<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IT Settings Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/it-settings/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/it-settings/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Thu, 05 Jun 2025 01:48:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>IT Settings Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/it-settings/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Executives &#8211; Any User Can Accidentally Expose All Your Data Unless IT Changes This Default Setting</title>
		<link>https://fosterinstitute.com/executives-your-employees-might-be-one-click-away-from-exposing-all-sensitive-data-heres-how-to-stop-it/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 04 Jun 2025 21:08:04 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Microsoft Settings]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=6097</guid>

					<description><![CDATA[<p>Your employees might be one click away from exposing all sensitive data. Here&#8217;s how to stop it. We&#8217;re receiving calls from our cybersecurity customers when the IT Team discovers that ordinary users have given third-party applications access to all their organization&#8217;s files, email messages, calendar events, Teams chats and channels, and other data. How can [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/executives-your-employees-might-be-one-click-away-from-exposing-all-sensitive-data-heres-how-to-stop-it/">Executives &#8211; Any User Can Accidentally Expose All Your Data Unless IT Changes This Default Setting</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Your employees might be one click away from exposing all sensitive data. Here&#8217;s how to stop it.</p>
<p>We&#8217;re receiving calls from our cybersecurity customers when the IT Team discovers that ordinary users have given third-party applications access to all their organization&#8217;s files, email messages, calendar events, Teams chats and channels, and other data.</p>
<p>How can ordinary users have that much power?</p>
<p>By default.</p>
<p><strong>Situation:</strong> This configuration affects most companies. While the default settings for your Microsoft 365 system allow your users to approve third-party access, Microsoft recommends the following more restrictive settings to increase security.</p>
<p><strong>The Risk:</strong> Without this setting, workers may override protections without oversight and allow any application to access your company data, create and delete files in SharePoint and OneDrive, read and send email messages, edit calendar events, access and modify Teams chats and channels, update user profile information, and perform other tasks. While some applications might need this level of access, it must be granted only after the appropriate authorities, including your IT Team, thoroughly consider it.</p>
<p><strong>Reality Check:</strong> This setting catches many IT Teams by surprise. Microsoft is updating its security controls quickly, and it is nearly impossible for IT Teams to keep up with the changes. And when defaults promote ease-of-use over security, like this one, your systems can become at risk quickly without the team realizing it. Know that your IT Team&#8217;s level of expertise can be excellent, and situations like this sneak up on them anyway.</p>
<p><strong>Urgent Quick Verification:</strong> Your IT Team can quickly access the Microsoft Entra admin center &gt; Enterprise applications &gt; Consent and permissions &gt; User consent settings. There are three options:</p>
<ul>
<li>&#8220;Do not allow user consent.&#8221;</li>
<li>&#8220;Allow user consent for apps from verified publishers, for selected permissions.&#8221;</li>
<li>&#8220;Allow user consent for all apps&#8221; (the current risky default value)</li>
</ul>
<p><strong>Update If Necessary:</strong> Microsoft recommends you select “Allow user consent for apps from verified publishers, for selected permissions.” Different organizations have different data access needs. Your IT and compliance teams must determine the appropriate level for your situation. Smaller organizations might choose the first option if they don&#8217;t want users to expose data to third-party applications without checking with the IT team. Larger organizations with more complex needs often prefer the middle option with careful permission management to take some of the workload off busy IT professionals while providing protection.</p>
<p><strong>Next Step:</strong> Your Administrators will also need to specify which permissions are low-impact, as detailed in Microsoft&#8217;s article &#8220;Overview of user and admin consent.&#8221;</p>
<p><strong>Facilitate the Approval Process:</strong> Your team can optionally set up an admin consent workflow that users must follow when they want to provide permissions.</p>
<p>Forward this to your friends who are executives at other organizations so they can give their teams this heads-up, too.</p>
<p>The post <a href="https://fosterinstitute.com/executives-your-employees-might-be-one-click-away-from-exposing-all-sensitive-data-heres-how-to-stop-it/">Executives &#8211; Any User Can Accidentally Expose All Your Data Unless IT Changes This Default Setting</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Safeguard Your Apple iPhones and iPads: Activate the Latest Theft Protection Setting Now!</title>
		<link>https://fosterinstitute.com/safeguard-your-apple-iphones-and-ipads-activate-the-latest-theft-protection-setting-now/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sun, 28 Jan 2024 03:46:40 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Technology Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5714</guid>

					<description><![CDATA[<p>Imagine this: You&#8217;re waiting for a friend, texting them on your iPhone, unaware that a thief is watching you enter your passcode. Moments later, your phone is stolen. In an instant, your Apple life, including Apple Pay, Keychain passwords, and family photos, is at risk. To combat this, Apple&#8217;s iOS 17.3 introduces “Stolen Device Protection”. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/safeguard-your-apple-iphones-and-ipads-activate-the-latest-theft-protection-setting-now/">Safeguard Your Apple iPhones and iPads: Activate the Latest Theft Protection Setting Now!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine this: You&#8217;re waiting for a friend, texting them on your iPhone, unaware that a thief is watching you enter your passcode. Moments later, your phone is stolen. In an instant, your Apple life, including Apple Pay, Keychain passwords, and family photos, is at risk.</p>
<p>To combat this, Apple&#8217;s iOS 17.3 introduces “Stolen Device Protection”. Here’s why activating it is crucial:</p>
<ol>
<li><strong>Face ID/Touch ID Requirement</strong>: Your iPhone will require your Face ID or Touch ID to turn off lost mode or erase the phone.</li>
<li><strong>Time-Delay Security</strong>: Changes to your Apple ID password, iPhone passcode, and key settings now have a one-hour delay.</li>
</ol>
<p><strong>Settings for Theft Protection</strong>:</p>
<ul>
<li>Quick Tip to find specific settings: Open Settings, swipe down slightly, and <strong>use the search box that appears at the top</strong>. You will find all of the settings in <strong>bold</strong> text by searching in Settings:</li>
<li><strong>Software Update</strong>: iOS 17.3 enables Stolen Device Protection.*</li>
<li><strong>Backup</strong>: Check your backup status by searching for <strong>Backup</strong> in Settings.</li>
<li>Use <strong>Face ID</strong> or <strong>Touch ID </strong>so potential thieves won&#8217;t see you enter your passcode.</li>
<li>Activate <strong>Stolen Device Protection</strong>:This is the new setting that spurred me to write this blog for you<strong><br />
</strong></li>
<li>Ensure &#8220;<strong>Find My</strong>&#8221; is enabled on Apple devices. Use iCloud.com/find or the Find My app to be sure tracking works.</li>
</ul>
<p><strong>Other Essential Steps:</strong></p>
<ul>
<li>Have alternate login methods for resetting passwords for apps and websites that use multi-factor and two-step logins.</li>
<li>If you use authentication apps, ensure you configure ways to generate codes or recover keys if you lose or erase your phone.</li>
</ul>
<p><strong>If Your Phone is Stolen</strong>:</p>
<ul>
<li>Act Fast: Use <strong>iCloud.com/find</strong> or the Find My app to enable “lost mode” and track your phone.</li>
<li>Consider Carrier Notification: They can disable phone calls and cellular data but might limit Find My functionality.</li>
<li>Device Erasure: If you have backups, and ways to recover keys in authentication apps, use Find My to erase your device to help prevent data access.</li>
<li>Password Resets: If not erasing your phone, consider resetting passwords for critical accounts if passwords are stored on the phone or if apps login automatically.</li>
</ul>
<p>As always, threat actors will seek ways to bypass this protection. As of now, this feature is a huge leap forward to protect an iPhone and iPad from thieves who see the passcode. Congratulations, and thank you, Apple!</p>
<p>*If your phone or tablet is too old to update to iOS version 17.3 or newer, see <a href="https://fosterinstitute.com/be-prepared-know-the-impact-of-iphone-theft-and-what-to-do-right-now/." target="_blank" rel="noopener">https://fosterinstitute.com/be-prepared-know-the-impact-of-iphone-theft-and-what-to-do-right-now/.</a> for recommendations.</p>
<p>Note: Testing the Stolen Device Protection feature at home may not work, as Apple devices might waive the strict requirements in familiar locations like home or work. You can read all of the details about Apple Stolen Device Protection for iPhone here: <a href="https://support.apple.com/en-us/HT212510" target="_blank" rel="noopener">https://support.apple.com/en-us/HT212510</a></p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h6></h6>
<h6></h6>
<h6></h6>
<h6>Disclaimer: The information provided in this blog is for general informational purposes only. Technology changes constantly, and some of this information might become obsolete or incorrect. We do not endorse or receive compensation for mentioning products, services, or brand names. Any outbound links provided are for your convenience and to get you started, but we cannot guarantee the security or safety of those external websites. Conducting your research and making an informed decision about any products or services mentioned here is essential. We shall not be held responsible for any actions taken based on the information provided.</h6>
<p>The post <a href="https://fosterinstitute.com/safeguard-your-apple-iphones-and-ipads-activate-the-latest-theft-protection-setting-now/">Safeguard Your Apple iPhones and iPads: Activate the Latest Theft Protection Setting Now!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Way to Control Consultant Access – Every Time</title>
		<link>https://fosterinstitute.com/a-way-to-control-consultant-access-every-time/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 29 Aug 2016 16:21:24 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[IT Professionals]]></category>
		<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[two set logon]]></category>
		<category><![CDATA[two step login]]></category>
		<category><![CDATA[Consultant Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT Configuration]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pro tips]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Preventative IT Maintenance Cyber]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[two-step logon]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2371</guid>

					<description><![CDATA[<p>What if you’d like to know each and every time a consultant attempted to access your systems? And would you like the ability to approve or deny each attempt? At a client’s office this week, one of the IT Professionals had an interesting idea. He can configure two-step logon to contact him, not the consultant, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/a-way-to-control-consultant-access-every-time/">A Way to Control Consultant Access – Every Time</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>What if you’d like to know each and every time a consultant attempted to access your systems? And would you like the ability to approve or deny each attempt?<span id="more-2371"></span></p>
<p>At a client’s office this week, one of the IT Professionals had an interesting idea. He can configure two-step logon to contact him, not the consultant, for login verification.</p>
<p>If you configure this at your office, here is how it would work: First, the consultant would enter their username and password to login to your network. Then, an app on your smartphone would indicate that the outsourced consultant is trying to gain access.  Then, you will be able to choose to allow or deny the consultant’s login attempt.</p>
<p>This IT Professional wants to know, in real-time, when someone is attempting to log on to his network. If you use this arrangement, you will have the capability to permit them or deny them access each and every time.</p>
<p>It is an interesting idea.</p>
<p>The post <a href="https://fosterinstitute.com/a-way-to-control-consultant-access-every-time/">A Way to Control Consultant Access – Every Time</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Microsoft Using Your Computer To Deliver Software</title>
		<link>https://fosterinstitute.com/microsoft-using-your-computer-to-deliver-software/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 31 Aug 2015 16:00:17 +0000</pubDate>
				<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[hotspot safety]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Microsoft Settings]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Delivery Optimization]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2144</guid>

					<description><![CDATA[<p>Microsoft built a feature into Windows 10 called Delivery Optimization. Your computer may deliver and receive apps and patches to and from computers belonging to complete strangers. Your computer becomes a server to deliver patches and apps to people on the Internet. Though it is likely enabled on your computers, you can turn this feature [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/microsoft-using-your-computer-to-deliver-software/">Microsoft Using Your Computer To Deliver Software</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Microsoft built a feature into Windows 10 called Delivery Optimization. Your computer may deliver and receive apps and patches to and from computers belonging to complete strangers. Your computer becomes a server to deliver patches and apps to people on the Internet. Though it is likely enabled on your computers, you can turn this feature off. <span id="more-2144"></span></p>
<p>Microsoft presents the feature to users saying, “Download apps and OS updates from multiple sources to get them more quickly&#8221;.</p>
<p>Think about it and it sort of makes sense. Rather than every computer on the planet having to go to Microsoft’s servers to download patches and apps, Windows 10 computers can reach out to other Windows 10 computers and obtain the patch from them. This helps prevent Microsoft’s servers from becoming overloaded, and can allow your computer to receive patches and apps sooner. Ultimately, this can even reduce the amount of traffic flowing on the Internet in general.</p>
<p>Microsoft has built in strong security – though security can be broken. </p>
<p>Microsoft does their best not to use your computer to deliver patches if you are connected to the Internet using a mobile hotspot – helping you avoid unexpected data charges. You can also specify what Wi-Fi connections are charged as metered networks.</p>
<p>One concern is that, if your computer is being used to deliver updates, your Internet connection may slow down. Or, perhaps you don’t want your computer to be, what some users may feel is, a zombie for Microsoft to use as part of their patch delivery mechanism.</p>
<p>How to turn this feature off in Windows 10: Go to the Start button icon, choose Settings > Update &#038; Security > Windows Update > Advanced Options. You can choose to not participate, or to select either PCs on your local network only, or PCs on your local network and PCs on the Internet” </p>
<p>Please help spread the word and forward this newsletter on to those you care about! </p>
<p>The post <a href="https://fosterinstitute.com/microsoft-using-your-computer-to-deliver-software/">Microsoft Using Your Computer To Deliver Software</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Lenovo Computers Infected</title>
		<link>https://fosterinstitute.com/lenovo-computers-infected/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 20 Feb 2015 21:09:16 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Lenova]]></category>
		<category><![CDATA[Lenova Breach]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Superfish]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Uninstall Superfish]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2061</guid>

					<description><![CDATA[<p>Urgent bulletin: Lenovo pre-installed software called SuperFish on computers that is a security risk. This is just another example of why it is so important to remove the junk-ware from new computers. Follow these instructions from Lenovo: http://support.lenovo.com/us/en/product_security/superfish_uninstall Please forward this to anyone you know who might have purchased a Lenovo computer – laptops included.</p>
<p>The post <a href="https://fosterinstitute.com/lenovo-computers-infected/">Lenovo Computers Infected</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Urgent bulletin: Lenovo pre-installed software called SuperFish on computers that is a security risk. This is just another example of why it is so important to remove the junk-ware from new computers. Follow these instructions from Lenovo: <a title="http://support.lenovo.com/us/en/product_security/superfish_uninstall" href="http://support.lenovo.com/us/en/product_security/superfish_uninstall">http://support.lenovo.com/us/en/product_security/superfish_uninstall</a></p>
<p>Please forward this to anyone you know who might have purchased a Lenovo computer – laptops included.</p>
<p>The post <a href="https://fosterinstitute.com/lenovo-computers-infected/">Lenovo Computers Infected</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Possible Solution for Ransomware</title>
		<link>https://fosterinstitute.com/a-possible-solution-for-ransomware/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 23 Jan 2015 17:11:33 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2032</guid>

					<description><![CDATA[<p>Ransomware is hitting so many companies hard. If you’ve not heard of it, you will soon. Ransomware is an infection that encrypts files on your network such that you cannot access the files. This can be devastating. The best way to deal with ransomware is… To restore from a recent backup. Be sure to remove [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/a-possible-solution-for-ransomware/">A Possible Solution for Ransomware</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Ransomware is hitting so many companies hard. If you’ve not heard of it, you will soon. Ransomware is an infection that encrypts files on your network such that you cannot access the files. This can be devastating. The best way to deal with ransomware is…<span id="more-2032"></span></p>
<p>To restore from a recent backup. Be sure to remove the infection prior to restoring your data.</p>
<p>If you discover you cannot restore  your files to a satisfactory level, there is an online tool designed to help you obtain the  key to unlock your files. The tool  is here: <a href="https://www.decryptcryptolocker.com/">https://www.decryptcryptolocker.com/</a>. I’ve not vetted the tool, nor am I suggesting that you use it. If you are in a situation where you feel you have no other option, you may want to give it a try. The tool is created and maintained by some very reputable security companies: Fire Eye and Fox-IT.</p>
<p>Be safe – avoid getting infected with Ransomware by practicing excellent IT security – even at home. </p>
<p>Be sure to test your backups to be sure you can restore if you need to!</p>
<p>Please post your comments below&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/a-possible-solution-for-ransomware/">A Possible Solution for Ransomware</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Get Attacked in a Flash</title>
		<link>https://fosterinstitute.com/get-attacked-in-a-flash/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 14 Jan 2015 17:32:53 +0000</pubDate>
				<category><![CDATA[Adobe]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[Adobe Flash]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[IT updates]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2029</guid>

					<description><![CDATA[<p>Adobe Flash is one of the programs that attackers love to exploit. Be sure you have the newest version – Adobe just released important patches… Visit, or be sure your IT Pro visits, Adobe Flash Player to see what version of flash is installed. The page shows what version is installed on your browser, and [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/get-attacked-in-a-flash/">Get Attacked in a Flash</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Adobe Flash is one of the programs that attackers love to exploit. Be sure you have the newest version – Adobe just released important patches…<span id="more-2029"></span></p>
<p>Visit, or be sure your IT Pro visits, <a href="https://www.adobe.com/software/flash/about/">Adobe Flash Player</a> to see what version of flash is installed. The page shows what version is installed on your browser, and shows the most recent version. Visit that site in each of your browsers to be sure they all have the latest version of Flash. </p>
<p>Thank you for helping keep the world a safer place to work and live!</p>
<p>Please post your comments below&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/get-attacked-in-a-flash/">Get Attacked in a Flash</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Know About this IT Networking Strategy Change</title>
		<link>https://fosterinstitute.com/know-about-this-it-networking-strategy-change/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 18 Aug 2014 06:00:26 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Network]]></category>
		<category><![CDATA[IT Professionals]]></category>
		<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[Working with IT]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network safety]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[Managing IT Professionals]]></category>
		<category><![CDATA[security awareness training]]></category>
		<category><![CDATA[Working With IT People]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1953</guid>

					<description><![CDATA[<p>Executives – There is a new strategy to consider moving toward that can save you money, increase security, speed up your networks and help you get ahead of your competition. What should you do about your Cisco stocks? Even the WSJ is talking about… SDN: Software Defined Networking. This new technology is a sweeping change [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/know-about-this-it-networking-strategy-change/">Know About this IT Networking Strategy Change</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Executives – There is a new strategy to consider moving toward that can save you money, increase security, speed up your networks and help you get ahead of your competition. What should you do about your Cisco stocks? Even the WSJ is talking about… <span id="more-1953"></span></p>
<p>SDN: Software Defined Networking. This new technology is a sweeping change that organizations, such as yours, need to consider as a future direction. It is game changing and so simple.</p>
<p>You’ll save money, alleviate a lot of networking issues, increase security, and more.</p>
<p>At the very least, suggest that your IT professional, professionals, and/or third party firm look into this technology. </p>
<p>If you want to learn more, here is a short story intended to introduce the technology in plain English: </p>
<p>Meet the star of the story: Paul the pilot. He flies the newest passenger jets of your favorite airline.</p>
<p>Now, you become a part of the story. Imagine you paying an IT Professional to build a modern airport for your company using the latest technology. Think of Atlanta, DFW, Chicago, or the airport of your choice. The IT Pro creates a network of runways and taxiways for you.</p>
<p>When Paul lands safely at your airport, like at all airports, he uses the runways and taxiways to travel a dot-to-dot path from the runway to the terminal. </p>
<p>The way things work now: Imagine taking all the air-traffic controllers and placing them at intersections around the airport’s field. Then take away everybody’s radios and add fog so thick that nobody can see each other. There is your network! A disaster that is happening! </p>
<p>With this system, imagine this: A plane lands and then, at the end of the runway, there<br />
is an aircraft controller standing on the runway that asks, “Where are you headed?” </p>
<p>Paul steps on the brakes, rolls down the cockpit window and says, “I need to get to Gate 23.” The controller has to think for a moment, then points to one of the taxiways and says, “Drive your plane that way!” Paul does as instructed.</p>
<p>After scooting down the taxiway for a while, Paul encounters another air traffic controller who reviews a table of best routes, and then points Paul towards the next step of the journey. This goes on, through all the intersections along the route, all the way to the terminal. Paul just cannot help it; he starts humming, “Do you know the way to SJO… (San Jose in the Caribbean)</p>
<p>Now think of dozens and dozens of aircraft moving along the taxiways and runways, slamming on the brakes, honking the airplane horns, traffic jams, and the inevitable crashes. No way, San Jose. </p>
<p>In this analogy, the airplanes represent packets of data. Imagine that Paul the pilot comes from (the) cloud, into your (network of) runways and taxiways, and eventually arrives at a (computer) terminal. In a similar fashion, he can leave the terminal, travel your network, and go back into the cloud, or at least into your file server. </p>
<p>Companies such as Cisco, D-Link, HP, Juniper, NETGEAR, etc. design, build, and sell these traffic controllers. Those switches and routers are expensive because each one has to be intelligent enough to know where next to send each data packet. They have to have good memories in order to remember where to route airplanes for best results. In addition, they are usually uncoordinated with the other devices on your network.</p>
<p>When a user connects to your network with their computer, an iPhone, or some other device, their information travels through your network cables of taxiways and runways to and from your servers, other computers, and the Internet cloud.  </p>
<p>With this existing system, when someone starts listening to Internet music for peace of mind, it bogs down the whole network. Nobody notices the hacker or virus that is methodically looking for holes in your security by peeking into every computer on your network. </p>
<p>To top it all off, you pay lots of money for this archaic system! Drawbacks of this system, the one you use now, abound.</p>
<p>This is the happy conclusion: You, all the wiser after reading this story, tell your IT Pro to investigate the implementation of SDN: Software Defined Networking. </p>
<p>Then your wise IT Pro will move all the traffic controllers to a control tower, lift the fog so it is a bright sunny day, and provide radio communications so everybody can function as a team. Teamwork between your network devices is like striking oil! Synergy that is. </p>
<p>The key to all of this is the controller. The controller watches the traffic and tells the devices on the network what to do.  Every step of the way, there is a signal that tells Paul where to steer next. </p>
<p>Faster &#8211; If Paul is carrying lots of music, then because music uses a great deal of data, he is directed to a special taxiway for music.</p>
<p>Prioritize Data &#8211; If a passenger is not feeling well, Paul gets priority and is expedited to the gate to provide a high quality of service (QOS). </p>
<p>Security &#8211; If there is an unruly passenger aboard, called a hi-hacker, Paul is directed to pull over so that the local S.W.A.T. team can storm the plane. </p>
<p>Save Money – Cisco, and other vendors may not like it, but your switches and routers<br />
become inexpensive because they no longer have to be “intelligent.” They are generic, can be any brand, just as long as they listen to the controller.</p>
<p>Coordination – the seventh habit of successful people! Your devices now listen to an intelligent controller that has a clear view of all of the planes in the airport and can make things work right. </p>
<p>From an IT Pro point of view, this is perhaps oversimplified, but for an executive – I hope you found this very useful for understanding the next step in networking technology – and why you need to be planning for Software Defined Networking.</p>
<p>If you want to speak a little Geek, tell your IT Pros, who may already know all about this:  The data pathways (the runways and taxiways) make up the Data Plane. The controller communication travels on the Control Plane using a protocol such as OpenFlow to send out instructions to the Forwarding Plane that contains routing information. </p>
<p>Moreover, all of those signals travel across the regular network connections that are in place now.</p>
<p>Are your IT Pros are aware of the emerging technology called Software Defined Networking?</p>
<p>Please post your comments below&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/know-about-this-it-networking-strategy-change/">Know About this IT Networking Strategy Change</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Use Windows 7 with Windows 8’s Benefits</title>
		<link>https://fosterinstitute.com/use-windows-7-with-windows-8s-benefits/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 16 Apr 2014 15:43:59 +0000</pubDate>
				<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[it audit]]></category>
		<category><![CDATA[it help]]></category>
		<category><![CDATA[IT productivity]]></category>
		<category><![CDATA[it professional tips]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it upgrade]]></category>
		<category><![CDATA[windows 7]]></category>
		<category><![CDATA[windows 8]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1884</guid>

					<description><![CDATA[<p>As businesses transition to Windows 8, they don&#8217;t want to train their user in Windows 8. Here is a short 90 second video that shows the secret about how you can give Windows 7 all the great new stability, security, and speed that Windows 8 has to offer. The secret is to use Windows 8 [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/use-windows-7-with-windows-8s-benefits/">Use Windows 7 with Windows 8’s Benefits</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As businesses transition to Windows 8, they don&#8217;t want to train their user in Windows 8. Here is a short 90 second video that shows the secret about how you can give Windows 7 all the great new stability, security, and speed that Windows 8 has to offer.<span id="more-1884"></span></p>
<p>The secret is to use Windows 8 but make it look like you are using Windows 7. Everybody’s happy, you have the huge power, speed, and security of Windows 8. Maybe nobody will ever know you upgraded.</p>
<p><iframe width="560" height="315" src="//www.youtube.com/embed/yqHNV2Dsing" frameborder="0" allowfullscreen></iframe></p>
<p>Be sure to have your IT pro go into that “tiled interface” one time, right-click the programs you want to use, and choose “pin to taskbar.”</p>
<p>Remember to ask your IT Pro to start by upgrading one computer to Windows 8, iron out any bugs – and there may be no bugs, and then your IT Pro can upgrade the rest of your machines.</p>
<p>Use this tip to reduce the resistance your users may have about moving from Windows 7 to Windows 8.</p>
<p>Please post your comments below&#8230;</p>
<p style="text-align: left;">
<p>The post <a href="https://fosterinstitute.com/use-windows-7-with-windows-8s-benefits/">Use Windows 7 with Windows 8’s Benefits</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Adding Security Makes Systems Unusable!</title>
		<link>https://fosterinstitute.com/adding-security-makes-systems-unusable/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 20 Feb 2014 06:00:34 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[IT network safety]]></category>
		<category><![CDATA[IT productivity]]></category>
		<category><![CDATA[Managing IT Professionals]]></category>
		<category><![CDATA[passwords]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1826</guid>

					<description><![CDATA[<p>Ask your IT Professional: “Are you implementing the protections that users won’t notice anyway?&#8221; … The reality is that you can have, contrary to what some people believe, both security and productivity at the same time. Enforcing security policies that dictate strong passwords is a common problem and sometimes results in, understandably, executives responding something [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/adding-security-makes-systems-unusable/">Adding Security Makes Systems Unusable!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Ask your IT Professional: “Are you implementing the protections that users won’t notice anyway?&#8221; …<span id="more-1826"></span></p>
<p>The reality is that you can have, contrary to what some people believe, both security and productivity at the same time.</p>
<p>Enforcing security policies that dictate strong passwords is a common problem and sometimes results in, understandably, executives responding something like, “That will make our salespeople angry and we can’t afford to slow down their workflow!  Let’s leave the passwords restrictions the way they are.”  As a result, some companies still allow two letter passwords that never have to be changed. Attackers love that!</p>
<p>The IT professionals are right about security being important. But the executives “have the final say.”</p>
<p>Sometimes the key is to discuss changes with the executives that meet two criteria:  First, the change will improve security, and second, the users may not even notice the change.</p>
<p>Here’s a common problem: Putting productivity too far ahead of security such that security gets nearly wiped out.</p>
<p>Password restrictions are a change that most users will notice. Hence, IT professionals may receive a great deal of push-back from users, including executives if the password restrictions have been lax for a long time.</p>
<p>However, users will never notice many, in fact the majority, of security settings.  An example may be, as long as your users aren’t  used to installing their own programs (which is a bad idea anyway), is making users “just plain users” on their own machine rather than having, (the most common way), users being something called “local administrators.”</p>
<p>That modification alone can make enormous improvements in security because it is more difficult for attackers to “trick users into installing viruses on their machines” since users can’t install anything on their machines anyway. And maybe the users won’t notice anyway.</p>
<p>The real issue: It is your role to talk with your IT professionals and ask them, “Are you implementing the protections that users won’t notice anyway?”.</p>
<p>Stay tuned for more about “What to ask your IT Professionals” so that you know the right questions to ask.</p>
<p>Please forward this to your friends and post your comments below…</p>
<p>The post <a href="https://fosterinstitute.com/adding-security-makes-systems-unusable/">Adding Security Makes Systems Unusable!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
