compose long email messages and want to shorten them. I first compose the message with no sensitive information, give it to ChatGPT, and say, “Write this shorter.” It is stunning how capable it is at combining sentences and summarizing ideas while mostly keeping the whole meaning. Sometimes it elaborates and incorporates new ideas into the message. I find that amusing and occasionally helpful. I must re-read the output carefully and often make changes since ChatGPT is not perfect at knowing precisely what I mean, but for long messages, it sometimes helps me make them concise, saving the recipient time.</p>
<p>Do not be duped – AI does not know everything and can accidentally produce inaccurate information that sounds very convincing.</p>
<p>When I hear people discussing the risks of ChatGPT, they usually focus on students using it to write their essay assignments for them. They have not considered more severe concerns. If you are interested, search the web for: chatbot ai can be used to create ransomware video.</p>
<p>Fortunately, ChatGPT is implementing safeguards to help prevent malicious use, and there are ways to trick it. Values and ethics vary from person to person, and some people, or governments, might feel justified in using AI to help create weapons, influence elections, or help them with strategies to harm.</p>
<p>Before his death, the famous physicist Stephen Hawking warned that AI could “end mankind.” Elon Musk has donated millions of dollars to OpenAI but intensely voiced concerns about the dangers of AI.</p>
<p>Some of our clients now block access to ChatGPT on company networks and devices. Some won’t.</p>
<p>Please forward this to your friends so they will consider the risks and enjoy AI-related fun. ChatGPT is impressive, and the business world will never be the same.</p>
<p>The post <a href="https://fosterinstitute.com/cybersecurity-concerns-and-fun-with-chatgpt/">Cybersecurity Concerns and Fun with ChatGPT</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Short List of Essential Cybersecurity Statistics Exposes Attackers and Can Help You Secure Your Systems</title>
		<link>https://fosterinstitute.com/short-list-of-essential-cybersecurity-statistics-exposes-attackers-and-can-help-you-secure-your-systems/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 10 Jan 2023 16:52:41 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Supporting IT Professionals]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5361</guid>

					<description><![CDATA[<p>Verizon&#8217;s 2022 Data Breach Investigation Report reveals some interesting information from extensive worldwide research. In North America, System Intrusion (Now up to 80%) attacks surpass Social Engineering (down to 20%). System Intrusion is when attackers gain access to networks, plant ransomware, establish remote access, and otherwise compromise data and processes in a network. 90% of [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/short-list-of-essential-cybersecurity-statistics-exposes-attackers-and-can-help-you-secure-your-systems/">Short List of Essential Cybersecurity Statistics Exposes Attackers and Can Help You Secure Your Systems</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Verizon&#8217;s 2022 Data Breach Investigation Report reveals some interesting information from extensive worldwide research.</p>
<p>In North America, System Intrusion (Now up to 80%) attacks surpass Social Engineering (down to 20%). System Intrusion is when attackers gain access to networks, plant ransomware, establish remote access, and otherwise compromise data and processes in a network.</p>
<p>90% of system intrusion attacks in North America were performed by threat actors external to the company. But the 10% of internal attacks highlights the concern of insider threats. Insider threat is when someone working for an organization accidentally or intentionally gives attackers access.</p>
<p>In North America, the motivation for attacks are:<br />
For financial gain: 96%<br />
Espionage and spying: 3%<br />
Grudges and anger: 1%</p>
<p>Of attacks in North America, 14% were caused Primarily by Cloud Security Misconfigurations, highlighting the need to ensure IT professionals are familiar with the complex security settings related to cloud services. An excellent resource for Microsoft Cloud Security is <a href="https://learn.microsoft.com/en-us/microsoft-365/solutions/setup-secure-collaboration-with-teams?view=o365-worldwide#securing-teams-for-sensitive-and-highly-sensitive-data" target="_blank" rel="noopener">https://learn.microsoft.com/en-us/microsoft-365/solutions/setup-secure-collaboration-with-teams?view=o365-worldwide#securing-teams-for-sensitive-and-highly-sensitive-data</a></p>
<p>To see statistics in other parts of the world and overall, you can find the report at <a href="https://www.verizon.com/business/resources/reports/dbir/" target="_blank" rel="noopener">https://www.verizon.com/business/resources/reports/dbir/</a></p>
<p>The post <a href="https://fosterinstitute.com/short-list-of-essential-cybersecurity-statistics-exposes-attackers-and-can-help-you-secure-your-systems/">Short List of Essential Cybersecurity Statistics Exposes Attackers and Can Help You Secure Your Systems</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Attackers Break Your Multi-Factor Authentication Protection and 7 Strategies to Protect Yourself</title>
		<link>https://fosterinstitute.com/how-attackers-break-your-multi-factor-authentication-protection-and-7-strategies-to-protect-yourself/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 16 Nov 2022 22:36:53 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Password Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5351</guid>

					<description><![CDATA[<p>One of the best ways to thwart bad actors from logging in is to enable Multi-Factor Authentication (MFA), a.k.a. Two-Step Login. But attackers are bypassing that protection. If you know what MFA is, you can skip this paragraph. The most common first step of MFA is for users to enter their username and password. They [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/how-attackers-break-your-multi-factor-authentication-protection-and-7-strategies-to-protect-yourself/">How Attackers Break Your Multi-Factor Authentication Protection and 7 Strategies to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>One of the best ways to thwart bad actors from logging in is to enable Multi-Factor Authentication (MFA), a.k.a. Two-Step Login. But attackers are bypassing that protection.</p>
<p>If you know what MFA is, you can skip this paragraph. The most common first step of MFA is for users to enter their username and password. They receive a text message with a code to complete the login process. Alternatively, the user might have an authenticator app on their phone that provides a code. Another option is for the user to receive a “push” notification asking the user to approve the login through the app. The latter is sometimes referred to as one-tap login. There are other options for the factors, including approving specific computers, geo-location, USB hardware keys, and biometrics, including fingerprints, facial recognition, and iris scans. There are pros and cons to each.</p>
<p>Summarized steps you can take to help protect yourself from attackers bypassing multi-factor authentication:</p>
<p>= Know how to protect yourself against a thief stealing a phone if MFA uses text or email messages as the second step.<br />
= If supported, instead of a code number from a text message or authenticator app, consider using a USB token, fingerprint, or facial recognition for the second factor.<br />
= Reduce the duration a code is valid. For example, perhaps change the code every 60 seconds so an older code won’t work.<br />
= Limit the number of failed login attempts in a specific period.<br />
= Implement web content filtering to help protect users from being exposed to fake login screens.<br />
= Limit logins to specific countries.<br />
= If users primarily use the same device, restrict logins to specific devices.<br />
= Train users to beware of fraudulent login prompts.</p>
<p>Please see the details below:</p>
<p>If MFA to sends a text message to a stolen phone, the thief might see the text message. For websites or services that only support text messages for the second step, consider investing in an inexpensive flip phone with a different phone number to receive text messages. Similarly, if MFA involves an email, and the thief can easily access your email on the stolen phone, it defeats the purpose of MFA. Therefore, if you set up the two-step login with email as the second step, use an email address that requires some other form of authentication on the phone to access email messages. Ensure email messages do not pop up on the preview screen when received.</p>
<p>Another way attackers bypass MFA:<br />
Step 1: Trick the user into clicking a link that takes the user to a fake login screen for Microsoft 365, LinkedIn, or any other valuable site.<br />
Step 2: The user enters their username and password into the fake login form. Now the attacker knows the user’s login name and password.<br />
Step 3: The attacker’s computer pulls up the genuine login form and enters the username and password the victim just provided.<br />
Step 4: The legitimate website sends the user the text message, sends a push notification, or performs another second factor the user is used to. The user expects this, and the process seems normal to them.<br />
Step 5: The attacker can create a fake form for the user to enter the code from their text message or app. When the victim enters the data, the attacker’s computer inserts the data into the genuine website. If the user received a push notification, they could approve the login because the user believes they are indeed logging into the site.<br />
Step 6: The attacker is logged in and has the user’s full access. The attacker needed no previous knowledge of the user’s username, password, or text key.</p>
<p>One strategy to fight his kind of attack is to use a second factor that isn’t a text code. For example, a user doesn’t need to enter a code if the second factor is a fingerprint or USB token plugged into the computer. The user cannot enter that information into a fraudulent login screen.</p>
<p>Another common strategy attackers use to bypass MFA is to reduce the time an OTP (One Time Password) code can work without the user requesting and receiving a new text message or generating a new code in the authenticator app. Shorter expiration times mean the attackers must use the stolen credentials and second factor to log in more quickly.</p>
<p>Another strategy, though slightly less effective but can be used in conjunction, is to limit the number of failed login attempts within a period. An example rule is if there is a failed login attempt for a user account three times in a row within five minutes, lock their account so they cannot try logging in again for ten minutes.</p>
<p>A useful cybersecurity control that is underutilized is conditional access by country. If your users will always log in from specific countries, block logins from all other countries. That will make it more difficult for foreign adversaries to compromise your users’ accounts. Identifying a user’s location is sometimes referred to as geolocation.</p>
<p>Another method to bypass MFA is to use social engineering to trick the user into disclosing their username, password, and code or another second factor. A typical example is for a bad actor to contact a user, impersonate a technical support person, and ask the user to provide the information to help prevent some fake problem that doesn’t exist. Some trusting users walk the attacker through the login process, bypassing the protection of MFA.</p>
<p>Another strategy bad actors use is called MFA fatigue. The hacker will make so many attempts to log on that the user finally tires of receiving push notification alerts. The fatigued user approves the login to make their phone be quiet, and the attacker is in the system.</p>
<p>Attackers could use SIM Swapping to reroute calls and text messages to their phones. Therefore, text and callbacks can be less secure than other second factors. However, many sites only offer those two options.</p>
<p>As your IT team can tell you, there are more technical ways for attackers to bypass MFA by creating person-in-the-middle attacks using something called a proxy. Another strategy attackers can utilize is captured authentication cookies or tokens. Authentication can rely on digital key values that must be kept secret inside servers. If attackers get access to the keys, they can gain access.</p>
<p>Your IT Team can implement some form of web content filtering and configure it to block communications with known malicious sites and attacker command-and-control servers. This isn’t perfect because attackers frequently change command servers, but it helps.</p>
<p>Using SSO (Single Sign On) reduces the number of opportunities an attacker has to trick the user. Of course, the flip side is that if an attacker successfully gains access to the single sign-on, the attacker won’t need any other credentials to access everything the user can access.</p>
<p>User training is essential, as is keeping the computer safe.</p>
<p>As you can see, using MFA does not mean your authentication process is secure. Whenever a new security control is invented, someone finds a way to break it. The strategies above will help you be more secure.</p>
<p>Alert your friends to some of the ways attackers can bypass MFA. They might decide to consider using USB keys, biometrics, or cryptographic codes stored in a computer or hardware.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/how-attackers-break-your-multi-factor-authentication-protection-and-7-strategies-to-protect-yourself/">How Attackers Break Your Multi-Factor Authentication Protection and 7 Strategies to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Avoid Receiving Disturbing Photos via Apple AirDrop and Android Nearby</title>
		<link>https://fosterinstitute.com/how-to-avoid-receiving-disturbing-photos-via-apple-airdrop-and-android-near/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 26 Sep 2022 17:59:05 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Wireless Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5334</guid>

					<description><![CDATA[<p>You’ve likely seen the video or at least heard the story of how a Southwest Airlines pilot responded to complaints from passengers that they received images of an unclothed person on their phone. The captain used the intercom system to scold the unknown passenger and threatened to return to the gate. This so-called cyber-flashing is [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/how-to-avoid-receiving-disturbing-photos-via-apple-airdrop-and-android-near/">How to Avoid Receiving Disturbing Photos via Apple AirDrop and Android Nearby</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You’ve likely seen the video or at least heard the story of how a Southwest Airlines pilot responded to complaints from passengers that they received images of an unclothed person on their phone. The captain used the intercom system to scold the unknown passenger and threatened to return to the gate.</p>
<p>This so-called cyber-flashing is a growing problem with Apple’s AirDrop feature and Android’s Nearby Share feature that allow you to send and receive images, videos, and files from other users nearby.</p>
<p>Yes, you get prompted to decline or accept the image, but you cannot unsee the preview image in the prompt.</p>
<p>To protect yourself on your Apple device, Click on Settings, General, and AirDrop to choose Receiving Off, Contacts Only, or Everyone. I recommend you select Receiving Off. Temporarily enable receiving when you wish to exchange photos. Apple provides a detailed explanation of AirDrop at <a href="https://support.apple.com/en-us/HT204144" target="_blank" rel="noopener">https://support.apple.com/en-us/HT204144</a></p>
<p>To protect yourself on an Android device, choose Hidden your Nearby Share settings. The steps will differ depending on your device and version: Settings, Connected Devices, Connection preferences, Nearby Share, and choose Hidden. Or your device might have you go to Settings, Google, Devices &amp; Sharing, Nearby Share, and set Use Nearby Share to Off. You can learn more about Nearby Share at <a href="https://support.google.com/android/answer/9286773?hl=en" target="_blank" rel="noopener">https://support.google.com/android/answer/9286773?hl=en</a></p>
<p>Bad actors strive to find ways to affect users of any brand and type of device and service. Please forward this to your friends, so they don’t receive shocking images via AirDrop or Nearby Share!</p>
<p>The post <a href="https://fosterinstitute.com/how-to-avoid-receiving-disturbing-photos-via-apple-airdrop-and-android-near/">How to Avoid Receiving Disturbing Photos via Apple AirDrop and Android Nearby</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Reasons to Keep Your Same Outsourced Computer Consultant or Managed Service Provider</title>
		<link>https://fosterinstitute.com/reasons-to-keep-your-same-outsourced-computer-consultant-or-managed-service-provider/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 22:57:37 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Supporting IT Professionals]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5319</guid>

					<description><![CDATA[<p>Our role is to be security advisors to organizations, some of whom outsource their IT services. Executives sometimes express their frustration and ask us whether to fire a Managed Service Provider or third-party IT consulting company that handles all aspects of their IT needs. We always listen to the executive and ask them about specific [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/reasons-to-keep-your-same-outsourced-computer-consultant-or-managed-service-provider/">Reasons to Keep Your Same Outsourced Computer Consultant or Managed Service Provider</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Our role is to be security advisors to organizations, some of whom outsource their IT services. Executives sometimes express their frustration and ask us whether to fire a Managed Service Provider or third-party IT consulting company that handles all aspects of their IT needs. We always listen to the executive and ask them about specific experiences. 99% of the time, organizations are better off sticking with their existing provider, and here are some reasons.</p>
<p>An exception will be if you feel held hostage by them, or if there is some other outstanding reason they’ve failed you. Yes, we&#8217;ve seen horror stories. In those extreme cases, the executives had already decided to fire their outsourced firm.</p>
<p>When we perform cybersecurity consulting, unless the executives ask us to approach it differently, we give the outsourced firm the benefit of the doubt that their intentions are always to provide you with the best service possible. If we encounter a grave security mistake, that&#8217;s one purpose of the audit – for us to catch things like that so your IT providers can fix it. We almost always find at least one gaping hole, which is our specialty. After all, third-party IT companies are responsible for many aspects of your IT operations, while our focus is cybersecurity. Once outsourced IT firms realize we&#8217;re there to help and not replace them or their services, they relax, welcome input, and ask questions about the best way to protect you.</p>
<p>If you move to a new provider, there could be a steep learning curve before they can serve you at the same level. Keep in mind that your IT provider is already familiar with your systems and understands the unique challenges you face. Unless their turnover is high, the professionals that serve you know your team members and maintain a friendly, professional working relationship with them.</p>
<p>If you consider changing providers because some well-meaning person says you have the wrong brands of products, find out if their personal bias is evidence-based. If the specific solution your provider prefers meets all the functionality criteria, it is almost always best to allow your IT Professionals to select brands and vendors they like. They typically prefer particular brands and solutions for important reasons.</p>
<p>For example, their engineers might be most familiar with Cisco, Juniper, SonicWALL, WatchGuard, or one of the many other firewall brands. Most brands, if configured properly, will serve you well. As with automobile repairs, you want a technician familiar with your car&#8217;s brand. If you ask your outsourced IT company to support an unfamiliar product, you&#8217;re putting them in an uncomfortable position. They want to consistently produce excellent outcomes for you, and if you insist that they support a brand they are unfamiliar with, you could be setting them up for failure.</p>
<p>Your outsourced IT firm almost certainly has you set up with specific vendors for your anti-virus, anti-spam, backup solution, etc., because they have automated tools that allow them to monitor and manage your solutions. That efficiency of scale facilitates them taking optimum care of you. Deviating from their standard brands creates unnecessary expense and frustration. For this reason, if you do decide to change providers, prepare yourself for needing to replace some of your software and hardware to conform to the new IT provider&#8217;s preferred configuration.</p>
<p>If your provider is too slow to respond, perhaps they&#8217;re understaffed but have an expedited service option you could invest in to get priority access to their best engineers. Or maybe they have a different brand or product solution that permits them to use streamlined tools, but you&#8217;re still using products a previous IT firm installed.</p>
<p>Without knowing the brands you are using, I cannot say if you&#8217;ve got great ones. I can share that most brands have excellent products and solutions that work well when appropriately configured by knowledgeable professionals who&#8217;ve proven their proficiency by earning certifications on those brands.</p>
<p>Executives sometimes ask if they should seek a cheaper provider. We rarely see third-party IT companies overcharging for services. They are aware of the competitive nature of their business. Consider how much it would cost you if all your systems were down, and the investment you pay your IT support firm is probably worth it.</p>
<p>Yes, your IT provider might be priced higher, but consider their level of professionalism too. Are they quick to reply when you need them? Do they fix issues the first time?</p>
<p>It can be an excellent sign if you feel you don&#8217;t need your provider because you never have any problems. That can indicate that your IT firm is taking such good care of the inner workings of your systems that everything runs smoothly for you. If you did terminate your IT provider, things could start falling apart slowly, without being observable, until everything stacks up to the point when you suffer a disaster.</p>
<p>If you wonder if they are competent, consider asking them for a list of certifications they&#8217;ve earned from Microsoft, Cisco, or the brands and technologies they provide and support for you. If they&#8217;re not certified, encourage them to take the training and pass the tests. Certifications often involve significant expense and time, so don&#8217;t expect them to earn the credentials overnight. Passing the certificate will be a breeze if they&#8217;re already knowledgeable about the products they support. And during the training, they might find new ways to help your organization without you needing to buy more stuff. Everyone benefits.</p>
<p>Your firm may not have top-level cybersecurity certifications. Cybersecurity is a complicated and rapidly evolving field that requires intense specialization. We never have expectations that third-party computer services companies know everything there is to know about cybersecurity. We expect them to be open to cybersecurity recommendations. We&#8217;re thrilled to discuss and answer their questions as they tune the solutions from brands they sell and support.</p>
<p>As cybersecurity advisors, it is rewarding to see and facilitate, if necessary, our customers strengthening their relationship with their MSPs and other third-party IT firms. Sometimes it is a matter of us helping you identify the pros and cons of the add-on cybersecurity packages your provider offers. Or, if their package isn&#8217;t the perfect fit, sometimes you can negotiate the offerings to get the best solution.</p>
<p>Please forward this to your friends if they wonder if they should change to a new outsourced IT consulting firm. As long as they&#8217;re well-staffed, competent, and professional, there are many advantages to staying with the company with whom they have an established working relationship.</p>
<p>The post <a href="https://fosterinstitute.com/reasons-to-keep-your-same-outsourced-computer-consultant-or-managed-service-provider/">Reasons to Keep Your Same Outsourced Computer Consultant or Managed Service Provider</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Next Time You&#8217;re Bored or Waiting, Delete Some Unused Apps from your Android or iPhone</title>
		<link>https://fosterinstitute.com/the-next-time-youre-bored-or-waiting-delete-some-unused-apps-from-your-android-or-iphone/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 16 Jun 2022 23:05:21 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5265</guid>

					<description><![CDATA[<p>You see the headlines: &#8220;App discovered to be spying on you,&#8221; or &#8220;App removed from the store because it was downloading private information.&#8221; Delete your third-party apps. You can always reinstall them if you decide to use them. Your phone and tablet are more secure the fewer apps you have. Most people only use 20% [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/the-next-time-youre-bored-or-waiting-delete-some-unused-apps-from-your-android-or-iphone/">The Next Time You&#8217;re Bored or Waiting, Delete Some Unused Apps from your Android or iPhone</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You see the headlines: &#8220;App discovered to be spying on you,&#8221; or &#8220;App removed from the store because it was downloading private information.&#8221;</p>
<p>Delete your third-party apps. You can always reinstall them if you decide to use them. Your phone and tablet are more secure the fewer apps you have. Most people only use 20% of their apps.</p>
<p>On an iPhone, press on the app&#8217;s icon and hold your finger down. Follow the prompts to remove and delete the app.</p>
<p>In Android, there are a few ways to delete apps as described in this article: <a href="https://www.lifewire.com/delete-apps-on-android-phone-5271421" target="_blank" rel="noopener">https://www.lifewire.com/delete-apps-on-android-phone-5271421</a></p>
<p>Please forward this to your friends, so they know to delete old applications too. If they’re waiting for something anyway, it will make the time pass quicker, and they&#8217;ll be more secure.</p>
<p>The post <a href="https://fosterinstitute.com/the-next-time-youre-bored-or-waiting-delete-some-unused-apps-from-your-android-or-iphone/">The Next Time You&#8217;re Bored or Waiting, Delete Some Unused Apps from your Android or iPhone</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
