<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Security Training Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/cyber-security-training/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/cyber-security-training/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Fri, 11 Sep 2020 16:37:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Cyber Security Training Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/cyber-security-training/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Your Work From Home Users are Like a Box of Chocolates</title>
		<link>https://fosterinstitute.com/your-work-from-home-users-are-like-a-box-of-chocolates/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 11 Sep 2020 16:37:51 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Remote Worker Security]]></category>
		<category><![CDATA[Remote Workers]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3293</guid>

					<description><![CDATA[<p>Because of so many work from home users, the Internet is like a box of chocolates for attackers. Step 1: Attackers compromise work-from-home users. Step 2: They gain access to their company. Step 3: They bite into the company to discover what&#8217;s inside. There are so many work from home users; this is a target-rich [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/your-work-from-home-users-are-like-a-box-of-chocolates/">Your Work From Home Users are Like a Box of Chocolates</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Because of so many work from home users, the Internet is like a box of chocolates for attackers.<span id="more-3293"></span></p>
<p>Step 1: Attackers compromise work-from-home users.<br />
Step 2: They gain access to their company.<br />
Step 3: They bite into the company to discover what&#8217;s inside.</p>
<p>There are so many work from home users; this is a target-rich environment.</p>
<p>1. You must harden remote users&#8217; systems against attacks. Secure their connections.<br />
2. When possible, issue laptops, so your IT team has more control over your remote users&#8217; security.<br />
3. Implement user training and phish testing. Please say if you&#8217;d like us to provide phish testing and online training for your users. We do all the work so your IT teams can focus on their other tasks.</p>
<p>Please forward this to your friends so they realize their remote users must be more secure than ever, and attackers target them indiscriminately.</p>
<p>The post <a href="https://fosterinstitute.com/your-work-from-home-users-are-like-a-box-of-chocolates/">Your Work From Home Users are Like a Box of Chocolates</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Power Down to Boost Security</title>
		<link>https://fosterinstitute.com/power-down-to-boost-security/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 05 Jun 2020 20:35:40 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3220</guid>

					<description><![CDATA[<p>One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don&#8217;t want to power it down, at least disconnect from your network. You&#8217;ll make your computer less attractive to attackers, and it limits the window during which they can attack. You have [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/power-down-to-boost-security/">Power Down to Boost Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div><span>One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don&#8217;t want to power it down, at least disconnect from your network.</span></div>
<p><span id="more-3220"></span></p>
<p>You&#8217;ll make your computer less attractive to attackers, and it limits the window during which they can attack. You have nothing to lose, and you might even reduce your power bill!</p>
<p>Please forward this to all of your friends, so they know this simple step to protect themselves.</p>
<p>The post <a href="https://fosterinstitute.com/power-down-to-boost-security/">Power Down to Boost Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zoom Security Issues &#8211; Protect Yourself</title>
		<link>https://fosterinstitute.com/zoom-security-issues-protect-yourself/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 07 Apr 2020 23:03:01 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Video Meeting Security]]></category>
		<category><![CDATA[Zoom]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3081</guid>

					<description><![CDATA[<p>Every business is concerned and should be, about cybersecurity during online meetings. Due to its popularity, Zoom is an attractive target for the bad actors. There are hundreds, maybe more, people working all the time to break Zoom&#8217;s security. To help address the security problems, Zoom now offers a reward for anyone who finds a [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/zoom-security-issues-protect-yourself/">Zoom Security Issues &#8211; Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Every business is concerned and should be, about cybersecurity during online meetings. Due to its popularity, Zoom is an attractive target for the bad actors. There are hundreds, maybe more, people working all the time to break Zoom&#8217;s security. <span id="more-3081"></span></p>
<p><iframe title="Zoom Security Issues - Protect Yourself" src="https://player.vimeo.com/video/405210252?dnt=1&amp;app_id=122963" width="384" height="240" frameborder="0" allow="autoplay; fullscreen" allowfullscreen></iframe></p>
<p>To help address the security problems, Zoom now offers a reward for anyone who finds a way to break in. The payoff, for bad actors and researchers, is enormous. A sobering thought is that maybe the attackers already have full control over Zoom. However, they might have complete control over GoToMeeting, Microsoft Teams, Skype, TeamViewer, WebEx, and any other virtual meeting platform. I certainly hope not.</p>
<h2>Zoom is Making Improvements</h2>
<p>Zoom says they&#8217;ve configured the system to avoid sending meetings through China&#8217;s servers. Otherwise, the Chinese government might require disclosure of your communications.</p>
<p>If you use Zoom on a Mac, then if a bad actor has your computer, they could take over your camera and microphone. Additionally, Zoom exposed information that could reveal Windows passwords. Zoom says they fixed those problems.</p>
<p>After Consumer Reports raised red flags, Zoom improved its privacy policy and practices. Zoom still has problems. A notable issue is that there is no end-to-end encryption during meetings. Security best practices dictate protection from each participant to every other.</p>
<h2>You and Other Companies can Help Protect Meetings</h2>
<p>For example, if you permit your users to record the meeting, encourage them to password protect the recordings, especially if they upload them to a cloud storage service. Otherwise, anyone with access to the recording can play it back.</p>
<p>Require passwords and require waiting rooms per new default settings. The goal is to stop intruders from interrupting a Zoom meeting with disruptive or disgusting content.</p>
<p>Configure the meeting so that only the host can share their screen. Then intruders cannot share theirs.</p>
<p>Never use a personal meeting room ID for scheduling meetings. Use the default setting to generate a meeting ID randomly.</p>
<p>Alert users to expect fraudulent email meeting invitations attempting to trick users into typing their Zoom username and password.</p>
<p>Enable two-step login requirements to protect accounts even if a bad actor does discover usernames and passwords.</p>
<p>Or, you could ditch Zoom all together. Options include FaceTime, Signal, Teams, and many others. But who knows which one could get hacked? No matter how secure it is, all it takes to destroy security is for one person on the call, or an attacker with remote access to their computer, to record the conversation using third party screen recording software.</p>
<p>To help protect your Zoom meetings, watch other videos that concisely cover the security settings available in a paid Zoom account, configuring the two-step login feature, and a run-through of paid account settings so you can follow along:</p>
<p><a href="https://fosterinstitute.com/?p=3094&amp;preview=true" target="_blank" rel="noopener noreferrer">Zoom Security &#8211; Set Up Two-Step Login</a></p>
<p><a href="https://fosterinstitute.com/?p=3099&amp;preview=true" target="_blank" rel="noopener noreferrer">Zoom Security Settings &#8211; The Concise Details</a></p>
<p><a href="https://fosterinstitute.com/blog/follow-along-to-set-zoom-security-settings/" target="_blank" rel="noopener noreferrer">Zoom Security &#8211; Follow Along to Set Settings</a></p>
<p>The post <a href="https://fosterinstitute.com/zoom-security-issues-protect-yourself/">Zoom Security Issues &#8211; Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zoom Security &#8211; Follow Along to Set Security Settings</title>
		<link>https://fosterinstitute.com/follow-along-to-set-zoom-security-settings/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 03 Apr 2020 15:11:58 +0000</pubDate>
				<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Zoom]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3071</guid>

					<description><![CDATA[<p>Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings. This video is [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/follow-along-to-set-zoom-security-settings/">Zoom Security &#8211; Follow Along to Set Security Settings</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings.</p>
<p>This video is for non-technical people who need to make Zoom more secure today. So, if that’s you, open up your zoom account settings on your screen, and keep this video where you can see it side-by-side. Pause the video when you need to.<span id="more-3071"></span></p>
<p>Some people say, &#8220;Mike, tell us what settings to change to increase our Zoom security.&#8221; If that&#8217;s you, then you are going to love this video. It walks you through your Zoom account settings so you can follow along.</p>
<p><iframe loading="lazy" title="Zoom Security - Follow Along to Set Settings" src="https://player.vimeo.com/video/403594987?dnt=1&amp;app_id=122963" width="384" height="235" frameborder="0" allow="autoplay; fullscreen" allowfullscreen></iframe></p>
<p>I know that some of you will want to fine tune the settings more than this. This video is not designed to replace your IT Pro; they know more about your specific system and requirements.</p>
<p>To help protect your Zoom meetings, watch other videos that cover concerns about using Zoom:</p>
<p><a href="https://fosterinstitute.com/?p=3094&amp;preview=true" target="_blank" rel="noopener noreferrer">Zoom Security &#8211; Set Up Two-Step Login</a></p>
<p><a href="https://fosterinstitute.com/?p=3099&amp;preview=true" target="_blank" rel="noopener noreferrer">Zoom Security Settings &#8211; The Concise Details</a></p>
<p><a href="https://fosterinstitute.com/blog/zoom-security-issues-protect-yourself/" target="_blank" rel="noopener noreferrer">Zoom Security Issues &#8211; Protect Yourself</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/follow-along-to-set-zoom-security-settings/">Zoom Security &#8211; Follow Along to Set Security Settings</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Alert Your Team &#8211; USB Devices, Login Prompts, and Apps</title>
		<link>https://fosterinstitute.com/alert-your-team-usb-devices-login-prompts-and-apps/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 27 Mar 2020 20:56:16 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[recommendations]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3065</guid>

					<description><![CDATA[<p>Warn your users about three ways attackers continue to exploit the COVID-19 crisis: USB: A new ploy is bad actors mailing USB devices, appearing to be from your company to your users. Once plugged in, they can open up a channel that permits unauthorized remote control and capturing keystrokes, including passwords. Fake Login Prompts: Remind [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/alert-your-team-usb-devices-login-prompts-and-apps/">Alert Your Team &#8211; USB Devices, Login Prompts, and Apps</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Warn your users about three ways attackers continue to exploit the COVID-19 crisis:<span id="more-3065"></span></p>
<p>USB: A new ploy is bad actors mailing USB devices, appearing to be from your company to your users. Once plugged in, they can open up a channel that permits unauthorized remote control and capturing keystrokes, including passwords.</p>
<p>Fake Login Prompts: Remind your users to beware of login screens when they don&#8217;t expect them. Attackers create persuasive prompts that ask your users passwords for their logon, VPN, or Microsoft Office 365 login, and more. Sometimes the windows tell the user that their connection dropped, and to provide credentials to reestablish their link. Your Users must ignore those prompts and notify your IT team immediately.</p>
<p>Fraudulent websites and apps: Sites may have useful coronavirus information, but they also contain malicious attack software that strives to infect computers. Attackers create bad apps offering online statistics, tracking of the virus spread, and more.</p>
<p>Please forward this to your friends so they can alert their users too.</p>
<p>The post <a href="https://fosterinstitute.com/alert-your-team-usb-devices-login-prompts-and-apps/">Alert Your Team &#8211; USB Devices, Login Prompts, and Apps</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>About Half of All Breaches are Caused by a Contractor or Service Provider</title>
		<link>https://fosterinstitute.com/about-half-of-all-breaches-are-caused-by-a-contractor-or-service-provider/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 14 Dec 2017 18:48:31 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Breach Audit]]></category>
		<category><![CDATA[Contractor Breaches]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[security awareness training]]></category>
		<category><![CDATA[Service Provider Breaches]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Third Party Audit]]></category>
		<category><![CDATA[Vendor Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2585</guid>

					<description><![CDATA[<p>In our experience of auditing after breaches have happened, about half were caused by a service provider working for the company that gets breached. Almost always, the vendor or contractor had no malicious intent. Their organization’s own IT systems were not secure, and/or their team members performed actions in a non-secure way. Be sure the [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/about-half-of-all-breaches-are-caused-by-a-contractor-or-service-provider/">About Half of All Breaches are Caused by a Contractor or Service Provider</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In our experience of auditing after breaches have happened, about half were caused by a service provider working for the company that gets breached.<span id="more-2585"></span></p>
<p>Almost always, the vendor or contractor had no malicious intent. Their organization’s own IT systems were not secure, and/or their team members performed actions in a non-secure way.</p>
<p>Be sure the service providers you use are working every day to be more secure too. Ask them about their security awareness training program. Ask them how often they are audited by independent third party firms that are interested in helping them increase their own security. If you want to, encourage them to sign up for our newsletter.</p>
<p>Remember, your IT security relies on their IT security too.</p>
<p>The post <a href="https://fosterinstitute.com/about-half-of-all-breaches-are-caused-by-a-contractor-or-service-provider/">About Half of All Breaches are Caused by a Contractor or Service Provider</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How My Daughter Almost Died This Weekend &#038; a Resolution Recommendation for You</title>
		<link>https://fosterinstitute.com/how-my-daughter-almost-died-this-weekend-a-resolution-recommendation-for-you/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 03 Jan 2017 15:33:50 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Discussions]]></category>
		<category><![CDATA[Technology Distractions]]></category>
		<category><![CDATA[2017 Resolution]]></category>
		<category><![CDATA[computer reliance]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[discerning helpfulness]]></category>
		<category><![CDATA[ERP]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT Effectiveness]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[New Year's Resolution]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[technology benefits]]></category>
		<category><![CDATA[technology distractions]]></category>
		<category><![CDATA[technology wisdom]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2414</guid>

					<description><![CDATA[<p>My 7-year-old daughter has been very ill since Thanksgiving. She has been under the careful care of her pediatricians at the medical system to which we belong. They have more than 10 million health plan members across the US, so they can be trusted, right? Even with multiple appointments and following the pediatricians’ prescriptions exactly, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/how-my-daughter-almost-died-this-weekend-a-resolution-recommendation-for-you/">How My Daughter Almost Died This Weekend &#038; a Resolution Recommendation for You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>My 7-year-old daughter has been very ill since Thanksgiving. She has been under the careful care of her pediatricians at the medical system to which we belong. They have more than 10 million health plan members across the US, so they can be trusted, right?<span id="more-2414"></span><br />
Even with multiple appointments and following the pediatricians’ prescriptions exactly, her health has been on a steady decline over many weeks. </p>
<p>She became so tired and lethargic that I determined that one of the best thigs I could do was stop letting her pediatricians care for her; so, I rushed my 7-year-old angel to an emergency room at a different healthcare system. Tests revealed that her body was on the precipice of shutting down. Her body was going into shock, perhaps irreversibly. The ER physician explained that, even with immediate medical intervention, she might die. I had no idea how hearing those words would feel to a parent. Like a sledge hammer hitting one’s chest. The doctors admitted her to the hospital immediately.</p>
<p>Today marks her fourth day the pediatric unit at the hospital. I just gave her a big hug, and she smiled and said, &#8220;I love you Daddy.&#8221; Were it not for the IV in her arm, it could have been a normal evening. After giving that sweet hug, she snuggled up with my wife in the hospital bed, and fell asleep.</p>
<p>She is going to be ok. But, had I continued to adhere to our health system&#8217;s pediatricians&#8217; advice, that hug would never have happened, and her sleep would have been eternal.</p>
<p>How is it that a huge medical system, with 10 million members and more than 180 physicians, could do such a poor job?  If a doctor has a computer in the examination room, and a tablet everywhere they go, does that make them a competent physician? Does the technology help them do their jobs, or get in the way of taking care of their patients?</p>
<p>Another experience: Two weeks ago I encountered a CEO who has tossed his smartphone and gone back to a flip-phone. He is not the only CEO making this move. He says the smartphone technology slowed him down. He didn&#8217;t need the frustration, and is fine with all the ribbing he receives from his peers about being a technology Neanderthal. </p>
<p>Perhaps he possesses the uncommon wisdom to know when to use, and not to use, technology.</p>
<p>How often do salespeople, especially those in the field, lament that being forced to use technology for all aspects of their role hurts their ability to sell productively?</p>
<p>Have you ever encountered an organization that spent a ton of money on a new ERP that was supposed to be amazing, but they ended up abandoning the ERP project later at an incredible expense?</p>
<p>Have you ever heard of a company so debilitated by ransomware that they could not run their organization until they recovered from the attack?  Should your organization be that dependent on technology? Yes. In some businesses, it is practically mandatory to be that reliant on technology.</p>
<p>Being reliant on technology is a big part of doing business.</p>
<p>But it is time to reconsider the wisdom of relying on computers, the cloud, and other technologies for every process in your organization. As the CEO pointed out, this not only applies to the organization, but to individuals as well. Just because there is an app for that doesn’t mean the app is a better way to do things. </p>
<p>I encourage you to make another New Year&#8217;s resolution:  Identify where technology truly helps, and where it impedes, your organization&#8217;s effectiveness. By all means, continue to use technology where it serves you well; be the best at utilizing the technology. And, be courageous enough to go against the technology trend, where appropriate.</p>
<p>Challenge your executives to identify the effectiveness of using every program and process in your organization. Definitely keep technology that serves you, and ditch the rest. Those actions may lead to some of your biggest wins in 2017!</p>
<p>Please forward this to anyone who you feel will benefit from stepping back and examining which technology serves them, and what doesn’t.</p>
<p>The post <a href="https://fosterinstitute.com/how-my-daughter-almost-died-this-weekend-a-resolution-recommendation-for-you/">How My Daughter Almost Died This Weekend &#038; a Resolution Recommendation for You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Send your IT Professionals to The 2016 SuperTech Best Practices Workshop</title>
		<link>https://fosterinstitute.com/send-your-it-professionals-to-the-2016-supertech-best-practices-workshop/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 15 Apr 2016 11:00:32 +0000</pubDate>
				<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Workshops]]></category>
		<category><![CDATA[SuperTech 2016]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Destination IT training]]></category>
		<category><![CDATA[Fun IT Workshop]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Improve IT performance]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT Best Practices Workshop]]></category>
		<category><![CDATA[IT Napa Workshop]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT Pro Workshop]]></category>
		<category><![CDATA[IT Professional Development]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[IT SuperTech]]></category>
		<category><![CDATA[IT Team performance]]></category>
		<category><![CDATA[IT Training]]></category>
		<category><![CDATA[Napa IT Workshop]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[SuperTech]]></category>
		<category><![CDATA[SuperTech Workshop]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2293</guid>

					<description><![CDATA[<p>Send your IT Professionals to The 2016 SuperTech Best Practices Workshop Monday 8/8/16 thru Wednesday 8/10/16 Executives are welcome too Professional Development Workshop for IT Pros: IT Pros must overcome ever-increasing challenges. Together, you can help yourself and your organization grow and thrive more than ever. At the SuperTech workshop, IT Professionals receive what they [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/send-your-it-professionals-to-the-2016-supertech-best-practices-workshop/">Send your IT Professionals to The 2016 SuperTech Best Practices Workshop</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Send your IT Professionals to The 2016 SuperTech Best Practices Workshop<br />
Monday 8/8/16 thru Wednesday 8/10/16<br />
Executives are welcome too</p>
<p>Professional Development Workshop for IT Pros:<br />
IT Pros must overcome ever-increasing challenges. Together, you can help yourself and your organization grow and thrive more than ever.<br />
At the SuperTech workshop, IT Professionals receive what they really need in order to be truly successful in their careers… an arsenal of “best practices” that foster an environment where everyone in the company wins! SuperTech can be a positive life-changing experience for participants from everywhere.</p>
<p>Attention Executive Management:<br />
These are just a few of the benefits you will enjoy when you send your IT techs to this one-of-a-kind &#8216;best practices&#8217; IT workshop:<br />
•	Improved performance of your IT team and outsourced vendors.<br />
•	Increased productivity from IT teams that feel more appreciated.<br />
•	Improved IT Interaction with the rest of your organization’s team.<br />
•	Re-energized IT Pros who feel happier (and more loyal) about their jobs.<br />
•	Confident IT staff you can trust to professionally represent you to clients.<br />
Imagine your IT department running like a well-oiled machine, with security precautions in place, projects completed on time, lines of communication wide open, and misunderstandings a thing of the past.</p>
<p>What The Workshop Covers:<br />
This two and a half day workshop was created specifically for IT Professionals. Here are just a few of the proven practices that you’ll learn in this workshop that will help transform you into a true “Super-Tech:”<br />
•	Master communicating your technical knowledge to others.<br />
•	Make sure you are getting the most from your outsourced IT consultants.<br />
•	Discover the perfect strategies for providing feedback to management.<br />
•	Get the people you supervise to follow your instructions.<br />
•	Love your job and enjoy your projects.<br />
•	Handle multiple priorities with ease.<br />
•	Basics of superior communication.</p>
<p>Schedule:<br />
Prior SuperTech events held in Napa and in New York City have been two days of 9a to 5p. Starting in 2015, the workshop expanded to two and a half days. It moved from a boring conference room and the new workshop meets at a different location each day. Expect a total of 12 hours of traditional training combined with 12 hours of other important activities:<br />
•	Monday August 8: In a Redwood Forest amongst trees more than 200 feet tall<br />
•	Tuesday August 9: At the Exploratorium and Fisherman’s Wharf in San Francisco<br />
•	Wednesday August 10: On the USS Hornet Aircraft Carrier</p>
<p>Testimonials:<br />
Mark, a valuable IT Manager and past participant at SuperTech says, in addition to benefitting from the content, he values the resulting friendships with fellow IT Pros: “I am only 1 out of 70 people in my company. When there is an unusual IT problem at work, having other IT Pros to call is awesome!” He is a past participant and, because he received so much value, is coming again this year too. He knows that IT Professionals can achieve so much more as a unified force. Empower your IT Pro to become part of that force.</p>
<p>Jered says, “I thought it would be good but the content in the first two hours and Mike&#8217;s hospitality and attitude blew me away. (There are) so many things I can&#8217;t wait to go back and apply.” </p>
<p>Jamie says that the workshop, &#8220;Gave me a different perspective to see how other IT Professionals face similar challenges. This was an awesome conference.&#8221;</p>
<p>Lester says that the workshop exceeded his expectations because, &#8220;I thought this would be a dry boring conference room seminar. It wasn&#8217;t. I had a great time with a great group I hope to remain friends with.&#8221;</p>
<p>Investment: $1495 total for all two and a half days<br />
Yes, this does include entry fees and tickets at venues.<br />
Does not include travel or meals.<br />
Please call if you want help finding a good price hotel, sharing a car, etc.<br />
Your family is more than welcome. Alternate activities are provided for them, and the schedule is arranged such that you will have plenty of time for you all to be together as well.</p>
<p>Please call if you have questions – including help with travel arrangements<br />
Register today! stacey@fosterinstitute.com or Mike Foster direct: 805-637-7039</p>
<p>The post <a href="https://fosterinstitute.com/send-your-it-professionals-to-the-2016-supertech-best-practices-workshop/">Send your IT Professionals to The 2016 SuperTech Best Practices Workshop</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
