<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Family Cyber Safety Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/family-cyber-safety/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/family-cyber-safety/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Sun, 28 Jan 2024 22:15:45 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Family Cyber Safety Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/family-cyber-safety/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Safeguard Your Apple iPhones and iPads: Activate the Latest Theft Protection Setting Now!</title>
		<link>https://fosterinstitute.com/safeguard-your-apple-iphones-and-ipads-activate-the-latest-theft-protection-setting-now/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sun, 28 Jan 2024 03:46:40 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Technology Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5714</guid>

					<description><![CDATA[<p>Imagine this: You&#8217;re waiting for a friend, texting them on your iPhone, unaware that a thief is watching you enter your passcode. Moments later, your phone is stolen. In an instant, your Apple life, including Apple Pay, Keychain passwords, and family photos, is at risk. To combat this, Apple&#8217;s iOS 17.3 introduces “Stolen Device Protection”. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/safeguard-your-apple-iphones-and-ipads-activate-the-latest-theft-protection-setting-now/">Safeguard Your Apple iPhones and iPads: Activate the Latest Theft Protection Setting Now!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine this: You&#8217;re waiting for a friend, texting them on your iPhone, unaware that a thief is watching you enter your passcode. Moments later, your phone is stolen. In an instant, your Apple life, including Apple Pay, Keychain passwords, and family photos, is at risk.</p>
<p>To combat this, Apple&#8217;s iOS 17.3 introduces “Stolen Device Protection”. Here’s why activating it is crucial:</p>
<ol>
<li><strong>Face ID/Touch ID Requirement</strong>: Your iPhone will require your Face ID or Touch ID to turn off lost mode or erase the phone.</li>
<li><strong>Time-Delay Security</strong>: Changes to your Apple ID password, iPhone passcode, and key settings now have a one-hour delay.</li>
</ol>
<p><strong>Settings for Theft Protection</strong>:</p>
<ul>
<li>Quick Tip to find specific settings: Open Settings, swipe down slightly, and <strong>use the search box that appears at the top</strong>. You will find all of the settings in <strong>bold</strong> text by searching in Settings:</li>
<li><strong>Software Update</strong>: iOS 17.3 enables Stolen Device Protection.*</li>
<li><strong>Backup</strong>: Check your backup status by searching for <strong>Backup</strong> in Settings.</li>
<li>Use <strong>Face ID</strong> or <strong>Touch ID </strong>so potential thieves won&#8217;t see you enter your passcode.</li>
<li>Activate <strong>Stolen Device Protection</strong>:This is the new setting that spurred me to write this blog for you<strong><br />
</strong></li>
<li>Ensure &#8220;<strong>Find My</strong>&#8221; is enabled on Apple devices. Use iCloud.com/find or the Find My app to be sure tracking works.</li>
</ul>
<p><strong>Other Essential Steps:</strong></p>
<ul>
<li>Have alternate login methods for resetting passwords for apps and websites that use multi-factor and two-step logins.</li>
<li>If you use authentication apps, ensure you configure ways to generate codes or recover keys if you lose or erase your phone.</li>
</ul>
<p><strong>If Your Phone is Stolen</strong>:</p>
<ul>
<li>Act Fast: Use <strong>iCloud.com/find</strong> or the Find My app to enable “lost mode” and track your phone.</li>
<li>Consider Carrier Notification: They can disable phone calls and cellular data but might limit Find My functionality.</li>
<li>Device Erasure: If you have backups, and ways to recover keys in authentication apps, use Find My to erase your device to help prevent data access.</li>
<li>Password Resets: If not erasing your phone, consider resetting passwords for critical accounts if passwords are stored on the phone or if apps login automatically.</li>
</ul>
<p>As always, threat actors will seek ways to bypass this protection. As of now, this feature is a huge leap forward to protect an iPhone and iPad from thieves who see the passcode. Congratulations, and thank you, Apple!</p>
<p>*If your phone or tablet is too old to update to iOS version 17.3 or newer, see <a href="https://fosterinstitute.com/be-prepared-know-the-impact-of-iphone-theft-and-what-to-do-right-now/." target="_blank" rel="noopener">https://fosterinstitute.com/be-prepared-know-the-impact-of-iphone-theft-and-what-to-do-right-now/.</a> for recommendations.</p>
<p>Note: Testing the Stolen Device Protection feature at home may not work, as Apple devices might waive the strict requirements in familiar locations like home or work. You can read all of the details about Apple Stolen Device Protection for iPhone here: <a href="https://support.apple.com/en-us/HT212510" target="_blank" rel="noopener">https://support.apple.com/en-us/HT212510</a></p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h6></h6>
<h6></h6>
<h6></h6>
<h6>Disclaimer: The information provided in this blog is for general informational purposes only. Technology changes constantly, and some of this information might become obsolete or incorrect. We do not endorse or receive compensation for mentioning products, services, or brand names. Any outbound links provided are for your convenience and to get you started, but we cannot guarantee the security or safety of those external websites. Conducting your research and making an informed decision about any products or services mentioned here is essential. We shall not be held responsible for any actions taken based on the information provided.</h6>
<p>The post <a href="https://fosterinstitute.com/safeguard-your-apple-iphones-and-ipads-activate-the-latest-theft-protection-setting-now/">Safeguard Your Apple iPhones and iPads: Activate the Latest Theft Protection Setting Now!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Help Protect Your Financial Future: Freeze Your Credit</title>
		<link>https://fosterinstitute.com/help-protect-your-financial-future-freeze-your-credit/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 27 Jul 2023 17:10:09 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Credit Freeze]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5592</guid>

					<description><![CDATA[<p>Experts agree that one of the best things you can do to protect yourself from fraudsters is to place a credit freeze on your credit reports. Credit monitoring is important too, and it catches problems after the fact. Credit freezes help prevent fraud from happening. When you place a credit freeze, lenders can&#8217;t access your [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/help-protect-your-financial-future-freeze-your-credit/">Help Protect Your Financial Future: Freeze Your Credit</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Experts agree that one of the best things you can do to protect yourself from fraudsters is to place a credit freeze on your credit reports.</p>
<p>Credit monitoring is important too, and it catches problems after the fact. Credit freezes help prevent fraud from happening. When you place a credit freeze, lenders can&#8217;t access your credit report without your permission.</p>
<p>For example, if you want to finance a car purchase, you&#8217;ll contact the credit bureau to lift the freeze temporarily for an hour so the dealership can check your credit. The lender might congratulate you on being savvy enough to know to freeze your credit.</p>
<p>If an identity thief tries to get a loan or buy a car in your name, if the lender refuses to make the loan in your name if they cannot run your credit reports, then your proactivity blocked the thief! Congratulations!</p>
<p>Be sure to place credit freezes for the rest of your family, including your youngsters, to help stop fraudsters from taking out loans in their names too.</p>
<p>Read more from the Federal Trade Commission (FTC) at <a href="https://consumer.ftc.gov/consumer-alerts/2018/09/free-credit-freezes-are-here" target="_blank" rel="noopener">https://consumer.ftc.gov/consumer-alerts/2018/09/free-credit-freezes-are-here</a>.</p>
<p>To make things easier for you, below are the contact details for the major credit reporting agencies to contact and ask them to place freezes on your credit. They may offer services for fees that might be different than freezing your credit, and you might decide that a free freeze is all you need:</p>
<p>Equifax: <a href="https://www.equifax.com/personal/credit-report-services/" target="_blank" rel="noopener">https://www.equifax.com/personal/credit-report-services/</a> or call <span class="">888-298-0045</span>.<br />
Experian: <a href="https://www.experian.com/freeze/center.html" target="_blank" rel="noopener">https://www.experian.com/freeze/center.html</a> or call 888-397-3742.<br />
TransUnion: <a href="https://www.transunion.com/credit-freeze" target="_blank" rel="noopener">https://www.transunion.com/credit-freeze</a> or call 888-909-8872.</p>
<p>The information shared here is not financial or legal advice, only a suggestion to protect your security. Consult with legal and financial professionals who can guide you appropriately.</p>
<p>Please forward this to your friends so they can protect their financial well-being by freezing their credit too!</p>
<p>Subscribe to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>The post <a href="https://fosterinstitute.com/help-protect-your-financial-future-freeze-your-credit/">Help Protect Your Financial Future: Freeze Your Credit</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Be Prepared: Know the Impact of iPhone Theft and What to Do Right Now</title>
		<link>https://fosterinstitute.com/be-prepared-know-the-impact-of-iphone-theft-and-what-to-do-right-now/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sun, 23 Jul 2023 01:05:54 +0000</pubDate>
				<category><![CDATA[Airport Safety]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5562</guid>

					<description><![CDATA[<p>It&#8217;s a sunny day, and you&#8217;re seated outside a popular cafe, thrilled to have a break to meet a friend. You pull out your phone, type in your passcode, and start writing them a message. Suddenly, a hand shoots out of nowhere, grabbing your phone before you can even react. The thief darts away as [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/be-prepared-know-the-impact-of-iphone-theft-and-what-to-do-right-now/">Be Prepared: Know the Impact of iPhone Theft and What to Do Right Now</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It&#8217;s a sunny day, and you&#8217;re seated outside a popular cafe, thrilled to have a break to meet a friend. You pull out your phone, type in your passcode, and start writing them a message. Suddenly, a hand shoots out of nowhere, grabbing your phone before you can even react. The thief darts away as you watch in disbelief. Your heart sinks. And most likely, you have no clue about the nightmare you&#8217;re about to face if the thief knows a little about technology or is part of an organized crime ring. That&#8217;s why taking some key protective measures now is crucial before your phone gets snatched from your hands by a thief who watched you type your passcode. There&#8217;s no rewind button to what a savvy thief can do quickly.</p>
<p>The race is on. They&#8217;ll step around a corner, unlock your phone with your passcode, click on settings, Apple ID, and reset your Apple ID password. All they need to know is your passcode to the phone. Your phone asks them, &#8220;Sign out other devices using your Apple ID?&#8221; Of course, they know to say yes.</p>
<p><em>Update on January 27, 2024: Apple has a new feature called Lost Device Protection released with iOS version 17.3 that helps solve this problem. Learn more here: <a href="https://fosterinstitute.com/safeguard-your-apple-iphones-and-ipads-activate-the-latest-theft-protection-setting-now/" target="_blank" rel="noopener">https://fosterinstitute.com/safeguard-your-apple-iphones-and-ipads-activate-the-latest-theft-protection-setting-now/</a></em></p>
<p>They know that if you put the phone in Lost Mode, they have the passcode and can unlock the phone immediately. You might have your Apple ID protected with two-factor authentication; good work! But the second step of the verification process displays a verification code on your trusted devices. Unless you set your phone otherwise, the thief has a trusted device. Unless you posses a trusted device tied to your Apple ID, you won&#8217;t see the verification code, and your attempt to log in will fail.</p>
<p>At this point, only they can perform any functions that require you to enter your Apple ID and password.</p>
<h3><strong>Strive to Intervene:</strong></h3>
<p>The process only took seconds. It is unlikely you can stop their next moves quickly enough.</p>
<p>Perhaps your friend walked up as the thief was running away. Thinking you might win the race, you grab in a friendly way, of course, any device they have with Internet access and open <a href="https://appleid.apple.com" target="_blank" rel="noopener">https://appleid.apple.com</a>. Enter your Apple ID and your password quickly! Remember, the bad guy is around the corner racing you. Then, guess what? Unless your friend&#8217;s device is a trusted device on your Apple ID account, you won&#8217;t see the secret code you need to log in. The thief will see the code on your stolen phone&#8217;s screen, and they&#8217;re laughing but admire your trying. You never had a chance in that race. Read more below about setting up Recovery Contacts and Recovery Keys.</p>
<p>But a way to win and be faster than the thief is if you have your second iPhone in your pocket booted up and connected to the Internet. If so, scramble to be the first to open settings, Apple ID, scroll down through the devices, and log out the stolen device. Reset your Apple ID password. Great job! You did it! They can use the phone and most apps, but at least they cannot take over your Apple ID. Keeping two iPhones connected to your Apple account with you will help if one gets stolen.</p>
<p>Or, a more likely scenario than having two phones, maybe you happen to have your Mac open on the table in front of you the moment the phone is stolen. Assuming you weren&#8217;t using the phone as your hotspot, quickly click on the apple symbol in the top left corner, choose system settings, Apple ID, password &amp; security, change password, find the stolen device in the list at the bottom of the menu, log it out, and reset your Apple ID password. Whew! They&#8217;re not going to gain control over your Apple ID. But they can still use your apps, log in to bank accounts, and access your company email, so you&#8217;ll need to reset all those passwords too.</p>
<p>Will you win the race, or will they? Maybe you want to practice the process a few times.</p>
<h3><strong>More Things the Thief Can Do to Affect You:</strong></h3>
<p><strong>As you read this, do not be terrified.</strong> You can relax and remember this scenario assumes a thief has stolen your phone after watching you enter your passcode and memorized it. Hopefully, that will never happen to you, and it is good to be aware of some consequences, your response, and some preventative measures so you can educate your friends.</p>
<p>Since the thief knows the phone&#8217;s passcode, they can reset the Apple ID password. Then they can log in to your Apple account and affect your other Apple devices, including Mac laptops and computers connected to your account.</p>
<p>Then the bad actor can access your device&#8217;s Keychain, Apple Pay, Apple Cash, and other sensitive information. They can reset the Apple account’s recovery key. The thief can turn off location services so the phone cannot be tracked. They can change the Apple ID account&#8217;s trusted phone number and email address to make it even more difficult for you to regain access to your Apple account. They can change Face ID and Touch ID to their face and finger. They devastated your digital world and will start to steal your money and wreak havoc in your life. And don&#8217;t blame Apple; blame the bad guys.</p>
<p>Chances are that most of the apps on your phone will still work even if you log the device out of your Apple account. If the apps remember your passwords for you, then the attacker can use the apps. If you have a password manager that automatically fills in passwords without asking you to prove you are you, the password manager will also fill in passwords for the thief.</p>
<p>And if any of your apps, bank, email, or other services send a text message to your phone to verify your identity, and the thief has your phone, they will get the text message to authenticate and can impersonate you.</p>
<p>And any tools you have that rely on Apple&#8217;s Face ID or Touch ID to confirm your identity, if the thief resets Face ID or Touch ID on your phone to their face or finger, they&#8217;ll have access to those tools too.</p>
<h3><strong>Continue Immediate Steps:</strong></h3>
<p><strong>You&#8217;d better rush to reset passwords to financial and other sensitive services.</strong> See the section on multi-factor authentication below.<strong><br />
</strong></p>
<p><strong>Contact your phone service provider</strong> and convince them to disable your stolen phone&#8217;s ability to call or receive text messages until you buy your new phone.</p>
<p><strong>Reset Passwords on all your other accounts for email, online payment tools, social media, cloud storage, and more.</strong> Apple devices, including the stolen phone, are very powerful for running apps, accessing email, using web applications, and more, even if the thief does not know the password for your Apple ID. If a thief has your phone, you have many passwords to reset quickly.</p>
<p><strong>Keep trying to regain control over your Apple ID account.</strong> You can download the Apple Support App on your friend&#8217;s Apple device and initiate a process that will allow you to set a different phone number for the Apple ID verification process. Still, you must have access to the email address associated with your Apple ID to receive an emailed verification code. If you pass that verification, then endure a waiting period of at least 24 hours. The recovery process is similar to recovering your account at <a href="https://iforgot.apple.com/" target="_blank" rel="noopener">https://iforgot.apple.com/</a>. The thief can cause much trouble during the day or longer wait. Read more below about the preventative step of setting up Recovery Contacts and Recovery Keys. More information about the recovery process: <a href="support.apple.com/en-us/HT204921" target="_blank" rel="noopener">support.apple.com/en-us/HT204921</a>. Apple&#8217;s guidance if someone gains control of your Apple ID: <a href="support.apple.com/en-us/HT204145" target="_blank" rel="noopener">support.apple.com/en-us/HT204145</a>.</p>
<p>Some people would advise you to <span style="text-decoration: underline;">not</span> remove the stolen phone from your Apple ID account. If you do, you will lock yourself out of many ways to recover the phone, although the thief can block many of the protections because they know the passcode.</p>
<h3><strong>Multi-Factor Authentication:</strong></h3>
<p>An essential protection strategy is configuring multi-factor authentication, such as facial recognition, on apps and websites that support MFA. However, many two-factor authentication techniques rely on you having access to your phone.</p>
<p>It can be complicated to reset passwords on your sites and apps using multi-factor authentication if the second factor goes to the stolen phone&#8217;s phone number or relies on you having your phone for some other step. If you set up the MFA to send a text message to the phone, and the thief has your phone, they will see the text message, and you will not.</p>
<p><strong>That might spur you to get a new phone and transfer the phone number to your new phone ASAP</strong> before the attacker logs into your apps and sites and changes the verification phone number to a number only they can access, and locks you out.</p>
<p>For websites or services that only support text messages for the second step, consider having text messages go to a device other than your phone.  Consider investing in an inexpensive flip phone with a different phone number to receive text messages. If the website or app supports other options for the second factor besides only text messages, consider how a phone thief could bypass them.</p>
<p>For example, if MFA involves an email message, if the thief can easily access your email on your stolen phone, it defeats the purpose of MFA. If you set up email as the second step, use an email address that requires some other form of authentication or is unavailable on the phone. Ensure email messages do not pop up on the preview screen when received.</p>
<p>Or, do everything possible to prevent an attacker from stealing your phone and knowing its passcode.</p>
<p>If you use passkeys, be sure to see this blog posting: <a href="https://fosterinstitute.com/the-risk-iphone-theft-poses-to-your-passkeys-and-what-to-do-now/">https://fosterinstitute.com/the-risk-iphone-theft-poses-to-your-passkeys-and-what-to-do-now/</a></p>
<h3><strong>Prevention:</strong></h3>
<p>To Apple&#8217;s credit, and they deserve a lot of credit, they are taking many steps to fight this problem. They must balance the phone&#8217;s usability with security, and their multiple advanced security controls are extraordinary, and their responses are highly effective. In the constant game of cat and mouse between those who want to protect you and those who wish to harm you, there might be better defenses when you read this. As of now, here are some essential steps to protect yourself:</p>
<p><strong>One of the most helpful defenses is to be cautious about where and when you enter your passcode. Hence, attackers never find out your passcode.</strong> An attacker must know the passcode to the phone as part of resetting the Apple ID password. Using an alphanumeric passcode would be more difficult for a bad actor to read from a distance than a four or six-digit passcode.</p>
<p><strong>Another strategy is to use facial or fingerprint recognition to unlock the phone.</strong> That would be Face ID, or Touch ID when available, on Apple devices. If the user doesn’t type their passcode into the phone, nobody can “watch the victim type their code” into the phone. If Face ID won’t work due to lighting conditions or some other factor, rather than entering the passcode, you could move somewhere safe where Face ID works.</p>
<p>Even if the attacker holds the phone in front of the victim&#8217;s face and the phone unlocks, the attacker still won’t know the passcode to reset the Apple ID account password. Furthermore, Apple’s Face ID settings have an option called “Attention Detection,” so if the user is unconscious or drugged, the facial recognition will refuse to unlock the phone. Unless the thief coerces the victim to tell them the passcode, the thief cannot reset the Apple ID password.</p>
<p><strong>Consider using a password manager rather than the Keychain that is tied to the Apple ID.</strong> If the user doesn’t use the Keychain to store passwords and uses a password manager such as 1Password, LastPass, NordPass, or others, then the thief knowing the phone’s passcode does not give them access to passwords stored outside of the Keychain. Ensure your password manager’s settings force you to enter a passcode and do not use the same passcode as the phone.</p>
<p>Before everything seems hopeless, remember this disaster starts when a thief sees you enter your passcode and steals your phone.</p>
<h3><strong>Be Proactive:</strong></h3>
<p>Erase your SSN, NI, DL, Passport, or other sensitive information anywhere you’ve stored it, whether in text, contact records, photos, and everywhere else. The thief will search for that information and use it to open accounts, take out loans, and perform other identity theft compromises.</p>
<p>And obviously, don’t share your passcode with anyone other than, if you are going to share it, a family member or close friend you can trust with the key to your digital world.</p>
<p>If you&#8217;ve not done so recently, visit <a href="http://appleid.apple.com" target="_blank" rel="noopener">appleid.apple.com</a> to update all of your personal or security info. Look for an email address that is not yours. Be sure you recognize the devices in your account.</p>
<p>While you are there, consider setting up someone you trust who has an Apple device as a Recovery Contact who can vouch for you and generate a code to help you recover your Apple ID. They cannot access your data, only verify your identity if you lose access to your Apple ID. Details: <a href="support.apple.com/en-us/HT212513" target="_blank" rel="noopener">support.apple.com/en-us/HT212513</a></p>
<p>You could set up a 28-character Recovery Key to print out and store in multiple secure locations to help you recover your Apple ID. But be careful. If you choose to have a Recovery Key, and lose the 28-character key, even Apple cannot help you recover your Apple ID. Details: <a href="http://support.apple.com/en-us/HT208072" target="_blank" rel="noopener">support.apple.com/en-us/HT208072</a></p>
<p>You&#8217;ll see an option to set up a Legacy Contact who, with access to your death certificate, can access your photos and text messages but not passwords. Details: <a href="support.apple.com/en-us/HT212360" target="_blank" rel="noopener">support.apple.com/en-us/HT212360</a>.</p>
<p>Stay current on updates. Rarely do updates create security issues; more often they provide protection against ways attackers find to bypass security.</p>
<p>If you lose access to your Apple ID, you could permanently lose access to your photos of you, your friends, and your family. This underscores how important it is to keep backups of your Apple photos and videos in case someone takes over your Apple account: <a href="https://support.apple.com/en-us/HT209454" target="_blank" rel="noopener">https://support.apple.com/en-us/HT209454</a>.</p>
<h3><strong>Reality Check:</strong></h3>
<p>Rather than go through life fearing what could happen, reduce the damage you can suffer and the likelihood of something terrible happening. Continue to recognize and avoid dangerous situations and locations. Keep your phone secure, never enter your passcode when someone can see you, and take the preventative and proactive steps above. Now that you know the risks, your subconscious will alert you to dangers more than before.</p>
<p>Examine your risk tolerance. Balance the likelihood of someone stealing your phone against the damage a phone thief can cause you. If you need to be super-secure, you can reevaluate your practices based on the information contained within. Some people might take some steps to reduce the danger and accept what risk is left. Others might leave their phone locked safely at home more often when they go out.</p>
<p>With the advent of AI, attackers will find new ways to steal, but AI will also help develop new ways to prevent attacks. Everything is changing so quickly on both sides. When you read this, perhaps additional protections are available to help keep you, your organization, and your loved ones safe.</p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute&#8217;s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p><strong>Disclaimer:</strong> The information provided in this blog is for general informational purposes only. Technology changes constantly, and some of this information might become obsolete or incorrect. We do not endorse or receive compensation for mentioning products, services, or brand names. Any outbound links provided are for your convenience and to get you started, but we cannot guarantee the security or safety of those external websites. Conducting your research and making an informed decision about any products or services mentioned here is essential. We shall not be held responsible for any actions taken based on the information provided.</p>
<p>The post <a href="https://fosterinstitute.com/be-prepared-know-the-impact-of-iphone-theft-and-what-to-do-right-now/">Be Prepared: Know the Impact of iPhone Theft and What to Do Right Now</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Risk iPhone Theft Poses to Your Passkeys and What to Do Now</title>
		<link>https://fosterinstitute.com/the-risk-iphone-theft-poses-to-your-passkeys-and-what-to-do-now/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sun, 23 Jul 2023 00:55:46 +0000</pubDate>
				<category><![CDATA[Airport Safety]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5566</guid>

					<description><![CDATA[<p>Passkey technology can be highly dependent on a user’s smartphone. If an attacker gains access to a smartphone and knows the passcode, then the attacker can potentially have easy access to all the passkeys stored in the smartphone. For example, if an iPhone thief resets the Apple ID password and keeps the phone, the victim [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/the-risk-iphone-theft-poses-to-your-passkeys-and-what-to-do-now/">The Risk iPhone Theft Poses to Your Passkeys and What to Do Now</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Passkey technology can be highly dependent on a user’s smartphone. If an attacker gains access to a smartphone and knows the passcode, then the attacker can potentially have easy access to all the passkeys stored in the smartphone. For example, if an iPhone thief resets the Apple ID password and keeps the phone, the victim cannot access their passkeys on any Apple device. Therefore, the victim is locked out of all their accounts protected with a passkey, and the attacker is allowed in. That is a big problem.</p>
<p>If you want to know more about passkeys: <a href="https://fosterinstitute.com/the-rise-of-passkeys-a-paradigm-shift-in-authentication-technology/" target="_blank" rel="noopener">https://fosterinstitute.com/the-rise-of-passkeys-a-paradigm-shift-in-authentication-technology/</a></p>
<p>To gain the most value out of the information below, first review the details about how a stolen phone creates an authentication disaster: <a href="https://fosterinstitute.com/be-prepared-know-the-impact-of-iphone-theft-and-what-to-do-right-now/" target="_blank" rel="noopener">https://fosterinstitute.com/be-prepared-know-the-impact-of-iphone-theft-and-what-to-do-right-now/</a></p>
<p>As mentioned above, if your phone with passkeys is stolen, the thief can access your accounts and deny you access. Because passkey technology and strategies are constantly evolving, there might be more solutions when you read this. As of now:</p>
<p>One possible solution would be storing the passkeys in a password manager, not the Keychain. Then, as long as the attacker cannot unlock the password manager, the attacker will not have access to the passkeys. And if an attacker destroys the passkeys in the Keychain or blocks access to your Apple ID and thus Keychain, you would still be able to access your passkeys since the passkeys are stored in the password manager. The password manager NordPass advertises allowing users to create, store, and share passkeys between their devices. The password managers 1Password and LastPass have announced they will support storing passkeys soon. As you read this, other password managers might support storing passkeys too.</p>
<p>Without using a password manager to store passkeys, another way to protect passkeys would be to set up passkeys in multiple environments. Many iPhone users have a Windows desktop or laptop too. Or they might purchase an Android device where they could configure passkeys. Even if an attacker resets the Apple ID password or deletes the passkeys from the Keychain, thus blocking the victim’s access from all their Apple devices, the victim can still access their sites protected with a passkey generated using their Windows or Android device. Then they can revoke the passkeys created in their Apple ecosystem to prevent the attacker from authenticating from the stolen phone.</p>
<p>But unless users have them already, it is extra trouble and expense to buy a Windows computer or Android phone and remember to set up passkeys on two different devices. Someday, the technology created for convenience might allow the same passkey to function across Apple, Windows, and Android devices. That would render this strategy ineffective, but it could be a long time before such cooperation comes to fruition. A drawback of having more than one device is it gives thieves more opportunities to steal. Thus, using a password manager to store passkeys is a better option for many unless they distrust the security of password managers.</p>
<p>Subscribe to maximize your executive potential with Foster Institute&#8217;s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p><strong>Disclaimer:</strong> The information provided in this blog is for general informational purposes only. Technology changes constantly, and some of this information might become obsolete or incorrect. We do not endorse or receive compensation for mentioning products, services, or brand names. Any outbound links provided are for your convenience and to get you started, but we cannot guarantee the security or safety of those external websites. Conducting your research and making an informed decision about any products or services mentioned here is essential. We shall not be held responsible for any actions taken based on the information provided.</p>
<p>The post <a href="https://fosterinstitute.com/the-risk-iphone-theft-poses-to-your-passkeys-and-what-to-do-now/">The Risk iPhone Theft Poses to Your Passkeys and What to Do Now</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Attackers Scan Your Network for These Folder Names</title>
		<link>https://fosterinstitute.com/attackers-scan-your-network-for-these-folder-names/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 02 Sep 2021 22:04:45 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=4919</guid>

					<description><![CDATA[<p>Attackers Scan Your Network for These Folder Names Once attackers gain access to a network, before they make themselves known, they explore your files to Locate cyber insurance policies to determine what your coverage limits are. Find financial statements to determine how much ransom you can afford to pay. Look for the most sensitive files [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/attackers-scan-your-network-for-these-folder-names/">Attackers Scan Your Network for These Folder Names</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Attackers Scan Your Network for These Folder Names</p>



<p>Once attackers gain access to a network, before they make themselves known, they explore your files to</p>



<ul class="wp-block-list"><li>Locate cyber insurance policies to determine what your coverage limits are.</li><li>Find financial statements to determine how much ransom you can afford to pay.</li><li>Look for the most sensitive files they can download and threaten to release if you do not pay them.</li><li>And watch to see if you&#8217;ve discovered, or suspect, that they&#8217;ve gained access to your compute</li></ul>



<p>Do you have folder names that contain these letters in a row?</p>



<p>bank<br>Bank*Statement<br>budget<br>HR<br>Insurance<br>IRS<br>password<br>SSN</p>



<p>See below for the complete list of 123 groups of characters.</p>



<p>The security group MalwareHunterTeam obtained the Pysa ransomware operation&#8217;s attack script and shared the list with Bleeping Computer.</p>



<p>Hopefully, we don&#8217;t reach a point of needing to name folders, not using descriptive names, but the names of sections of parking lots at major amusement parks. A better strategy is to do everything possible to prevent the attackers&#8217; access. Rather than terrify you, use any concern you feel to redouble your efforts to implement robust cybersecurity controls, including but not limited to:</p>



<ul class="wp-block-list"><li>Utilize application control features of operating systems. Consider Microsoft AppLocker but consider keeping the implementation less complex by not verifying hashes.</li><li>Apply critical security updates to operating systems, applications, and infrastructure devices such as firewalls.</li><li>Eliminate local administrative rights for all users.</li><li>Have both online and offline backups. Offline backups are disconnected from your network so that if an attacker gets into your network, they cannot alter your backups.</li><li>Even though it can be a monumental task, practice a complete system restore into a test environment so you can rest more confidently that you can get your data back in the event it is encrypted during a ransomware attack.</li><li>Use a two-step login feature for online programs, VPNs, and remote desktop connections.<br>If you still have a local Exchange server, migrate it to Office 365 ASAP. Exchange mail servers are the target of successful attacks.</li></ul>



<p>Please communicate with your IT professionals and support them by providing time to focus on implementing security controls. Help them with automation and delegation of daily tasks.</p>



<p>Please forward this to your friends, so they see this example and appreciate the level of sophistication of ransomware tools.</p>



<p>Here&#8217;s a full list of text the ransomware program will look for automatically in your folder names:</p>



<p>941<br>1040<br>1099<br>8822<br>9465<br>401K<br>4506-T<br>ABRH<br>Addres<br>agreem<br>Agreement Disclosure<br>ARH<br>Assignment<br>Audit<br>balanc<br>bank<br>Bank Statement<br>Benef<br>billing<br>Brok<br>budget<br>bureau<br>card<br>cash<br>CDA<br>checking<br>claim<br>clandestine<br>compilation<br>compromate<br>concealed<br>confid<br>confident<br>Confidential Disclosure<br>contact<br>contr<br>CPF<br>CRH<br>Crime<br>DDRH<br>Demog<br>Detail<br>Disclosure Agreement<br>Disclosure Confidential<br>DRH<br>emplo<br>Enrol<br>federal<br>Finan<br>finance<br>Form<br>fraud<br>government<br>hidden<br>hir<br>HR<br>Human<br>i-9<br>illegal<br>important<br>Info<br>insider<br>Insurance<br>investigation<br>IRS<br>ITIN<br>K-1<br>letter<br>List<br>Login<br>mail<br>NDA<br>Numb<br>Partn<br>passport<br>passwd<br>password<br>pay<br>payment<br>payroll<br>person<br>Phone<br>privacy<br>privat<br>pwd<br>Recursos Humanos<br>report<br>Resour<br>resurses human<br>RHO<br>routing<br>RRHH<br>saving<br>scans<br>sec<br>secret<br>security<br>seed<br>Signed<br>sin<br>soc<br>SS-4<br>SS#<br>SSA<br>SSN<br>Staf<br>statement<br>Statement Bank<br>studen<br>SWIFT<br>tax<br>Taxpayer<br>Terror<br>Transact<br>unclassified<br>Vend<br>W-2<br>w-4<br>W-7<br>W-8BEN<br>w-9<br>W-9S</p>



<p>Source of the list of filenames, used with permission:<span style="text-decoration: underline;"><a href=" https://www.bleepingcomputer.com/news/security/ransomware-gangs-script-shows-exactly-the-files-theyre-after"> https://www.bleepingcomputer.com/news/security/ransomware-gangs-script-shows-exactly-the-files-theyre-after</a></span> from  <span style="text-decoration: underline;"><a href="https://twitter.com/malwrhunterteam">https://twitter.com/</a><a href="https://twitter.com/malwrhunterteam" target="_blank" rel="noreferrer noopener">malwrhunterteam</a></span></p>
<p>The post <a href="https://fosterinstitute.com/attackers-scan-your-network-for-these-folder-names/">Attackers Scan Your Network for These Folder Names</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Beware: Attackers Buy Top Search Engine Results to Trick You</title>
		<link>https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 16:40:14 +0000</pubDate>
				<category><![CDATA[browser security]]></category>
		<category><![CDATA[Credit Card Security]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[Malicious Advertising]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Website Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3351</guid>

					<description><![CDATA[<p>What seems to be the best way to find a company&#8217;s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site. Here is how the scam works: Suppose you want to look up a company online [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/">Beware: Attackers Buy Top Search Engine Results to Trick You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>What seems to be the best way to find a company&#8217;s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site. <span id="more-3351"></span></p>
<p>Here is how the scam works: Suppose you want to look up a company online named Super Duper, so you type the store&#8217;s name into your favorite search engine. An attacker might have purchased the top result to take you to the website superduperco.com. However, if you knew to scroll down past the paid-for-results, you would have seen that the real website is superduper.com. Attackers set up a website and named it superduperco.com.</p>
<p>Their deceptive site might contain malicious advertising, ask you to enter credit card numbers during checkout, or tempt you to download malicious programs and apps. They might ask you to login or reset a password, and they capture the password you type in.</p>
<p>If you look up a retailer in a search engine, skip past the ads and paid results. Scroll down to see real search results. Even then, be skeptical in case attackers used SEO techniques to appear at the top of the actual search results.</p>
<p>Please forward this to your friends to alert their users that top search engine results can be a trap.</p>
<p>The post <a href="https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/">Beware: Attackers Buy Top Search Engine Results to Trick You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protecting and Restricting iPads, iPhones, and Android Devices</title>
		<link>https://fosterinstitute.com/protecting-and-restricting-ipads-iphones-and-android-devices/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 02 Jan 2018 22:55:09 +0000</pubDate>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Children]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Cyber Security Trends]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Parental Controls]]></category>
		<category><![CDATA[protecting devices]]></category>
		<category><![CDATA[restricting devices]]></category>
		<category><![CDATA[Restricting internet access]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[technology safety]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2594</guid>

					<description><![CDATA[<p>Because many families, and business professionals, received new tablets for the holidays, it is important to consider security. Families, as well as businesses, may choose to restrict permissions on devices. Here’s how: Set a passcode on the device. Even a 4-digit code is much better than nothing. Just avoid 0000, 1111, 1234, 2580, or other [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/protecting-and-restricting-ipads-iphones-and-android-devices/">Protecting and Restricting iPads, iPhones, and Android Devices</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Because many families, and business professionals, received new tablets for the holidays, it is important to consider security. Families, as well as businesses, may choose to restrict permissions on devices. Here’s how:<span id="more-2594"></span></p>
<p>Set a passcode on the device. Even a 4-digit code is much better than nothing. Just avoid 0000, 1111, 1234, 2580, or other easily guessed codes. Keeping the device in your possession, or in a secure place, is just as essential since is can prevent the opportunity for someone to guess your password.</p>
<p>Keep the device backed up, and apply security patches as soon as they are released. The patches often protect against attacks that are already happening in the wild.</p>
<p>Do not connect to Wi-Fi networks without weighing the risk of convenience versus your potential benefits. When you connect to any Wi-Fi network, there is a chance that attackers can exploit your device in many ways. Because bad actors can trick your device into connecting to their malicious access points without your knowledge, consider using your device’s settings to disable Wi-Fi when you are not using it. Re-enable Wi-Fi only when you are at your office, home, or in another trusted environment.</p>
<p>At the office, there is technology that will allow your IT team to implement MDM, Mobile Device Management, to restrict your team members’ activity on their devices. This can help protect against one of your team members accidentally becoming a vector for attackers to access, and potentially interfere with, your entire organization’s network.</p>
<p>For families, keep these three possibilities in mind:</p>
<p>First, use the internal parental controls and restrictions that are built into the device. The settings and features are very effective, and well documented on the support sites. More features can be added with security and feature updates, so review the settings periodically. The best strategy for using these restriction settings is to use steps A, B, and C.</p>
<ul>
<li>Step A: As you apply security and privacy restrictions to a device for a family member, keep reminding yourself that you are restricting that device for their, not your, needs. It is easy to think about how you might want to use wireless payment options, and then you avoid restricting the options accordingly. When in doubt, restrict. You can always re-enable features later.</li>
<li>Step B: Before applying parental control restrictions, first configure the other settings on the device. If you apply parental control restrictions first, you may find that you’ve restricted your own ability to adjust these settings.</li>
<li>Step C: Wait until you finish steps A and B before you apply the restrictions designed to protect family members. You’ll be prompted to create your own unique password so that, in theory, only you can adjust the parental controls.</li>
</ul>
<p>Second, when protecting families, consider commercially available tools designed to enhance your ability to, not only restrict, but also monitor usage. Many reviews place a product named Qustodio at the top of the list. We receive no compensation in any way for recommending this, or any other product or service. We just want you to have a place to start. It seems that, for many of the control tools available, parents either love them or hate them, depending on their expectations. To help ensure a good outcome for you, research the features and read comments from other parents. Restrict your search to comments made in 2017. Each product’s features, and approval ratings, tend to change from year to year. Some products will even permit you to restrict laptops and desktop computers in addition to tablets and phones. Interestingly, you may find that third party software is able to restrict Android devices more than Apple devices. This is because Apple’s own internal controls are already so restrictive, they can partially block the parental control software too.</p>
<p>Third, consider restricting the Internet access at your home, too. For example, you may choose to set a time limit on usage duration or time of day. This can help ensure that youngsters get enough sleep. A very powerful tool is called Circle with Disney. Again, we receive no compensation for recommending products or services. This tool is widely accepted as being one of the best. If nothing else, check out its features to help you get an idea of what you may want to control. It has a feature that can restrict access even when the device uses a cellular connection or connects to a different network. That added protection can prevent family members from simply going to someone else’s house to operate without restrictions. Bear in mind that Internet filtering tools do not restrict the ability for family members to use apps, except for apps that need to connect to the Internet in order to function. The afore mentioned products can control both apps and Internet usage. But sometimes having two products can be helpful too.</p>
<p>When implementing family control tools, remember that all of them include privacy risks. While restricting apps and Internet usage, software is able to monitor your family members’ electronic behavior too. That information can be sold to marketing firms who already build a profile on each consumer. Do you want to contribute to what they know about your family members? What if bad actors gain access to information that helps them target a family member? You may decide the risks are worth the benefits.</p>
<p>Please forward this information to everyone you know who might want to place restrictions on Apple and Android based devices. Thank you for helping make the world a safer place to live and work! Happy New Year!</p>
<p>The post <a href="https://fosterinstitute.com/protecting-and-restricting-ipads-iphones-and-android-devices/">Protecting and Restricting iPads, iPhones, and Android Devices</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Portable Radios Can Replace Family Phones</title>
		<link>https://fosterinstitute.com/portable-radios-can-replace-family-phones/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 21 Nov 2017 16:31:05 +0000</pubDate>
				<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[alternative cell phone]]></category>
		<category><![CDATA[Cell Phone Alternative]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[family radio service]]></category>
		<category><![CDATA[family radios]]></category>
		<category><![CDATA[family safety]]></category>
		<category><![CDATA[FCC]]></category>
		<category><![CDATA[FRS]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[radios]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[wireless options]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2567</guid>

					<description><![CDATA[<p>This is the time of the year when youngsters remind parents that all of their friends have phones, the latest model is out, and everyone is getting one! Some parents ask if there is an alternative. Yes. If you want to be able to reach them when they are off playing around the neighborhood, or [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/portable-radios-can-replace-family-phones/">Portable Radios Can Replace Family Phones</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This is the time of the year when youngsters remind parents that all of their friends have phones, the latest model is out, and everyone is getting one! Some parents ask if there is an alternative. Yes.<span id="more-2567"></span></p>
<p>If you want to be able to reach them when they are off playing around the neighborhood, or stay in contact when you all go to holiday festivities, the amusement parks, or about anywhere else, consider the wonderful radios that can be purchased for a fraction of the price of phones.</p>
<p>The FCC set aside frequencies for family radio service (FRS) for free, and for a FCC registration fee, members of the same household can use the more powerful GMRS radios.</p>
<p>Someone loses, or breaks, a radio? Easy to replace. No monthly fees.</p>
<p>We keep several radios right next to the front door. Someone leaves to go play? Grab a radio. The whole family headed for an indoor or outdoor adventure, grab all the radios. The range isn’t unlimited, but we can reach each other easily within a two-mile radius, and usually, since our family travels, and howls, in packs, it is more than enough. Need more range? That’s an option too.</p>
<p>If you want more details, please ask.</p>
<p>The post <a href="https://fosterinstitute.com/portable-radios-can-replace-family-phones/">Portable Radios Can Replace Family Phones</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What You Need to Do to Protect Yourself after the Equifax Breach</title>
		<link>https://fosterinstitute.com/what-you-need-to-do-to-protect-yourself-after-the-equifax-breach/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 08 Sep 2017 20:09:08 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Credit Freeze]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Equifax]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[FTC]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Stolen Data]]></category>
		<category><![CDATA[Website Security]]></category>
		<category><![CDATA[Credit Hack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Dwell Time]]></category>
		<category><![CDATA[Equifax Breach]]></category>
		<category><![CDATA[Experian]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity Theft Tips]]></category>
		<category><![CDATA[Innovis]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Credit]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Freeze]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Stolen Identity]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Trans Union]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2535</guid>

					<description><![CDATA[<p>You may be one of the 143 million people affected by the Equifax hacking breach that was announced yesterday. Data stolen may include contact information, dates of birth, driver’s license information, and Social Security numbers. Attackers can make money selling the information to people who could steal your identity and take out loans in your [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/what-you-need-to-do-to-protect-yourself-after-the-equifax-breach/">What You Need to Do to Protect Yourself after the Equifax Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You may be one of the 143 million people affected by the Equifax hacking breach that was announced yesterday.</p>
<p>Data stolen may include contact information, dates of birth, driver’s license information, and Social Security numbers. Attackers can make money selling the information to people who could steal your identity and take out loans in your name.</p>
<p>Place a credit freeze on your credit report. To do so, contact all four: Experian, Innovis, Trans Union, and, you guessed it, Equifax. In total, you’ll spend less than $75 to place the freeze.</p>
<p>A credit freeze stops people for gaining access to your credit report. It is difficult for an imposter to borrow money if a lender cannot check a credit report first.</p>
<p>Remember, credit monitoring, though good, sometimes only catches bad things when it is too late.</p>
<p>A security freeze is more effective, and lasts longer, than a fraud alert.</p>
<p>Additionally, watch out for anything odd or abnormal on your bank statements. Download your credit reports every quarter to see what is on them. One way to see your credit reports is to use a service such as annualcreditreport dot com</p>
<p>The FTC gives suggestions about avoiding and handling identity theft at consumer.ftc dot gov/features/feature-0014-identity-theft</p>
<p>Equifax has set up a website equifaxsecurity2017 dot com for people to see if their information was part of the breach. However, many people have been experiencing problems with that website.</p>
<p>Executives – FYI: Reports say that the attack did not result from social engineering. In other words, nobody clicked a bad link in an email. The attackers got in because an Equifax website was insecure. Have you had someone check the security of your website lately? If your site simply displays static information, you are at a much lower risk than if your site has a place for someone to login and/or look up information via your site.</p>
<p>Reports say that the breach may have happened as early as May, and Equifax discovered the breach on July 29. The time between when attackers compromise a system, and when it is discovered, is called dwell time. The best thing to do is to stop hackers from getting in to begin with. Keep security a top priority at your organization! The attackers are counting on you to overlook important steps.</p>
<p>Please forward this to anyone you care about…</p>
<p>The post <a href="https://fosterinstitute.com/what-you-need-to-do-to-protect-yourself-after-the-equifax-breach/">What You Need to Do to Protect Yourself after the Equifax Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Moms, Dads, and Friends: Take 7 Steps to Secure Your Students’ Computers</title>
		<link>https://fosterinstitute.com/moms-dads-and-friends-take-7-steps-to-secure-your-students-computers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 29 Aug 2017 15:58:37 +0000</pubDate>
				<category><![CDATA[Adobe Flash]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[hotspot safety]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[Student Cyber Security]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[coffee shop wi-fi]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Flash]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[parent cyber safety tips]]></category>
		<category><![CDATA[program safety]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[sandard users]]></category>
		<category><![CDATA[School computers]]></category>
		<category><![CDATA[school laptop]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[Stucent Computers]]></category>
		<category><![CDATA[student cyber-security]]></category>
		<category><![CDATA[Student Safety]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2528</guid>

					<description><![CDATA[<p>School is starting again and many students need computers. Take these important steps to help make them more secure:In addition to how they back up now, they also need to perform image backups that will back up everything, even programs, so that restore operations can go quickly and not interfere with schoolwork. Image backup tools [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/moms-dads-and-friends-take-7-steps-to-secure-your-students-computers/">Moms, Dads, and Friends: Take 7 Steps to Secure Your Students’ Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>School is starting again and many students need computers. Take these important steps to help make them more secure:<span id="more-2528"></span>In addition to how they back up now, they also need to perform image backups that will back up everything, even programs, so that restore operations can go quickly and not interfere with schoolwork. Image backup tools include Shadow Protect Desktop from Storage Craft, and Acronis True Image. For Macs, use Carbon Copy Cloner.</p>
<p>Be sure the “automatic update” feature is turned on in Windows and in Mac OS. Students must have the critical security patches installed to dramatically increase security. They’ll need to patch their browsers separately.</p>
<p>Uninstall all programs that they don’t think they will use. Start with the programs that are easy to recognize and skip the rest for now. Each program is a potential toe-hold for an attacker to gain access to a system. Worst case, if they delete something now that they need later, they can re-install it. In particular, remove Java and Flash. These are two tools that are frequently hacked and may be unnecessary. If a student finds they need either, he or she can reinstall them with the newest version. Make sure they get Java only from java dot com and Flash from get.adobe dot com/flashplayer/</p>
<p>Make sure they make their user account a “standard user” on their computer. This helps block attackers. Steps for Windows and Mac: 1) Create a new user 2) promote that user to be a local administrator 3) Demote your account to a standard user and use your own account.</p>
<p>Turn on two-step verifications on all the websites they visit. The setting is usually in the security settings of the website.</p>
<p>They need to keep their computer physically secure. Someone could access their files, social media, and e-mail accounts easily and without their knowledge. Passwords aren’t that helpful. It is usually trivial to bypass passwords on computers once an attacker gains physical access to a computer.</p>
<p>And though they may not heed this last step, it is a really good idea to avoid connoting to Wi-Fi services at school, coffee shops, etc. It is better if they use their phone or personal hot-spot to connect their computer to the Internet when they need to. The phone charges may be lower than you expect, especially if you call your phone provider and check about new data plan options.</p>
<p>Please forward this to your friends who have students; it can help prevent some big heartaches.</p>
<p>The post <a href="https://fosterinstitute.com/moms-dads-and-friends-take-7-steps-to-secure-your-students-computers/">Moms, Dads, and Friends: Take 7 Steps to Secure Your Students’ Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
