<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity Audits Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/cybersecurity-audits/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/cybersecurity-audits/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Fri, 19 Jul 2024 03:37:19 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Cybersecurity Audits Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/cybersecurity-audits/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Demystifying Questions Cyber Insurance Companies Will Ask You</title>
		<link>https://fosterinstitute.com/questions-cyber-insurance-companies-will-ask-you/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 08 Jul 2024 22:00:22 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Supporting IT Professionals]]></category>
		<category><![CDATA[Wireless Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5302</guid>

					<description><![CDATA[<p>If you have existing or are applying for new Cyber Insurance coverage, be prepared for the questionnaire. Knowing what they’ll ask can give you time to implement systems to answer “yes” to the questions affecting your premium rates and whether you’re still considered insurable. Common questions on insurance applications include: Do you use MFA? Multi-factor authentication [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/questions-cyber-insurance-companies-will-ask-you/">Demystifying Questions Cyber Insurance Companies Will Ask You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you have existing or are applying for new Cyber Insurance coverage, be prepared for the questionnaire. Knowing what they’ll ask can give you time to implement systems to answer “yes” to the questions affecting your premium rates and whether you’re still considered insurable.</p>
<p><strong>Common questions on insurance applications include:</strong></p>
<p><strong>Do you use MFA?</strong> Multi-factor authentication means users must go through a second step when logging in. A prevalent method for the second factor is using an authentication application on users’ phones. It is essential to use a number-matching requirement so that a user must type in a code displayed on their phone into their computer before authentication. Another second factor is time-based one-time password (TOTP) apps on phones that display a number on the phone that the user enters as part of the authentication process. The number displayed in the app resets periodically, typically every 30 seconds. Other factors include using hardware keys that plug into USB ports and biometrics, including fingerprints or facial recognition. A typical second factor is receiving an SMS text message with a code, but that method is vulnerable to attacks such as SIM Swapping. In the interest of security, you should enforce MFA everywhere possible, including VPN, Remote Desktop, and SaaS offerings.</p>
<p><strong>Do you provide ongoing cybersecurity awareness training and periodic phishing simulation emails to measure worker proficiency?</strong> Your users must receive regular security awareness training, such as once per month and perhaps a comprehensive webinar or other presentation once a year. Additionally, services can send users a fraudulent or email phishing message once a month to measure their response, such as if they open the message, click on the simulated fraudulent link, and are duped into entering credentials. One often overlooked aspect of training and simulated phishing is that it might take time for your already overworked staff to configure, send, monitor, and produce reports about the results every month. You’re welcome to contact us to provide that service, and we do 100% of the work, so there is no additional burden on your workers. Training for new employees is available. We also provide comprehensive yearly training webinars and other presentations. Whatever training you use, be sure that it adapts to keep your users current with the rapidly evolving threat landscape.</p>
<p><strong>Do you provide password management tools to users?</strong> Tools that remember and automatically enter users’ passwords can help encourage users to use different passwords for every login. Users with the habit of reusing passwords pose a risk to your organization. Once attackers compromise a password, they will attempt to use that same password at popular sites. This practice is sometimes called credential stuffing, and attackers can be very successful at breaking into sites if users reuse passwords. An added benefit is user productivity and user happiness. Ensure the company&#8217;s password manager uses strong encryption to store your passwords securely. Single Sign-On (SSO) is becoming more popular, allowing users to log in once to access multiple sites or resources.</p>
<p><strong>Do you utilize geo-blocking or geo-filtering?</strong> These technologies identify computers, users, and email messages based on geographical locations. You will be more secure if you block email and login attempts from geographical areas where you never do business and block user logins from countries without users. While attackers can bypass these protections using VPNs, the protections are still helpful.</p>
<p><strong>Are users local administrators?</strong> When you set up a new Windows or Apple computer, the user has local administrator access and can perform many activities, including installing programs. If an attacker manages to compromise that user’s account, the attacker has tremendous power to compromise that computer and potentially your entire organization. This topic is complex, but the goal of every organization must be to ensure all workers are “standard users” on their computers. Being a standard user limits what an attacker can damage and makes the user account more difficult to compromise in the first place. Privilege Access Management (PAM) solutions help manage local admin rights by controlling and monitoring privileged access to critical systems.</p>
<p><strong>Do you segment your network?</strong> Network segmentation splits your network into smaller parts based on the purpose or type of device. For example, suppose you isolate your security cameras from your servers on a different network segment, such as a subnet or VLAN. If an attacker breaks into a security camera, segmentation can block their ability to hack your servers through the camera. Common segments include:</p>
<p>-Servers<br />
-Desktops and Laptops<br />
-Wireless Network<br />
-VPN users<br />
-Security cameras<br />
-VoIP systems<br />
-Different floors in your building or different buildings on your campus</p>
<p>It is possible to over-segment and create too much work for your IT Team, but that rarely happens. Your team will set up Access Control List (ACL) rules that limit communications between the segments to block unauthorized activities.</p>
<p><strong>Have you established a security baseline for your systems?</strong> Have a documented standard configuration for security controls you enforce on your servers, workstations, and mobile devices.</p>
<p><strong>How soon after release do you apply critical security updates to your devices?</strong> Microsoft, Apple, your firewall manufacturer, and other providers release security updates to programs to block attackers from using previously undetected security holes. You must apply the patches quickly to prevent attackers from exploiting the vulnerabilities. Testing patches before deployment is essential to avoid errors. Staging patches allows you to help ensure they don&#8217;t disrupt your production network. Zero-day patches and updates fix problems that attackers are already using to compromise systems.</p>
<p><strong>Do you allow workers to use family computers or mobile devices to access email and work from home?</strong> Family computers are significantly less secure than company-issued devices that your IT Team manages, monitors and protects 24×7. It is relatively common for organizations to permit users to use their BYOD phones to access company email. Your insurance company could see that as a red flag against providing or renewing a policy. You’ll want to demonstrate other safeguards you use to minimize the risk.</p>
<p><strong>Do you enforce EPP on all devices?</strong> Endpoint protection is a tool your IT Team can use to protect each device on your network. Ask your IT Team. Chances are they’ve implemented this solution. They might use Security Information and Event Management (SIEM) to enhance visibility and response. SIEM systems aggregate and analyze activity from different resources across your IT infrastructure.</p>
<p><strong>Do you utilize EDR/XDR tools?</strong> Using Endpoint Detection and Response (EDR), Extended Detection and Response (XDR), or Managed Detection and Response (MDR) agents on the laptops can increase security by monitoring for malicious behavior known as an indicator of compromise (IoC). EDR/XDR tools provide many benefits, including continuously monitoring network devices and watching for suspicious activities or evidence that an attacker is compromising a system. EDR/XDR is designed to identify, isolate, and mitigate threats. EDR and XDR must be effectively monitored, managed, and updated. One way many organizations ease the burden on their internal IT Teams is to utilize a third-party MSSP to perform these tasks. Managed Detection and Response (MDR) means you pay a third-party provider to manage your EDR/XDR. One key point to remember is that attackers can also obtain these protection tools and continually seek ways to bypass them. We perform Red Team Exercises at companies to test the capabilities of the EDR and XDR protections. Do not make the common mistake of letting your guard down in other security areas after implementing EDR or XDR.</p>
<p><strong>How frequently do you conduct internal and external security audits, vulnerability assessments, penetration tests, and Red Team Exercises?</strong> These tests identify previously undiscovered weaknesses in your security. Please get in touch with us if you need these services as part of a comprehensive security advisory service for executives to help them secure their organizations. We guide and become a resource for your existing IT team rather than replacing them.</p>
<p><strong>Does your spam filter scan messages and attachments for malicious links?</strong> If the answer is no, you need to add these features immediately.</p>
<p><strong>Do you use web filtering and DNS filtering?</strong> Web filtering features, often integrated with firewalls, allow your IT team to block known malicious sites, gambling, and other categories of websites. Domain Name Service (DNS) maps URL website names to addresses of servers on the web. DNS filtering services strive to identify malicious web servers and automatically block communications from your network to them. As a bonus, some services permit you to hinder users from accessing sites you might deem inappropriate.</p>
<p><strong>Do you use SPF for email messages?</strong> The Sender Policy Framework is a protective solution that your IT Team can enable to permit your email servers to confirm that inbound email messages came from an approved server rather than a fraudster impersonating or spoofing a legitimate source. While they are at it, your IT Team can enable DKIM to help other organizations’ mail servers confirm that messages they receive from you are legitimate and unaltered. They can configure DMARC to tell remote email servers to throw away messages from fraudsters attempting to impersonate your organization. It is essential to regularly review your SPF, DKIM, and DMARC records to adapt to the changing configurations and threat landscape.</p>
<p><strong>Do you identify storage locations and isolate PII, PHI, and other sensitive data?</strong> Determining where you store Personally Identifiable Information (PII), Protected Health Information (PHI), Cardholder Data (CHD), and other sensitive information is essential. Knowing where to store sensitive information is a fundamental step in protecting it. Do you keep the information isolated and protected? This identification and isolation is becoming even more critical due to the integration of AI into organizations, which might give AI access to company information.</p>
<p><strong>Do you use role-based access control (RBAC) to limit user access based on their job functions, and how do you manage and monitor privileged accounts? </strong>Role-Based Access Control (RBAC) ensures that users only have access to the data and systems necessary for their specific job functions. This minimizes the risk of unauthorized access to sensitive information. Privileged accounts with higher access levels are managed through Privilege Access Management (PAM) solutions that monitor and control their use, reducing the risk of misuse or compromise. Regular audits and real-time monitoring of these accounts are essential to detect and respond to suspicious activities.</p>
<p><strong>Do you encrypt sensitive data at rest and in transit, and what encryption standards do you use? </strong>Encryption is critical for protecting sensitive data when it is stored (at rest) and transmitted (in transit). Encryption standards such as Advanced Encryption Standard (AES) with 256-bit keys are commonly used to ensure robust security. Data at rest is encrypted to protect it from unauthorized access, even if physical security is breached. Data in transit is encrypted using protocols like TLS (Transport Layer Security) to prevent interception during transmission over networks.</p>
<p><strong>How do you assess and manage third-party vendors&#8217; cybersecurity risks and ensure vendors follow appropriate security practices? </strong>Third-party vendors can introduce significant cybersecurity risks. Assessing these risks involves regular security evaluations and audits of the vendors&#8217; practices. It’s important to have contracts that require vendors to follow appropriate security practices tailored to their roles and services. Continuous monitoring and periodic reassessments ensure that vendors maintain the required security posture over time. Organizations can manage risks by working collaboratively with vendors to meet security expectations without imposing stringent certification requirements.</p>
<p><strong>Do you use firewalls, intrusion detection/prevention systems (IDS/IPS), and other network security measures? </strong>Firewalls act as a barrier between the internal network and external threats, controlling incoming and outgoing traffic based on predetermined security rules. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) monitor network traffic for suspicious activities and take action to prevent potential breaches. These network security measures are crucial for protecting against unauthorized access and cyberattacks.</p>
<p><strong>How do you secure remote access to your network? </strong>Securing remote access involves implementing measures such as Virtual Private Networks (VPNs), which encrypt the connection between remote users and the corporate network. Your IT professionals must manage remote devices to help increase security. Multi-factor authentication (MFA) adds an extra layer of security by requiring additional verification steps beyond just a password. Additionally, restricting remote access to only essential personnel and monitoring for unusual login activities are critical components of a secure remote access strategy. This is an extensive topic; please let us know if you want more information.</p>
<p><strong>What physical security measures do you have in place to protect your data centers and offices? </strong>Physical security measures are essential to protect data centers and office premises from unauthorized access. These measures include access control systems like key cards or biometric scanners, surveillance cameras, and security personnel. Secure facilities should also have environmental controls such as fire suppression systems and backup power supplies to safeguard against physical threats and disasters. The Foster Institute offers full-scale Physical Red Team Exercises to test your physical security measures.</p>
<p><strong>Are you compliant with relevant regulations and industry standards, such as GDPR, HIPAA, PCI-DSS, or ISO/IEC 27001, and how do you ensure ongoing compliance with these standards? </strong>Compliance with regulations and industry standards demonstrates a commitment to maintaining high security and privacy standards. Regular audits and assessments help ensure compliance with frameworks such as GDPR (General Data Protection Regulation), HIPAA (Health Insurance Portability and Accountability Act), PCI-DSS (Payment Card Industry Data Security Standard), and ISO/IEC 27001. Ongoing compliance is maintained through continuous monitoring, employee training, and updates to policies and procedures as standards evolve. Please let us know if you need help with achieving or maintaining compliance. The Foster Institute, Inc. can simplify and manage the process for you.</p>
<p><strong>How do you secure mobile devices employees use to access company data and use mobile device management (MDM) solutions to enforce security policies on mobile devices? </strong>Mobile Device Management (MDM) solutions enforce security policies on employees&#8217; mobile devices that access company data. These solutions can remotely manage and secure devices, ensuring they comply with organizational security standards. Features include enforcing strong passwords, encrypting data stored on the device, and remotely wiping data if a device is lost or stolen. This ensures that mobile devices do not become a weak point in the company&#8217;s overall security posture.</p>
<p><strong>Do you store backups offline or on immutable storage?</strong> If an attacker gains access with the intent of encrypting or deleting data to demand ransom, they might attempt to destroy your ability to restore. They know you’re more likely to pay the ransom if you cannot restore sensitive data. So, you must isolate some backup data so the attacker cannot damage it. It is essential to have backups that threat actors cannot delete or damage if they break into your network. Immutable storage is data stored where you can access it, but no users, not even your administrators, can delete or alter the backup files. Cloud providers, such as Microsoft, offer immutable cloud storage. Other devices use write-once-read-many (WORM) technology to store data immutably. Offline backup is disconnected from your network. Some companies might use backup tapes or hard drives disconnected from the network and store them in a safe location for offline storage. Other organizations have a secondary network, isolated from the primary network, dedicated to their backup servers; the only connection is a server that transfers production network data to the backup network. It is best to store backups in diverse locations for redundancy and eliminate any single points of failure.</p>
<p><strong>Do you encrypt your backups?</strong> If an unauthorized person accesses your backup data, it is useless if they cannot read the contents. Encryption is a setting in your backup software. There was a time when people wouldn’t encrypt backups because the backups would take much longer. With today’s technology, there should be little added time.</p>
<p><strong>How often do you practice the restore process?</strong> If you have never practiced your complete restore process, do it now. Many organizations find out they cannot restore from their backups. Often, their failed attempt was the first time they’d ever tried to restore. It can be complicated to perform a test restore, so be prepared to give your IT Team additional time. If you outsource your IT, it is understandable that they’ll charge you for practicing the restore. Always perform restore tests in a controlled environment, separate from your production systems.</p>
<p><strong>How long will it take to restore your data from backups?</strong> When you practice your complete restore process, measure the time it takes to restore. If you find out the duration is too long, you can take steps to speed up the process.</p>
<p><strong>What steps do you take to prevent ransomware attacks?</strong> This space on the insurance application allows you to list the items above in statement form. Almost all security measures you use can protect against ransomware attacks or limit the impact.</p>
<p><strong>Do you have a documented Disaster Recovery Plan (DRP) and Business Continuity Plan (BCP) in place?</strong> Documented disaster recovery plans demonstrate that you’ve thought through the processes required to recover from disruptive events. These plans should outline specific procedures for data recovery, system restoration, and maintaining business operations during and after an incident.</p>
<p><strong>Do you conduct disaster recovery drills?</strong> Regular drills ensure your team is prepared to execute the DRP and BCP effectively. These drills can be as basic as tabletop exercises, where team members discuss their roles and responses to hypothetical scenarios, or as comprehensive as full-scale exercises that simulate actual disaster conditions and involve all aspects of the organization.</p>
<p>These are some of the most common questions on our customer’s insurance policy application and renewal forms. If you find others, please reach out for guidance.</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/questions-cyber-insurance-companies-will-ask-you/">Demystifying Questions Cyber Insurance Companies Will Ask You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Attackers are Targeting High Net Worth Individuals</title>
		<link>https://fosterinstitute.com/attackers-are-targeting-high-net-worth-individuals/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 08 Sep 2022 12:00:25 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Wireless Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2693</guid>

					<description><![CDATA[<p>An experienced high-level executive shared his concern about how attackers invest more time targeting high-net-worth individuals. If you fall into that category, especially now, you must be extra vigilant to protect yourself, your family, and your organization. The exploits may come in the form of attempts to get you to transfer money to a friend, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/attackers-are-targeting-high-net-worth-individuals/">Attackers are Targeting High Net Worth Individuals</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>An experienced high-level executive shared his concern about how attackers invest more time targeting high-net-worth individuals. If you fall into that category, especially now, you must be extra vigilant to protect yourself, your family, and your organization.</p>
<p>The exploits may come in the form of attempts to get you to transfer money to a friend, someone threatening to send out defamatory information about you unless you pay them not to, or phony messages attempting to acquire some personally identifiable information from you.</p>
<p>Be sure to alert your family members that it could be a forgery, even if an email message appears to be from you. Family members should verbally speak to you if there is ever a concern about any communications that are purportedly from you. No one should ever respond to a suspicious email or text message.</p>
<p>Know that legitimate text messages claiming to be from organizations are usually from a five to six-digit source such as 26096. If the text message is from a phone number they don&#8217;t recognize, even if the digits are all run together, like 4105550009, there is a good chance the text is fraudulent.</p>
<p>Additionally, there are crucial steps you must take to help protect your devices, including iPhones, iPads, Android phones and tablets, laptops, desktop computers, and all of your devices. Keep the devices locked up when they are not in your possession. If someone gains physical access to your device, it is possible that they can steal information, both your history and real-time now and into the future.</p>
<p>Be sure to apply critical security updates to the operating systems and browsers when prompted. But watch out for fake requests. Update alerts should never come via email or text message; those are bogus and dangerous.</p>
<p>Avoid connecting to public WiFi networks in coffee shops, airports, and hotels. Using your phone as a hotspot is much safer. A VPN protects your privacy but doesn&#8217;t prevent attackers from targeting your device on the network.</p>
<p>Avoid using a family computer to do your online banking, connect to your office, or type sensitive information. Attackers seek to infect work-from-home computers, and family computers are often the most vulnerable. Use your laptop or computer dedicated to you so that another family member doesn&#8217;t accidentally install malware for attackers to monitor your keystrokes, take control, or dwell inside, waiting for you to log in to your office.</p>
<p>There are so many steps to take, and, primarily, you must have a heightened awareness that you are at an increased risk of attacks as a high net-worth individual. Consider having a cybersecurity advisor to guide you and your team as you increase your security. Be sure they hold top-level cybersecurity certifications, including CISSP, CEH, and CISA, to help you receive the best guidance.</p>
<p>Please forward this to your friends so that they are extra vigilant too.</p>
<p>The post <a href="https://fosterinstitute.com/attackers-are-targeting-high-net-worth-individuals/">Attackers are Targeting High Net Worth Individuals</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Reasons to Keep Your Same Outsourced Computer Consultant or Managed Service Provider</title>
		<link>https://fosterinstitute.com/reasons-to-keep-your-same-outsourced-computer-consultant-or-managed-service-provider/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 22:57:37 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Supporting IT Professionals]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5319</guid>

					<description><![CDATA[<p>Our role is to be security advisors to organizations, some of whom outsource their IT services. Executives sometimes express their frustration and ask us whether to fire a Managed Service Provider or third-party IT consulting company that handles all aspects of their IT needs. We always listen to the executive and ask them about specific [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/reasons-to-keep-your-same-outsourced-computer-consultant-or-managed-service-provider/">Reasons to Keep Your Same Outsourced Computer Consultant or Managed Service Provider</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Our role is to be security advisors to organizations, some of whom outsource their IT services. Executives sometimes express their frustration and ask us whether to fire a Managed Service Provider or third-party IT consulting company that handles all aspects of their IT needs. We always listen to the executive and ask them about specific experiences. 99% of the time, organizations are better off sticking with their existing provider, and here are some reasons.</p>
<p>An exception will be if you feel held hostage by them, or if there is some other outstanding reason they’ve failed you. Yes, we&#8217;ve seen horror stories. In those extreme cases, the executives had already decided to fire their outsourced firm.</p>
<p>When we perform cybersecurity consulting, unless the executives ask us to approach it differently, we give the outsourced firm the benefit of the doubt that their intentions are always to provide you with the best service possible. If we encounter a grave security mistake, that&#8217;s one purpose of the audit – for us to catch things like that so your IT providers can fix it. We almost always find at least one gaping hole, which is our specialty. After all, third-party IT companies are responsible for many aspects of your IT operations, while our focus is cybersecurity. Once outsourced IT firms realize we&#8217;re there to help and not replace them or their services, they relax, welcome input, and ask questions about the best way to protect you.</p>
<p>If you move to a new provider, there could be a steep learning curve before they can serve you at the same level. Keep in mind that your IT provider is already familiar with your systems and understands the unique challenges you face. Unless their turnover is high, the professionals that serve you know your team members and maintain a friendly, professional working relationship with them.</p>
<p>If you consider changing providers because some well-meaning person says you have the wrong brands of products, find out if their personal bias is evidence-based. If the specific solution your provider prefers meets all the functionality criteria, it is almost always best to allow your IT Professionals to select brands and vendors they like. They typically prefer particular brands and solutions for important reasons.</p>
<p>For example, their engineers might be most familiar with Cisco, Juniper, SonicWALL, WatchGuard, or one of the many other firewall brands. Most brands, if configured properly, will serve you well. As with automobile repairs, you want a technician familiar with your car&#8217;s brand. If you ask your outsourced IT company to support an unfamiliar product, you&#8217;re putting them in an uncomfortable position. They want to consistently produce excellent outcomes for you, and if you insist that they support a brand they are unfamiliar with, you could be setting them up for failure.</p>
<p>Your outsourced IT firm almost certainly has you set up with specific vendors for your anti-virus, anti-spam, backup solution, etc., because they have automated tools that allow them to monitor and manage your solutions. That efficiency of scale facilitates them taking optimum care of you. Deviating from their standard brands creates unnecessary expense and frustration. For this reason, if you do decide to change providers, prepare yourself for needing to replace some of your software and hardware to conform to the new IT provider&#8217;s preferred configuration.</p>
<p>If your provider is too slow to respond, perhaps they&#8217;re understaffed but have an expedited service option you could invest in to get priority access to their best engineers. Or maybe they have a different brand or product solution that permits them to use streamlined tools, but you&#8217;re still using products a previous IT firm installed.</p>
<p>Without knowing the brands you are using, I cannot say if you&#8217;ve got great ones. I can share that most brands have excellent products and solutions that work well when appropriately configured by knowledgeable professionals who&#8217;ve proven their proficiency by earning certifications on those brands.</p>
<p>Executives sometimes ask if they should seek a cheaper provider. We rarely see third-party IT companies overcharging for services. They are aware of the competitive nature of their business. Consider how much it would cost you if all your systems were down, and the investment you pay your IT support firm is probably worth it.</p>
<p>Yes, your IT provider might be priced higher, but consider their level of professionalism too. Are they quick to reply when you need them? Do they fix issues the first time?</p>
<p>It can be an excellent sign if you feel you don&#8217;t need your provider because you never have any problems. That can indicate that your IT firm is taking such good care of the inner workings of your systems that everything runs smoothly for you. If you did terminate your IT provider, things could start falling apart slowly, without being observable, until everything stacks up to the point when you suffer a disaster.</p>
<p>If you wonder if they are competent, consider asking them for a list of certifications they&#8217;ve earned from Microsoft, Cisco, or the brands and technologies they provide and support for you. If they&#8217;re not certified, encourage them to take the training and pass the tests. Certifications often involve significant expense and time, so don&#8217;t expect them to earn the credentials overnight. Passing the certificate will be a breeze if they&#8217;re already knowledgeable about the products they support. And during the training, they might find new ways to help your organization without you needing to buy more stuff. Everyone benefits.</p>
<p>Your firm may not have top-level cybersecurity certifications. Cybersecurity is a complicated and rapidly evolving field that requires intense specialization. We never have expectations that third-party computer services companies know everything there is to know about cybersecurity. We expect them to be open to cybersecurity recommendations. We&#8217;re thrilled to discuss and answer their questions as they tune the solutions from brands they sell and support.</p>
<p>As cybersecurity advisors, it is rewarding to see and facilitate, if necessary, our customers strengthening their relationship with their MSPs and other third-party IT firms. Sometimes it is a matter of us helping you identify the pros and cons of the add-on cybersecurity packages your provider offers. Or, if their package isn&#8217;t the perfect fit, sometimes you can negotiate the offerings to get the best solution.</p>
<p>Please forward this to your friends if they wonder if they should change to a new outsourced IT consulting firm. As long as they&#8217;re well-staffed, competent, and professional, there are many advantages to staying with the company with whom they have an established working relationship.</p>
<p>The post <a href="https://fosterinstitute.com/reasons-to-keep-your-same-outsourced-computer-consultant-or-managed-service-provider/">Reasons to Keep Your Same Outsourced Computer Consultant or Managed Service Provider</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Block Inbound and Outbound Fraudulent Email Messages</title>
		<link>https://fosterinstitute.com/block-inbound-and-outbound-fraudulent-email-messages/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 04 Feb 2022 15:33:57 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5128</guid>

					<description><![CDATA[<p>This week, two companies contacted us asking how they can block bad actors from sending fraudulent email messages pretending to be from their company. There are underutilized email settings that can:-Prevent bad actors from sending email messages impersonating your organization&#8217;s email address-Prevent your workers from receiving emails from bad actors impersonating a legitimate sender Please [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/block-inbound-and-outbound-fraudulent-email-messages/">Block Inbound and Outbound Fraudulent Email Messages</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>This week, two companies contacted us asking how they can block bad actors from sending fraudulent email messages pretending to be from their company.</p>



<p>There are underutilized email settings that can:<br>-Prevent bad actors from sending email messages impersonating your organization&#8217;s email address<br>-Prevent your workers from receiving emails from bad actors impersonating a legitimate sender</p>



<p>Please forward this message to your IT professionals and ask if someone configured your organization&#8217;s email to support SPF, DKIM, and DMARC. Your IT team can contact your email provider for assistance.</p>



<p>SPF: Gives receiving email servers an opportunity to confirm a message came from your email servers and not from a fraudulent email server.</p>



<p>DKIM: Uses an encrypted signature that gives receiving email servers an opportunity to confirm a message is from you and that nobody has changed the message since you sent it.</p>



<p>DMARC: Allows you to create policies that tell receiving servers to allow, reject, or send messages to a spam folder when SPF or DKIM fails validation. DMARC can alert you when someone sends fraudulent email messages using your domain name.</p>



<p>Note: SPF, DKIM, and DMARC protect you based on the part of your email address after the at sign: yourcompanydomain.com. If someone receives an email message from your name at stumbling ballet dot com, they need to notice that&#8217;s not you. But sometimes, bad actors use a legitimate-looking address with a minor difference, such as changing one letter in the domain name.</p>



<p>Both the sending and receiving email servers must support SPF, DKIM, and DMARC. So, please forward this message to encourage all the other organizations you know to configure their settings.</p>



<p>Some organizations use free tools to make the process of creating the DNS records much easier. Example sites they use include <a href="https://easydmarc.com/tools/dkim-record-generator">https://easydmarc.com/tools/dkim-record-generator</a>, <a href="https://www.dmarcanalyzer.com/spf/spf-record-generator/">https://www.dmarcanalyzer.com/spf/spf-record-generator/</a>, and <a href="https://dmarcian.com/dmarc-record-wizard/">https://dmarcian.com/dmarc-record-wizard/</a> There are many other sites too. Some use mxtoolbox.com to check all three records.</p>



<p></p>
<p>The post <a href="https://fosterinstitute.com/block-inbound-and-outbound-fraudulent-email-messages/">Block Inbound and Outbound Fraudulent Email Messages</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Attackers Bypass Your Password Protection Even if You Use Two-Step Login</title>
		<link>https://fosterinstitute.com/how-attackers-bypass-your-password-protection-even-if-you-use-two-step-login/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 27 Jan 2022 23:51:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5109</guid>

					<description><![CDATA[<p>Before you let passwords and two-step login be the security controls you rely on the most, remember bad actors can altogether bypass the login if they take control of users&#8217; computers. Think of buildings that have locked doors. If an employee lets a stranger tailgate and walks through the door behind your employee, the stranger [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/how-attackers-bypass-your-password-protection-even-if-you-use-two-step-login/">How Attackers Bypass Your Password Protection Even if You Use Two-Step Login</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Before you let passwords and two-step login be the security controls you rely on the most, remember bad actors can altogether bypass the login if they take control of users&#8217; computers.</p>



<p>Think of buildings that have locked doors. If an employee lets a stranger tailgate and walks through the door behind your employee, the stranger doesn&#8217;t need a key or a badge.</p>



<p>It is the same with passwords. If an attacker is dwelling in a computer, the attacker waits for the user to log in, and now the attacker&#8217;s in too, even though they didn&#8217;t need to know the password or have a token, a text message, or anything else.</p>



<p>So don&#8217;t believe that having great authentication is the primary protection for your organization. Protect the computers from being compromised by managing security updates, restricting local user privileges, having IT security audits, and the other recommendations in the blog on our website, including this one <a href="https://fosterinstitute.com/executives-five-key-cybersecurity-steps-to-protect-your-organization-and-the-vital-timing/" target="_blank" rel="noreferrer noopener">fosterinstitute.com/executives-five-key-cybersecurity-steps-to-protect-your-organization-and-the-vital-timing/</a></p>



<p>Please forward this to your associates so that they know passwords and two-step logon are essential to have, and they are not enough.</p>
<p>The post <a href="https://fosterinstitute.com/how-attackers-bypass-your-password-protection-even-if-you-use-two-step-login/">How Attackers Bypass Your Password Protection Even if You Use Two-Step Login</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Executives: Five Key Cybersecurity Steps to Protect Your Organization, and the Vital Timing</title>
		<link>https://fosterinstitute.com/executives-five-key-cybersecurity-steps-to-protect-your-organization-and-the-vital-timing/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 07 Jan 2022 19:22:46 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5088</guid>

					<description><![CDATA[<p>As an executive that leads, and depends on, your IT Professionals or outsourced IT provider, be sure to know these five essential steps that have a massive impact on your cybersecurity protection and how frequently your team must address them: Apply Critical Security Updates &#8211; This is an essential yet never-ending task. Executives decide how [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/executives-five-key-cybersecurity-steps-to-protect-your-organization-and-the-vital-timing/">Executives: Five Key Cybersecurity Steps to Protect Your Organization, and the Vital Timing</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>As an executive that leads, and depends on, your IT Professionals or outsourced IT provider, be sure to know these five essential steps that have a massive impact on your cybersecurity protection and how frequently your team must address them:</p>



<ol class="wp-block-list"><li>Apply Critical Security Updates &#8211; This is an essential yet never-ending task. Executives decide how soon they want the updates installed after release. It is common to apply workstation updates immediately. Focus on updating servers as quickly as your IT team can support, preferably less than a week to test, practice uninstalling, and deploy updates in stages. Remember to update non-Microsoft products. Patch your infrastructure devices, including firewalls and routers.</li></ol>



<p>2. Change User Accounts so they are not Local Administrators &#8211; By default, if an attacker takes over a user&#8217;s computer, the attacker will have full administrative rights. Your IT team must configure users to be local standard users each time you set up new computers</p>



<p>3. Ensure IT Pros Manage Computers &#8211; Provide Your IT Team time to configure remote management for every new device a worker will use. They need to control your anti-malware solution, manage patches, and perform other tasks on each computer via a management console.</p>



<p>4. Implement two-step login &#8211; Protection for your network, VPN, and online programs. If you choose, Microsoft allows you to get rid of passwords and use text messages, an authenticator app, or other ways to authenticate. One-tap login is convenient. Your IT team needs to set up the authentication on your services and enroll each new worker you add to your team.</p>



<p>5. Have an Independent Cybersecurity Advisor who Performs Yearly Comprehensive Testing &#8211; They will guide and answer your questions and perform comprehensive testing at least once a year.</p>



<p>If your team&#8217;s not had time to implement the other items in this list yet, the process might take a year, depending on their workload and expertise.</p>



<p>Additionally, Practice Restoring Your Data &#8211; It is not a trivial process to practice a full restore, but you must practice to ensure the process works and restores quickly enough. Practice yearly.</p>



<p>Please forward this message to your executive friends so they can visit about these essential steps with the IT Professionals who support their organizations.</p>



<p></p>
<p>The post <a href="https://fosterinstitute.com/executives-five-key-cybersecurity-steps-to-protect-your-organization-and-the-vital-timing/">Executives: Five Key Cybersecurity Steps to Protect Your Organization, and the Vital Timing</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Give Your IT Teams Guidance and Time to Address Log4j Cybersecurity Issues Immediately</title>
		<link>https://fosterinstitute.com/give-your-it-teams-guidance-and-time-to-address-log4j-cybersecurity-issues-immediately/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 15 Dec 2021 20:47:20 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5066</guid>

					<description><![CDATA[<p>Some of our customers take the Log4j situation seriously, and some ignore it. You or your organization might use products and services from Amazon, Apple, Cisco, Google, LinkedIn, VMware, and other affected organizations. Do not ignore the danger. Attackers are abandoning some of their old attack methods to exploit Log4j vulnerabilities because the attack is [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/give-your-it-teams-guidance-and-time-to-address-log4j-cybersecurity-issues-immediately/">Give Your IT Teams Guidance and Time to Address Log4j Cybersecurity Issues Immediately</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Some of our customers take the Log4j situation seriously, and some ignore it. You or your organization might use products and services from Amazon, Apple, Cisco, Google, LinkedIn, VMware, and other affected organizations. Do not ignore the danger. Attackers are abandoning some of their old attack methods to exploit Log4j vulnerabilities because the attack is so easy, and the benefits are enormous.</p>



<p>Organizational leaders, please support your IT teams by providing them with time to address this risky situation. They’re addressing many end-of-the-year tasks, and dealing with this potential crisis might delay their progress.</p>



<p>The Microsoft Threat Intelligence Center (MSTIC) reports that foreign governments are actively exploiting the situation now. Nation-states can attack the government, military, businesses, and individual users throughout the country.</p>



<p>One of a bad actor’s top priorities is establishing remote access into networks, computers, and electronic devices. Once they gain access, attackers can dwell quietly in networks to evade detection.</p>



<p>The US Cybersecurity Infrastructure Security Agency (CISA) ordered all federal agencies to patch Log4j by Christmas Eve. That could be too late because attackers started exploiting the vulnerability in late November.</p>



<p>And, of course, ransomware attacks exploiting Log4j will be more successful than ever.</p>



<p>Steps your IT Professionals and software developers can consider taking:</p>



<p>See guidance from the USA Cybersecurity Infrastructure Security Agency (CISA) <a href="https://www.cisa.gov/uscert/apache-log4j-vulnerability-guidance" target="_blank" rel="noreferrer noopener">https://www.cisa.gov/uscert/apache-log4j-vulnerability-guidance</a>.</p>



<p>The Agency created and is updating an exhaustive list of affected software and tools at <a href="https://github.com/cisagov/log4j-affected-db" target="_blank" rel="noreferrer noopener">https://github.com/cisagov/log4j-affected-db</a>.  Review <a href="https://github.com/YfryTchsGD/Log4jAttackSurface" target="_blank" rel="noreferrer noopener">https://github.com/YfryTchsGD/Log4jAttackSurface</a> too. That page lists well-known organizations including Amazon, Apple, Google, LinkedIn, and VMware. The great news is that highly qualified developers at those organizations started working on a fix immediately. The bad news is that attackers started developing exploits immediately too. That page lists well-known organizations including Amazon, Apple, Google, LinkedIn, and VMware. The great news is that highly qualified developers at those organizations started working on a fix immediately. The bad news is that attackers started developing exploits immediately too.</p>



<p>If your organization uses VMware, review their website to find guidance. An example page is <a href="https://blogs.vmware.com/cloud/2021/12/11/vmsa-2021-0028-log4j-what-you-need-to-know/" target="_blank" rel="noreferrer noopener">https://blogs.vmware.com/cloud/2021/12/11/vmsa-2021-0028-log4j-what-you-need-to-know/</a>.</p>



<p>Go to the Mitre.org page about CVE-2021-44228 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-44228" target="_blank" rel="noreferrer noopener">https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-44228</a> and look through the references to identify links to guidance from your firewall manufacturer or VPN provider, including Cisco and SonicWALL.</p>



<p>Search the web using the keywords Log4j or CVE-2021-44228 with the names of products and applications you use.</p>



<p>Know that your organization is NOT safe if you don&#8217;t intentionally use open-source tools. Many tools and services integrate Log4j. If your network connects to services or other organizations that use Log4j, then Log4j might run on your clients too.</p>



<p>Block LDAP access if possible. Last week, we discovered LDAP open to the public side, available to all the world, of a network at one of the organizations we&#8217;re auditing right now. We notified their highly qualified and experienced IT team leader, and they closed the port immediately. They explained, &#8220;We had used that some time ago for connecting LDAP to service now before using (an updated) service. I never went back to clean it up until (now).&#8221; Had we not discovered the problem, the port would still be open today. There is no shame to the IT Pro. Most executives have no idea of the deluge of information that falls on IT departments daily, and the team&#8217;s goal is to focus on fixing broken problems first. That exposure can exist at any organization.</p>



<p>Move vulnerable servers into filtered subnets or VLANs to help wall them off from the rest of your network. Filter all traffic to allow only essential ports, protocols, sources, and destinations.</p>



<p>If you must expose LDAP, limit LDAP traffic to trusted endpoints only to help mitigate the risks.</p>



<p>If you have internally developed software or a website with active code, ask your developers to upgrade your log4j library to the newest version ASAP. Apache released a new log4j v 2.15.0 on December 6, 2021.</p>



<p>Apache provides technical details to help protect against the log4j exploits at <a href="https://logging.apache.org/log4j/2.x/security.html" target="_blank" rel="noreferrer noopener">https://logging.apache.org/log4j/2.x/security.html</a></p>



<p>Search your providers for any references to Logj4 or CVE-2021-44228<br>Many providers are still in the process of evaluating their products.<br>Examples include:<br>Amazon – in the process of updating products<br>Cisco products: Search the web for keywords: Vulnerability in Apache Log4j Library Affecting Cisco Products<br>FortiGuard: Search the web for keywords: FortiGuard Apache log4j2 log messages substitution<br>Juniper Networks: Search the web for keywords: Juniper 2021-12 Out of Cycle Security Advisory<br>McAfee: Search the web for keywords: McAfee Enterprise coverage for Apache Log4j CVE-2021-44228 Remote Code Execution<br>Okta: Search the web for keywords: Okta&#8217;s response to CVE-2021-44228 Log4Shell<br>Oracle: Search the web for keywords: Oracle Security Alert CVE-2021-44228<br>SolarWinds: Search the web for keywords: SolarWinds Apache Log4j Critical Vulnerability (CVE-2021-44228)0<br>SonicWall: Email Security is affected, and perhaps other products. Search the web for keywords: SonicWall Apache Log4j Remote Code Execution Vulnerability Log4Shell CVE-2021-44228<br>Symantec – Including Endpoint Protection Manager<br>VMware: Heavily impacted – see <a href="https://www.vmware.com/security/advisories/VMSA-2021-0028.html" target="_blank" rel="noreferrer noopener">https://www.vmware.com/security/advisories/VMSA-2021-0028.html</a><br>Ubiquiti: Search the web for keywords Ubiquiti UniFi Network Application 6.5.54</p>



<p>Kudos to these organizations and others addressing the issues related to Log4j.</p>



<p>Thank you for helping make the world a safer place to live and work!</p>



<p>More information for executives about Log4j:</p>



<p>Log4j could affect your firewalls, VPN, websites you access, your cloud providers, apps, and ultimately you. The safest stance is to assume attackers compromised your systems and behave accordingly. Don&#8217;t panic. There&#8217;s no way to predict how severe, or hopefully mild, the fallout will be at your organization.</p>



<p>Ask your IT team to watch for abnormal behavior on your websites, networks, and computers. IT Teams can scroll down to the bottom of this message for technical suggestions to protect your organization.</p>



<p>Over the next several days, software and hardware vendors will release patches and updates to block the attack. But some attacks will succeed.</p>



<p>The log4j vulnerability is so easy to exploit that it causes a massive problem that could plague e-commerce sites, cloud services, SaaS offerings, apps, and devices that use Apache&#8217;s Log4j for logging for a long time until servers, applications, and hardware is patched or replaced.</p>



<p>The potential impact increases exponentially because if a consumer or business user uses a program to access a cloud service, then there&#8217;s a good chance that Log4j is running on the client program or app running on the customer&#8217;s computer, phone, or tablet. Until they install the patch from Microsoft, Minecraft gamers are vulnerable to attackers using the locally installed Minecraft program to compromise the user&#8217;s computer through something as simple as receiving a text message. The stakes get higher if a user&#8217;s or company&#8217;s banking software accesses a bank server running a vulnerable version of Log4j. The SolarWinds attack only affected some companies that ran the SolarWinds software on their networks. In this case, any companies that use any software or services that use the Log4j logging tool from Apache are potentially susceptible to attackers running programs on their network.</p>



<p>Then there is the question of what attackers will do. Will they plant ransomware in businesses and governments worldwide and keep it dormant, dwelling inside networks, to launch future attacks? Will attackers take over computers and devices to create a botnet army, sometimes without the owner&#8217;s knowledge? Will attackers use their army of machines to launch Distributed Denial of Service attacks that flood other services with so much traffic the targets shut down? In August, attackers launched a DDOS attack against Microsoft&#8217;s Azure cloud blasting Azure with more than 2.4 Terabits per second of disruptive traffic intended to overload Microsoft&#8217;s cloud. Amazon&#8217;s AWS and Google experienced similar attacks.</p>



<p>Interestingly, a security company released a &#8220;vaccine&#8221; program for the Log4j vulnerability. The script uses the remote code execution attack to fix the problem. Some gray hat hackers launch unapproved &#8220;attacks&#8221; across the Internet designed to mitigate the security problem and block other attacks. The hackers provide a &#8220;public service&#8221; delivered by random individuals to unknowing organizations without permission. And there&#8217;s a valid concern that bad actors could modify the tool to launch malicious attacks.</p>



<p>Exploits against log4j are emerging events. Attacks against Minecraft game users are in the news, but this potential crisis affects more than video games. Hopefully, there is no significant fallout, but the potential is enormous.</p>



<p>Keep your network safe.</p>
<p>The post <a href="https://fosterinstitute.com/give-your-it-teams-guidance-and-time-to-address-log4j-cybersecurity-issues-immediately/">Give Your IT Teams Guidance and Time to Address Log4j Cybersecurity Issues Immediately</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Help Your Third-Party Providers Be More Secure Because Your Security is Only as Good as Their Security</title>
		<link>https://fosterinstitute.com/help-your-third-party-providers-be-more-secure-because-your-security-is-only-as-good-as-their-security/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 12 Nov 2021 18:16:11 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Supporting IT Professionals]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5017</guid>

					<description><![CDATA[<p>Below is a letter you can send your third-party service providers if you want to give them pointers on being more secure. We’ve done the work to make this quicker for you. None of these are unreasonable for you to request. You and your IT team can customize the letter to fit the relationship best. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/help-your-third-party-providers-be-more-secure-because-your-security-is-only-as-good-as-their-security/">Help Your Third-Party Providers Be More Secure Because Your Security is Only as Good as Their Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Below is a letter you can send your third-party service providers if you want to give them pointers on being more secure. We’ve done the work to make this quicker for you.</p>



<p>None of these are unreasonable for you to request. You and your IT team can customize the letter to fit the relationship best. These recommendations apply even if a company doesn’t have servers and do all of their work in the cloud.</p>



<p>Dear – you fill in the blank,</p>



<p>We are checking in with all of our valued service providers, including you. If your organization suffers a significant security incident, you might not be able to provide the service we count on from you. A security breach at your organization could impact our business too. In the interest of helping you protect your organization, here are some guidelines:</p>



<p>You must have a robust disaster recovery plan. You must be able to recover quickly if you lose access to your information. Your IT team needs to practice restoring because experiencing ransomware is not the best time to practice restoring all of your data for the first time.</p>



<p>It is essential that your IT team, or IT company, manage the security of all of your computers, including the computers any work from home employees use. Your IT professionals need to monitor the security update status, manage anti-virus, and perform other administrative functions that help protect the computers that your workers use.</p>



<p>Please discuss with your IT team or IT company how quickly they deploy critical security updates to your computers. Security updates sometimes cause issues, so it is best to test updates, especially server updates if you have servers, before deploying them. Because the updates often prevent attacks, there is a level of urgency.</p>



<p>Remove programs you aren’t using. Attackers sometimes gain access to your systems through programs, and they cannot exploit a program that’s not installed. Flash is an example of a program installed on many computers, but it provides a security risk. Your IT team can give you the details and identify other programs they can remove from computers to increase security.</p>



<p>Ask your IT team to make sure to make your user accounts a “standard local user” on your computers. This one step can increase your security immensely. By default, users are local administrators on their computers. This setting applies to Mac and Windows computers. If an attacker breaks into their computer, they will have elevated abilities to conquer your security protections if the user is a local administrator.</p>



<p>Enable two-step verification on all the websites that require a login. In its most basic form, once a two-step login feature is enabled, when a user enters a username and password, their phone will receive a text message with a code to complete the login process. This added protection helps you tremendously if an attacker steals one of your website passwords. The setting is usually in the security settings of the website. Three places two-step login is essential:</p>



<p>-SaaS programs your users run in the cloud. Zoom, QuickBooks Online, an ERP, G Suite, Office 365, and SalesForce are SaaS offerings.<br>-VPN Connections<br>-Remote Desktop Connections</p>



<p>Realize that connecting from public networks, including coffee shops and hotels, is risky, even if the user uses a VPN. It is more secure to use a phone or personal hot-spot to connect a computer to the Internet. The added phone charges may be lower than you expect, especially if you change to a plan with unlimited data.</p>



<p>Please forward this to your service providers; it can help prevent big heartaches and expenses for you and them.</p>
<p>The post <a href="https://fosterinstitute.com/help-your-third-party-providers-be-more-secure-because-your-security-is-only-as-good-as-their-security/">Help Your Third-Party Providers Be More Secure Because Your Security is Only as Good as Their Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Be Sure to Back Up Your Cloud Data</title>
		<link>https://fosterinstitute.com/be-sure-to-back-up-your-cloud-data/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 22 Oct 2021 18:26:16 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=4974</guid>

					<description><![CDATA[<p>Some organizations move their data to the cloud and stop backing it up. Cloud services offer ways to restore the data. But what happens if an attacker deletes your files and deletes the backup at the cloud service too? Consider backing up your data at a different cloud service. It is less likely that an [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/be-sure-to-back-up-your-cloud-data/">Be Sure to Back Up Your Cloud Data</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Some organizations move their data to the cloud and stop backing it up. Cloud services offer ways to restore the data. But what happens if an attacker deletes your files and deletes the backup at the cloud service too?</p>



<p>Consider backing up your data at a different cloud service. It is less likely that an attacker could compromise both systems if your users only have access to one.</p>



<p>There are many cloud backup solutions, and it is best to allow your IT team to use the one they prefer. The Foster Institute does not endorse nor receive any compensation for mentioning products and services. Two examples of services that work well for our customers include <a href="http://veeam.com">veeam.com</a> and <a href="http://afi.ai">afi.ai</a>.</p>



<p>One significant problem with cloud restores is that the restoration process can take a long time if you store large amounts of data. It is essential to practice the restore process to estimate how long a full restore would take.</p>



<p>Please forward this to your friends so that they know it is essential to backup cloud data too.</p>
<p>The post <a href="https://fosterinstitute.com/be-sure-to-back-up-your-cloud-data/">Be Sure to Back Up Your Cloud Data</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>If You Outsource Your IT, it is Their Job to Keep You Happy, Not the Other Way Around.</title>
		<link>https://fosterinstitute.com/if-you-outsource-your-it-it-is-their-job-to-keep-you-happy-not-the-other-way-around/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 01 Oct 2021 14:21:01 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Supporting IT Professionals]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=4967</guid>

					<description><![CDATA[<p>After we performed a cybersecurity audit for a company many years ago, the President and CEO assigned the recommendations to their IT consulting firm. What is different about this lead executive is that he gently applies firm pressure on their IT consultants to complete the recommended improvements. He&#8217;s kind and respectful to his consulting company, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/if-you-outsource-your-it-it-is-their-job-to-keep-you-happy-not-the-other-way-around/">If You Outsource Your IT, it is Their Job to Keep You Happy, Not the Other Way Around.</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>After we performed a cybersecurity audit for a company many years ago, the President and CEO assigned the recommendations to their IT consulting firm. What is different about this lead executive is that he gently applies firm pressure on their IT consultants to complete the recommended improvements. He&#8217;s kind and respectful to his consulting company, communicates expectations, asks many questions, and involves himself in cybersecurity decisions.</p>



<p>I admire seeing how he communicates, and I&#8217;ve asked his secret. He tells me he focuses on his responsibility to protect his workers&#8217; and customers&#8217; sensitive information. Everything else falls into place.</p>



<p>If the consultants need to charge money to implement changes, he asks us if we feel the price is fair and then decides. He makes sure his consultants know he&#8217;s holding them accountable by bringing us back every year to audit the systems and provide new recommendations.</p>



<p>The outsourced computer consulting company was never upset and eagerly followed the executive&#8217;s directives. The IT firm has great respect for the executive because of his bold leadership. I admire the proficiency of his IT consulting firm in meeting requirements, even when they are surprised a customer has higher expectations than most of their other customers.</p>



<p>Fast forward many years: This company is, and continues to be, one of the most secure customers we have. The leader&#8217;s no-nonsense approach to cybersecurity works best. Thieves might have stolen the air conditioning compressor units from outside their buildings, but no hackers have broken into their network!</p>



<p>If you outsource IT, your consultant company respects that you make the decisions. They&#8217;ll welcome audit recommendations and your directives if you&#8217;re willing to pay a fair fee. Their goal is to keep you happy, not the other way around.</p>



<p></p>
<p>The post <a href="https://fosterinstitute.com/if-you-outsource-your-it-it-is-their-job-to-keep-you-happy-not-the-other-way-around/">If You Outsource Your IT, it is Their Job to Keep You Happy, Not the Other Way Around.</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
