<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IT Pro Tips Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/it-pro-tips/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/it-pro-tips/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Thu, 05 Jun 2025 01:48:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>IT Pro Tips Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/it-pro-tips/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Executives &#8211; Any User Can Accidentally Expose All Your Data Unless IT Changes This Default Setting</title>
		<link>https://fosterinstitute.com/executives-your-employees-might-be-one-click-away-from-exposing-all-sensitive-data-heres-how-to-stop-it/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 04 Jun 2025 21:08:04 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Microsoft Settings]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=6097</guid>

					<description><![CDATA[<p>Your employees might be one click away from exposing all sensitive data. Here&#8217;s how to stop it. We&#8217;re receiving calls from our cybersecurity customers when the IT Team discovers that ordinary users have given third-party applications access to all their organization&#8217;s files, email messages, calendar events, Teams chats and channels, and other data. How can [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/executives-your-employees-might-be-one-click-away-from-exposing-all-sensitive-data-heres-how-to-stop-it/">Executives &#8211; Any User Can Accidentally Expose All Your Data Unless IT Changes This Default Setting</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Your employees might be one click away from exposing all sensitive data. Here&#8217;s how to stop it.</p>
<p>We&#8217;re receiving calls from our cybersecurity customers when the IT Team discovers that ordinary users have given third-party applications access to all their organization&#8217;s files, email messages, calendar events, Teams chats and channels, and other data.</p>
<p>How can ordinary users have that much power?</p>
<p>By default.</p>
<p><strong>Situation:</strong> This configuration affects most companies. While the default settings for your Microsoft 365 system allow your users to approve third-party access, Microsoft recommends the following more restrictive settings to increase security.</p>
<p><strong>The Risk:</strong> Without this setting, workers may override protections without oversight and allow any application to access your company data, create and delete files in SharePoint and OneDrive, read and send email messages, edit calendar events, access and modify Teams chats and channels, update user profile information, and perform other tasks. While some applications might need this level of access, it must be granted only after the appropriate authorities, including your IT Team, thoroughly consider it.</p>
<p><strong>Reality Check:</strong> This setting catches many IT Teams by surprise. Microsoft is updating its security controls quickly, and it is nearly impossible for IT Teams to keep up with the changes. And when defaults promote ease-of-use over security, like this one, your systems can become at risk quickly without the team realizing it. Know that your IT Team&#8217;s level of expertise can be excellent, and situations like this sneak up on them anyway.</p>
<p><strong>Urgent Quick Verification:</strong> Your IT Team can quickly access the Microsoft Entra admin center &gt; Enterprise applications &gt; Consent and permissions &gt; User consent settings. There are three options:</p>
<ul>
<li>&#8220;Do not allow user consent.&#8221;</li>
<li>&#8220;Allow user consent for apps from verified publishers, for selected permissions.&#8221;</li>
<li>&#8220;Allow user consent for all apps&#8221; (the current risky default value)</li>
</ul>
<p><strong>Update If Necessary:</strong> Microsoft recommends you select “Allow user consent for apps from verified publishers, for selected permissions.” Different organizations have different data access needs. Your IT and compliance teams must determine the appropriate level for your situation. Smaller organizations might choose the first option if they don&#8217;t want users to expose data to third-party applications without checking with the IT team. Larger organizations with more complex needs often prefer the middle option with careful permission management to take some of the workload off busy IT professionals while providing protection.</p>
<p><strong>Next Step:</strong> Your Administrators will also need to specify which permissions are low-impact, as detailed in Microsoft&#8217;s article &#8220;Overview of user and admin consent.&#8221;</p>
<p><strong>Facilitate the Approval Process:</strong> Your team can optionally set up an admin consent workflow that users must follow when they want to provide permissions.</p>
<p>Forward this to your friends who are executives at other organizations so they can give their teams this heads-up, too.</p>
<p>The post <a href="https://fosterinstitute.com/executives-your-employees-might-be-one-click-away-from-exposing-all-sensitive-data-heres-how-to-stop-it/">Executives &#8211; Any User Can Accidentally Expose All Your Data Unless IT Changes This Default Setting</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Executives Appreciate it when IT Professionals Communicate Effectively</title>
		<link>https://fosterinstitute.com/executives-appreciate-it-when-it-professionals-communicate-effectively/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 24 Feb 2020 17:31:16 +0000</pubDate>
				<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[IT Discussions]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3029</guid>

					<description><![CDATA[<p>Today, an IT Guru called to gather more information as he prepared to meet with his executives. His methodology was impressive, and executives might want to forward this to your IT professionals. IT professionals want to do a great job of communicating with executives and they welcome guidance for communication. A while ago, the executives [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/executives-appreciate-it-when-it-professionals-communicate-effectively/">Executives Appreciate it when IT Professionals Communicate Effectively</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div>Today, an IT Guru called to gather more information as he prepared to meet with his executives. His methodology was impressive, and executives might want to forward this to your IT professionals. IT professionals want to do a great job of communicating with executives and they welcome guidance for communication.</div>
<div>A while ago, the executives approved IT configuring the firewall to block gambling, job search, and some other website categories from workers. As usual, the workers pushed back.</div>
<p><span id="more-3029"></span></p>
<div>The executives asked the IT team to meet with them. What stands out is how the VP of IT prepared before the meeting. First, he organized a list of pros and cons for the executives before the meeting. He listed substantial risks from unauthorized websites, including security risks, ransomware, credential harvesting from fake login screens, and more. He examined mobile phone records and was able to demonstrate that since they had 1000 mobile devices, and using a total of 25 Gigs of data, they could save 50 per year per device. That adds up to save fifty thousand dollars each year. He wasn&#8217;t advocating blocking, or not to block, the content. He provided the executives with accurate numbers so they can decide.</div>
<div></div>
<p></p>
<div>He pulled service tickets and showed the time expense of blocking, and converted that to a numerical figure of how much money they could save by continuing blocking. He also pulled specific websites that users submitted to have unlocked. That way, the executives could choose what to open up. He printed sixty category choices to review with the decision-makers if they want. Rather than merely stating that blocking unauthorized music and media websites will speed up Internet connectivity, the executives benefit more when IT pulls logging information and provide specific numbers such as 80% of the traffic is unapproved. He offered alternatives to add safety even without blocking, including virtual browsers, to host the user&#8217;s browsing experience in the cloud and keep the traffic entirely off of their computers.</div>
<div></div>
<p></p>
<div>The way he finished the conversation with me was beautiful. He said that he wanted to give the executives the right information so they can make an informed decision. Please forward this to your friends in case they want to share the example with their IT professionals too.</div>
<p></p>
<p>The post <a href="https://fosterinstitute.com/executives-appreciate-it-when-it-professionals-communicate-effectively/">Executives Appreciate it when IT Professionals Communicate Effectively</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else</title>
		<link>https://fosterinstitute.com/the-insanity-of-your-network-storing-keys-in-the-same-place-as-everyone-else/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 10 Sep 2018 16:07:03 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[master passwords]]></category>
		<category><![CDATA[password access]]></category>
		<category><![CDATA[password location]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[safely storing passwords]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2666</guid>

					<description><![CDATA[<p>Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet. You assign your IT team the responsibility to secure and manage the keys to the vehicles, so you give each member of your IT [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/the-insanity-of-your-network-storing-keys-in-the-same-place-as-everyone-else/">The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet.</p>
<p>You assign your IT team <span id="more-2666"></span>the responsibility to secure and manage the keys to the vehicles, so you give each member of your IT team a copy of the master key.</p>
<p>Here is where it gets crazy: Suppose that there is a well-known tradition, in all companies, for IT professionals to store their master keys in the top drawer of their desks. Unfortunately, if someone wants to steal a vehicle, they know right where to find a master key. They can take all the cars once they gain access to the master, and they know exactly where to find it.</p>
<p>In the real world, your IT team has the responsibility to secure and manage your most sensitive data. In doing so, they have the master keys that unlock all the other keys. It is a tradition to give all IT professionals, and even outside consultants, keys to the master lockbox. The shocking part is that all IT professionals are encouraged to store the master keys in the same place, in the default well-known security groups named schema, enterprise, and domain admins.</p>
<p>Your IT team must create new security groups, with different names, in which to store the master keys. It is crucial that the new groups only provide specific privileges to member users on a need to know basis. It is ok if this strategy is new to them.</p>
<p>To measure this, ask your IT professionals to show you what users are members of those default security groups. Discuss moving those users into specific groups that provide the least amount of access they need to perform their work. Depending on the complexity of your system, this may take more time. IT professionals are always busy, so discuss with them their current projects, then prioritize this essential security improvement accordingly.</p>
<p>Storing master keys in a well-known location is absurd, and it is likely that you are doing that now.</p>
<p>The post <a href="https://fosterinstitute.com/the-insanity-of-your-network-storing-keys-in-the-same-place-as-everyone-else/">The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A New Opportunity for Your IT Pros to Protect your Servers</title>
		<link>https://fosterinstitute.com/a-new-opportunity-for-your-it-pros-to-protect-your-servers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 29 Mar 2018 17:12:34 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Attack surface]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pro tips]]></category>
		<category><![CDATA[it professional tips]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[reduce attack surface]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2621</guid>

					<description><![CDATA[<p>Attackers can take advantage of a large attack surface on your servers. Your IT professionals can drastically reduce the attack surface, and potentially save you money. When your IT team logs onto a server, the server’s screen looks similar to what you would experience looking at a Windows workstation’s screen. The display on the server’s [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/a-new-opportunity-for-your-it-pros-to-protect-your-servers/">A New Opportunity for Your IT Pros to Protect your Servers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Attackers can take advantage of a large attack surface on your servers. Your IT professionals can drastically reduce the attack surface, and potentially save you money.<span id="more-2621"></span></p>
<p>When your IT team logs onto a server, the server’s screen looks similar to what you would experience looking at a Windows workstation’s screen. The display on the server’s screen would remind you of your desktop or laptop computer’s screen.</p>
<p>Your IT professionals can remove this desktop experience and produce significant benefits. Your servers need less storage space, are faster, need fewer security patches, and are more reliable. Additionally, there is a smaller attack surface for attackers to exploit. Those benefits will help you, as an executive, sleep better at night.</p>
<p>Your IT team will install the server’s core software, and omit all of the programs that produce the desktop experience.</p>
<p>For your IT team to control and configure the server, they can use a server manager program that runs on their computers. Your IT team might use Windows PowerShell or even Project Honolulu too.</p>
<p>Please forward this message to fellow executives who want to make changes that will help them sleep better at night and, in the future, save money too.</p>
<p>The post <a href="https://fosterinstitute.com/a-new-opportunity-for-your-it-pros-to-protect-your-servers/">A New Opportunity for Your IT Pros to Protect your Servers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Buying a Spare Printer can Vastly Improve Your Cyber Security</title>
		<link>https://fosterinstitute.com/how-buying-a-spare-printer-can-vastly-improve-your-cyber-security/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 16 Feb 2018 17:33:40 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pro tips]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[printer security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2616</guid>

					<description><![CDATA[<p>Imagine a scenario when an IT professional knows there is an urgent security problem in your firewall that needs to be addressed. And at the same time, your multi-function printer is broken. What problem will the IT professional address first? Most IT professionals will, and do, fix the printer first. They care about you and [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/how-buying-a-spare-printer-can-vastly-improve-your-cyber-security/">How Buying a Spare Printer can Vastly Improve Your Cyber Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine a scenario when an IT professional knows there is an urgent security problem in your firewall that needs to be addressed. And at the same time, your multi-function printer is broken. What problem will the IT professional address first?<span id="more-2616"></span></p>
<p>Most IT professionals will, and do, fix the printer first. They care about you and your organization. They want to ensure that your team can serve your customers.</p>
<p>But, postponing the repair to the firewall may significantly increase the risk of your organization experiencing a major cyber attack.</p>
<p>The printer being broken is a visible condition. It is possible that nobody, other than members of your IT team, knows that the firewall is broken.</p>
<p>Your IT team will receive approval for fixing the printer. But, if they spend time fixing the firewall first, everyone will think they are wasting time, sitting around, doing nothing.</p>
<p>What device or activity consumes your IT team&#8217;s time? What do they have to invest a lot of time fixing, when there are perhaps more critical, often invisible, cyber security issues that must be addressed?</p>
<p>If it is the printer that takes up their time, buy a spare printer. If one printer goes down, everyone can use the other printer.</p>
<p>Do what you need to do in order to ensure that your IT team will have time to take care of your IT security. You will reap the benefits if they stop an attack.</p>
<p>The post <a href="https://fosterinstitute.com/how-buying-a-spare-printer-can-vastly-improve-your-cyber-security/">How Buying a Spare Printer can Vastly Improve Your Cyber Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>IT Professionals: 3 Things IT Professionals Must Do to Avoid Being Fired</title>
		<link>https://fosterinstitute.com/it-professionals-3-things-it-professionals-must-do-to-avoid-being-fired/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 28 Nov 2016 17:43:39 +0000</pubDate>
				<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[IT Professionals]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT Job Security]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pro tips]]></category>
		<category><![CDATA[it professional tips]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[IT working with Executives]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2397</guid>

					<description><![CDATA[<p>To keep their job, IT Professionals must do three things. First, IT Professionals need to know that the boss is always right. If the executives say that they do not want to use passwords, then that settles it. Of course, IT Pros should make recommendations, but let the boss decide. IT Pros need to document [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/it-professionals-3-things-it-professionals-must-do-to-avoid-being-fired/">IT Professionals: 3 Things IT Professionals Must Do to Avoid Being Fired</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>To keep their job, IT Professionals must do three things.<span id="more-2397"></span></p>
<p>First, IT Professionals need to know that the boss is always right. If the executives say that they do not want to use passwords, then that settles it. Of course, IT Pros should make recommendations, but let the boss decide. IT Pros need to document the executive’s decisions, especially decisions that go against what the IT Pro feels is best, and move on. They should not bring them up again. If bosses feel unsupported in the decisions they make, the IT Pro will soon be looking for a new job.</p>
<p>Second, bosses get frustrated when they feel a project is moving slower than they believe it should move. It is necessary to keep them up to date on existing projects. Otherwise, the boss may decide to hire someone else that they perceive as being able to bring more value and get things done. IT Pros need to send the boss a monthly, if not weekly, bulleted list of completed, current, and planned projects; even small ones. If the boss even hints that they would like to know more about a project’s progress, the IT Pro needs to jump on reporting that. A verbal conversation is often faster and much more effective than an IT Professional writing and re-writing a long defensive email.</p>
<p>Third, IT Pros need to ask the boss how they can improve their service to the organization. They need to ask how IT fits into the big picture, and ask how they can support the business strategies. They need to listen and do what the boss says to do. They need to have that conversation every month or so. They need to ask themselves what they would want if they were in the boss’s shoes.</p>
<p>Many IT Pros are confident that, and maybe they are, so valuable to an organization that they would never be fired. The only thing that feeling guarantees is that there will be no advance warning to the termination, because the executives of an organization don’t want to risk any kind of retaliation from an IT Professional that feels so indispensable.</p>
<p>Forward this to all IT Professionals that you care about.</p>
<p>The post <a href="https://fosterinstitute.com/it-professionals-3-things-it-professionals-must-do-to-avoid-being-fired/">IT Professionals: 3 Things IT Professionals Must Do to Avoid Being Fired</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Way to Control Consultant Access – Every Time</title>
		<link>https://fosterinstitute.com/a-way-to-control-consultant-access-every-time/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 29 Aug 2016 16:21:24 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[IT Professionals]]></category>
		<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[two set logon]]></category>
		<category><![CDATA[two step login]]></category>
		<category><![CDATA[Consultant Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT Configuration]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pro tips]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Preventative IT Maintenance Cyber]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[two-step logon]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2371</guid>

					<description><![CDATA[<p>What if you’d like to know each and every time a consultant attempted to access your systems? And would you like the ability to approve or deny each attempt? At a client’s office this week, one of the IT Professionals had an interesting idea. He can configure two-step logon to contact him, not the consultant, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/a-way-to-control-consultant-access-every-time/">A Way to Control Consultant Access – Every Time</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>What if you’d like to know each and every time a consultant attempted to access your systems? And would you like the ability to approve or deny each attempt?<span id="more-2371"></span></p>
<p>At a client’s office this week, one of the IT Professionals had an interesting idea. He can configure two-step logon to contact him, not the consultant, for login verification.</p>
<p>If you configure this at your office, here is how it would work: First, the consultant would enter their username and password to login to your network. Then, an app on your smartphone would indicate that the outsourced consultant is trying to gain access.  Then, you will be able to choose to allow or deny the consultant’s login attempt.</p>
<p>This IT Professional wants to know, in real-time, when someone is attempting to log on to his network. If you use this arrangement, you will have the capability to permit them or deny them access each and every time.</p>
<p>It is an interesting idea.</p>
<p>The post <a href="https://fosterinstitute.com/a-way-to-control-consultant-access-every-time/">A Way to Control Consultant Access – Every Time</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How To Know if a Password Attack Succeeded</title>
		<link>https://fosterinstitute.com/how-to-know-if-a-password-attack-succeeded/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 07 Apr 2016 13:00:05 +0000</pubDate>
				<category><![CDATA[Account Lockout Policy]]></category>
		<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[automated attacks]]></category>
		<category><![CDATA[business passwords]]></category>
		<category><![CDATA[company attacks]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Failed Logon]]></category>
		<category><![CDATA[failed logon attempts]]></category>
		<category><![CDATA[Guessing Passwords]]></category>
		<category><![CDATA[Guessing Usernames]]></category>
		<category><![CDATA[hacker attempts]]></category>
		<category><![CDATA[Hacker Success]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pro tips]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Lockout policy]]></category>
		<category><![CDATA[logon fails]]></category>
		<category><![CDATA[monitoring logons]]></category>
		<category><![CDATA[password attack]]></category>
		<category><![CDATA[password attacks]]></category>
		<category><![CDATA[Password lockout]]></category>
		<category><![CDATA[password tries]]></category>
		<category><![CDATA[PW Tries]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[username tries]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2283</guid>

					<description><![CDATA[<p>Last week, you saw an example of a list of passwords that an attacker used to attack a server more than 41,000 times. But the worst part was the server that underwent a short attack… As demonstrated last week, attackers attempt to guess usernames and passwords on systems in an attempt to gain access to [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/how-to-know-if-a-password-attack-succeeded/">How To Know if a Password Attack Succeeded</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Last week, you saw an example of a list of passwords that an attacker used to attack a server more than 41,000 times. But the worst part was the server that underwent a short attack…<span id="more-2283"></span></p>
<p>As demonstrated last week, attackers attempt to guess usernames and passwords on systems in an attempt to gain access to those computers.</p>
<p>The most concerning part, since your network is already under attack, is that one or more of the attempts might have been successful.</p>
<p>Those thousands of unsuccessful login attempts on a computer are, in a way, reassuring because the attacker was having difficulty finding a combination that worked.</p>
<p>The reason that some computers have fewer attack attempts can be because an attacker successfully gained access after a smaller number of guesses.</p>
<p>This is often the case since the attacks are automated so an attacker will not usually get tired of trying. Once one of the tries is successful, then that&#8217;s when the attacker stops guessing usernames and passwords. At that point, they already have access.</p>
<p>Have your internal, or outsourced, IT Pro examine failed logon attempts and see if the usernames seem random like the list published last week. If the usernames are similar to those on that list, then that&#8217;s an indication that an attacker was attempting to gain access. If there are a small number of attempts, then that attacker may have gained access to the computer. </p>
<p>Now that’s concerning.</p>
<p>Please forward this to your friends and associates so that they can be more aware of how to protect the security of their organization.</p>
<p>The post <a href="https://fosterinstitute.com/how-to-know-if-a-password-attack-succeeded/">How To Know if a Password Attack Succeeded</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Are You Paying IT Pros Too Much?</title>
		<link>https://fosterinstitute.com/are-you-paying-it-pros-too-much/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 11 Mar 2016 16:50:01 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Pay]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[IT Professionals]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[IT benefits]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pay]]></category>
		<category><![CDATA[IT pay raise]]></category>
		<category><![CDATA[IT pay scale]]></category>
		<category><![CDATA[IT performance]]></category>
		<category><![CDATA[IT Pro worth]]></category>
		<category><![CDATA[IT professional salary]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[organization security]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2264</guid>

					<description><![CDATA[<p>Are You Paying IT Pros Too Much? IT Professionals have approached me to say they feel unhappy with their compensation. And some executives ask how much is enough pay. There are ways to know… Websites such as Pay Scale dot com, Career Builder dot com, and Salary Expert dot com provide estimated pay ranges based [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/are-you-paying-it-pros-too-much/">Are You Paying IT Pros Too Much?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Are You Paying IT Pros Too Much?</p>
<p>IT Professionals have approached me to say they feel unhappy with their compensation. And some executives ask how much is enough pay. There are ways to know…<span id="more-2264"></span></p>
<p>Websites such as Pay Scale dot com, Career Builder dot com, and Salary Expert dot com provide estimated pay ranges based on location and skills. </p>
<p>Executives: Quality IT Professionals are really difficult to find these days. So you don’t want to lose the ones you have. HR specialists have said that money is not the primary motivation for someone to keep their job, as long as the compensation meets a minimum. Your IT Professionals are likely very loyal to you and will invest a great amount of energy to help you. Just know that they may be receiving job offers from others.</p>
<p>IT Professionals:  Keep up with certifications – those new skills will help your organization too. You enjoy learning or you’d never have selected an IT career anyway. One source of training and certifications is CompTIA dot org. They offer hardware, networking, security project management, and other certifications referred to with names such as A+ Computer Technician, Network+, Security+, etc. Talk to your employer about ways you can become more valuable to them. Some of you are very good about putting the needs of the organization that you serve, before your own needs. Be careful. If you give too much, and feel undercompensated, the resulting unhappiness can be bad for you and the organization too.</p>
<p>The difficulty executives face is not realizing how much a dedicated IT Pro does. When an IT Professional performs a miracle by breathing life back into a crashed server, it is sometimes difficult for non-IT Professionals to appreciate the level of accomplishment. What IT calls a miracle, executives consider the accomplishment as being part of their job description. They have no idea what is, and is not, involved.</p>
<p>Executives, I’m not saying that every IT Professional needs a pay raise. If you are unhappy with your IT Pro, you may be looking forward to when another company hires them away. In fact, if you aren’t happy with their performance, there is no reason to keep them around. They do, as many executives have said, hold the keys to your kingdom. Or, as I like to say it, they have their fingers on the jugular vein of your company. Do not let them hold you hostage with that power, and don’t be worried about kicking them out if you need to. </p>
<p>But if your IT Professional is someone who you like, and appreciate, and you can see that they are good at what they do, keep in mind that good IT Professionals are a hot commodity these days. </p>
<p>The post <a href="https://fosterinstitute.com/are-you-paying-it-pros-too-much/">Are You Paying IT Pros Too Much?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Your IT Pros Deserve This</title>
		<link>https://fosterinstitute.com/your-it-pros-deserve-this/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 03 Nov 2015 15:00:37 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[IT Professionals]]></category>
		<category><![CDATA[IT Training]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[Working with IT]]></category>
		<category><![CDATA[DEF CON]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2197</guid>

					<description><![CDATA[<p>Give your IT Professionals an edge, and show your appreciation of them at the same time. Mark these dates on the calendar: 8/5/2016    Fri       DEF CON® 8/6/2016    Sat       DEF CON® 8/7/2016    Sun      DEF CON® 8/8/2016   Mon     SuperTech 2016 8/9/2016    Tue      SuperTech 2016 8/10/2016  Wed    SuperTech 2016 DEF CON® is the famous security and hacking convention in [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/your-it-pros-deserve-this/">Your IT Pros Deserve This</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Give your IT Professionals an edge, and show your appreciation of them at the same time. <span id="more-2197"></span></p>
<p>Mark these dates on the calendar:</p>
<p>8/5/2016    Fri       DEF CON®<br />
8/6/2016    Sat       DEF CON®<br />
8/7/2016    Sun      DEF CON®<br />
8/8/2016   Mon     SuperTech 2016<br />
8/9/2016    Tue      SuperTech 2016<br />
8/10/2016  Wed    SuperTech 2016</p>
<p>DEF CON® is the famous security and hacking convention in Las Vegas. This is an exciting event for all IT Pros.</p>
<p>The Foster Institute &#8220;SuperTech&#8221; experience in Napa Valley empowers your IT Professionals to grow in ways that will propel your organization’s success to new levels.</p>
<p>Invest in your IT Pros – sometimes their future is your future.</p>
<p>IT Pros give so much energy, long hours, and are dedicated to the success of your organization. They show patience with end-users.</p>
<p>Reward them with this awesome experience in return. They&#8217;ll look forward to it all year!</p>
<p>Forward this to other executives who want to show more appreciation to their IT Professionals too. It is a win-win for your organization.</p>
<p>Save the dates. They&#8217;re the only ones until 2017.</p>
<p>The post <a href="https://fosterinstitute.com/your-it-pros-deserve-this/">Your IT Pros Deserve This</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
