<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Mobile Devices Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/mobile-devices/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/mobile-devices/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Thu, 01 Feb 2024 23:31:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Mobile Devices Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/mobile-devices/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Consequences of Infrastructure Disruptions: A Realistic Assessment for Business Leaders</title>
		<link>https://fosterinstitute.com/consequences-of-infrastructure-disruptions-a-realistic-assessment-for-business-leaders/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 01 Feb 2024 23:27:15 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[Workplace Safety]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5730</guid>

					<description><![CDATA[<p>This article outlines some realistic consequences of major infrastructure disruptions and provides insights into how these might affect business functionality and employee well-being. By understanding these possibilities, leaders can better strategize and fortify their businesses against unforeseen disruptions, ensuring resilience and continuity. &#160; Considerations for Workplace Operations Loss of Electricity: Without power, most businesses would [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/consequences-of-infrastructure-disruptions-a-realistic-assessment-for-business-leaders/">Consequences of Infrastructure Disruptions: A Realistic Assessment for Business Leaders</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This article outlines some realistic consequences of major infrastructure disruptions and provides insights into how these might affect business functionality and employee well-being. By understanding these possibilities, leaders can better strategize and fortify their businesses against unforeseen disruptions, ensuring resilience and continuity.</p>
<h3></h3>
<p>&nbsp;</p>
<h3><strong>Considerations for Workplace Operations</strong></h3>
<p><strong>Loss of Electricity:</strong> Without power, most businesses would experience an immediate halt in operations. This affects everything from lighting to the operation of computers and machinery. Companies that do not have backup power sources might be unable to continue any form of production or service delivery.</p>
<p><strong>Water Supply Disruption:</strong> The loss of water would impact sanitary conditions and halt processes that require water, affecting sectors like manufacturing, food and beverage, and healthcare services. It also raises serious concerns for employee welfare at workplaces.</p>
<p><strong>Natural Gas Outage:</strong> For companies relying on natural gas for heating or as a part of their production process, a disruption would halt operations and affect the heating and comfort of work environments, especially in colder climates.</p>
<p><strong>Communication Breakdown:</strong> The loss of phone and cell services would severely disrupt communication, both internally among staff and externally with clients, suppliers, and partners. This could lead to breakdowns in coordination, missed opportunities, and a drop in customer service quality.</p>
<p><strong>Shipping and Logistics Challenges:</strong> The inability of shipping companies to operate would disrupt supply chains, leading to shortages of materials and products. This would cascade, causing production delays and potentially leading to financial losses.</p>
<p><strong>Food Service Disruptions:</strong> If restaurants and food services cannot operate, it could affect food availability for employees, especially for businesses that rely on nearby food services for staff meals.</p>
<p><strong>Manufacturing Disruptions:</strong> Manufacturing operations would be severely impacted, especially those reliant on continuous processes. This could lead to significant financial losses and contractual penalties.</p>
<p><strong>Financial Impact:</strong> The cumulative effect of these disruptions would be substantial financial losses due to halted operations, spoiled goods, contractual penalties, and loss of business opportunities.</p>
<p><strong>Unusable Work Environment:</strong> Inability to see or work due to power outages, coupled with extreme hot or cold conditions, would affect productivity.</p>
<p><strong>Employee Safety and Morale:</strong> The safety and morale of employees would be significantly affected. Companies may face challenges in maintaining workforce engagement and productivity during such crises.</p>
<p><strong>Employee Prioritization of Family Needs:</strong> With schools closing and potential dangers at home, employees would naturally prioritize the safety and well-being of their families. This would result in increased absenteeism and a significant decrease in workforce availability.</p>
<p><strong>Dependency on External Aid:</strong> Companies would be heavily reliant on external assistance, whether from government aid, emergency services, or community support, to navigate through the crisis.</p>
<p><strong>Long-Term Recovery Challenges:</strong> Even after services are restored, businesses would face challenges in resuming operations, managing backlogs, and dealing with the financial and operational aftermath.</p>
<p>&nbsp;</p>
<h3><strong>Challenges You and Your Employees May Face in Personal Life</strong></h3>
<p>And just as important, how will you support your workers as they face the challenges at home with their immediate and extended families? How will you take care of your family? Here are some of the challenges that company leaders can consider to help employee well-being:</p>
<p><strong>Food Supply Issues:</strong> The lack of electricity would lead to food spoilage at stores and homes, creating a food scarcity crisis. Companies should consider ways to support their employees with necessities in such scenarios.</p>
<p><strong>Cooking and Sanitation Challenges:</strong> Without electricity or gas, cooking would become a significant challenge. Lack of water would also impact basic sanitation, including dishwashing and toilet flushing.</p>
<p><strong>Automobile Fuel Shortage:</strong> Fuel pumps would cease to function without electricity, leading to a fuel shortage. This would impact employees&#8217; ability to commute, further reducing workforce availability and potentially halting any operations involving transportation. Work from home is not an option when Internet connections are down.</p>
<p><strong>Increase in Crime:</strong> A breakdown in public services could lead to increased theft and other crimes, as law enforcement may be overstretched or focused on their own families&#8217; safety. Companies must enhance their security measures to protect their assets and personnel.</p>
<p><strong>Hygiene and Health Concerns:</strong> The lack of water and proper sanitation facilities could lead to hygiene issues and the spread of diseases. This would have a direct impact on employee health and absenteeism.</p>
<p><strong>Inadequate Healthcare Services:</strong> Healthcare facilities might be overwhelmed or incapacitated, limiting access to medical services. This could exacerbate health issues among employees and their families.</p>
<p><strong>Payment and Transaction Challenges:</strong> With credit card machines down, transactions must be conducted in cash, a medium that might become scarce. This would affect both personal transactions and business operations.</p>
<p><strong>Lack of Resilience and Knowledge:</strong> Most people are accustomed to modern infrastructure and might not be resilient to such a drastic change. This could lead to widespread panic and confusion, affecting mental health and the ability to cope with the situation.</p>
<p><strong>Influx of Refugees:</strong> Should your area maintain functional infrastructure, expect an influx of refugees from impacted zones. This could stretch your community&#8217;s resources thinner, intensifying issues like food scarcity, healthcare access, and public safety.</p>
<p>&nbsp;</p>
<h3><strong>Steps to Take:</strong></h3>
<p>Be sure to see the article about ways to make your organization more resilient <a href="https://fosterinstitute.com/executive-guide-to-navigating-power-internet-and-infrastructure-disruptions/" target="_blank" rel="noopener">https://fosterinstitute.com/executive-guide-to-navigating-power-internet-and-infrastructure-disruptions/</a></p>
<h3></h3>
<h3><strong>Conclusion:</strong></h3>
<p>The ramifications of a disruption in a nation&#8217;s infrastructure extend far beyond the workplace, affecting every aspect of employees&#8217; lives and, by extension, the overall resilience of the business. Leaders must, therefore, not only focus on fortifying their operational infrastructures but also invest in strategies that support their workforce in times of crisis.</p>
<h3></h3>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>The post <a href="https://fosterinstitute.com/consequences-of-infrastructure-disruptions-a-realistic-assessment-for-business-leaders/">Consequences of Infrastructure Disruptions: A Realistic Assessment for Business Leaders</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Executive Guide to Navigating Power, Internet, and Infrastructure Disruptions</title>
		<link>https://fosterinstitute.com/executive-guide-to-navigating-power-internet-and-infrastructure-disruptions/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 01 Feb 2024 22:16:45 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[Workplace Safety]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5727</guid>

					<description><![CDATA[<p>It&#8217;s imperative for business leaders to consider how their companies can remain resilient during possible disruptions of their country’s infrastructure for utilities. Expand your disaster recovery and business continuity plans to include: Envisioning the Business Impact: Understanding the potential consequences of an infrastructure attack is critical. This includes being aware of how a loss of [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/executive-guide-to-navigating-power-internet-and-infrastructure-disruptions/">Executive Guide to Navigating Power, Internet, and Infrastructure Disruptions</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It&#8217;s imperative for business leaders to consider how their companies can remain resilient during possible disruptions of their country’s infrastructure for utilities. Expand your disaster recovery and business continuity plans to include:</p>
<p><strong>Envisioning the Business Impact</strong>: Understanding the potential consequences of an infrastructure attack is critical. This includes being aware of how a loss of electricity or water supply, communication breakdowns, or disruptions in shipping and logistics can impact your business. It’s not about anticipating doom; it&#8217;s about recognizing and planning for possible business interruptions.</p>
<p><strong>Interrupted Cloud Connectivity</strong>: In this digital age, many companies have transitioned to cloud-based operations. It&#8217;s crucial to acknowledge that while cloud services offer tremendous benefits, they also present unique challenges, especially in scenarios of power failures and internet outages. Be sure your business continuity and disaster recovery plans consider periods of limited or no access to cloud services, including critical functions like email.</p>
<p><strong>Emergency Communication Plan</strong>: Diversification in communication methods is key. Developing a plan that extends beyond digital and cellular networks can ensure continuous operations. Alternatives like two-way radios, messengers, and satellite phones for key personnel are not just about crisis management, but about maintaining uninterrupted communication channels under various circumstances.</p>
<p><strong>Financial Resilience</strong>: Financial strategies that encompass scenarios like cash-based transactions and alternative payroll methods demonstrate foresight in financial planning. It&#8217;s about ensuring that your business remains operational and your employees are taken care of, regardless of the situation.</p>
<p><strong>Supply Chain Resilience:</strong> In the face of fuel shortages and electricity disruptions, rethinking your supply chain is vital. Local sourcing can reduce dependence on long-distance transport, while increasing buffer stocks of key materials ensures consistent supply flow. Adapting to manual or low-tech inventory management maintains operational continuity when digital systems fail. This strategy is not just about responding to crises; it&#8217;s about proactively creating a robust and flexible supply network for any situation.</p>
<p><strong>Employee Support and Training</strong>: In any challenging situation, the well-being of your workforce is paramount. Educating employees on fundamental resilience skills and establishing support systems for essentials like food and water are not only about disaster readiness but also about nurturing a strong and supportive corporate culture.</p>
<p><strong>Regular Drills and Plan Updates</strong>: Engaging in routine exercises to test and update disaster recovery plans is not just about remaining resilient in worst-case scenarios. It&#8217;s about ensuring that your team is ready and efficient in any form of business interruption, maintaining agility and responsiveness.</p>
<p><strong>Supporting Employees in Crisis</strong>: In any significant disruption, employees will prioritize their families&#8217; needs. Acknowledging and planning for this – through support in food supply, healthcare, and security – is an integral part of maintaining a resilient workforce. The support you provide will encourage employees to remain engaged and productive at your organization during challenging times.</p>
<p><strong>Conclusion:</strong></p>
<p>This article offers essential insights to help your business thrive amidst a wide spectrum of operational challenges. Please forward this to your friends so they can increase their organization’s resilience too.</p>
<p><strong>Comprehensive List of What to Expect:</strong></p>
<p><a href="https://fosterinstitute.com/consequences-of-infrastructure-disruptions-a-realistic-assessment-for-business-leaders/" target="_blank" rel="noopener">https://fosterinstitute.com/consequences-of-infrastructure-disruptions-a-realistic-assessment-for-business-leaders/</a></p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/executive-guide-to-navigating-power-internet-and-infrastructure-disruptions/">Executive Guide to Navigating Power, Internet, and Infrastructure Disruptions</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Safeguard Your Apple iPhones and iPads: Activate the Latest Theft Protection Setting Now!</title>
		<link>https://fosterinstitute.com/safeguard-your-apple-iphones-and-ipads-activate-the-latest-theft-protection-setting-now/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sun, 28 Jan 2024 03:46:40 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Technology Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5714</guid>

					<description><![CDATA[<p>Imagine this: You&#8217;re waiting for a friend, texting them on your iPhone, unaware that a thief is watching you enter your passcode. Moments later, your phone is stolen. In an instant, your Apple life, including Apple Pay, Keychain passwords, and family photos, is at risk. To combat this, Apple&#8217;s iOS 17.3 introduces “Stolen Device Protection”. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/safeguard-your-apple-iphones-and-ipads-activate-the-latest-theft-protection-setting-now/">Safeguard Your Apple iPhones and iPads: Activate the Latest Theft Protection Setting Now!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine this: You&#8217;re waiting for a friend, texting them on your iPhone, unaware that a thief is watching you enter your passcode. Moments later, your phone is stolen. In an instant, your Apple life, including Apple Pay, Keychain passwords, and family photos, is at risk.</p>
<p>To combat this, Apple&#8217;s iOS 17.3 introduces “Stolen Device Protection”. Here’s why activating it is crucial:</p>
<ol>
<li><strong>Face ID/Touch ID Requirement</strong>: Your iPhone will require your Face ID or Touch ID to turn off lost mode or erase the phone.</li>
<li><strong>Time-Delay Security</strong>: Changes to your Apple ID password, iPhone passcode, and key settings now have a one-hour delay.</li>
</ol>
<p><strong>Settings for Theft Protection</strong>:</p>
<ul>
<li>Quick Tip to find specific settings: Open Settings, swipe down slightly, and <strong>use the search box that appears at the top</strong>. You will find all of the settings in <strong>bold</strong> text by searching in Settings:</li>
<li><strong>Software Update</strong>: iOS 17.3 enables Stolen Device Protection.*</li>
<li><strong>Backup</strong>: Check your backup status by searching for <strong>Backup</strong> in Settings.</li>
<li>Use <strong>Face ID</strong> or <strong>Touch ID </strong>so potential thieves won&#8217;t see you enter your passcode.</li>
<li>Activate <strong>Stolen Device Protection</strong>:This is the new setting that spurred me to write this blog for you<strong><br />
</strong></li>
<li>Ensure &#8220;<strong>Find My</strong>&#8221; is enabled on Apple devices. Use iCloud.com/find or the Find My app to be sure tracking works.</li>
</ul>
<p><strong>Other Essential Steps:</strong></p>
<ul>
<li>Have alternate login methods for resetting passwords for apps and websites that use multi-factor and two-step logins.</li>
<li>If you use authentication apps, ensure you configure ways to generate codes or recover keys if you lose or erase your phone.</li>
</ul>
<p><strong>If Your Phone is Stolen</strong>:</p>
<ul>
<li>Act Fast: Use <strong>iCloud.com/find</strong> or the Find My app to enable “lost mode” and track your phone.</li>
<li>Consider Carrier Notification: They can disable phone calls and cellular data but might limit Find My functionality.</li>
<li>Device Erasure: If you have backups, and ways to recover keys in authentication apps, use Find My to erase your device to help prevent data access.</li>
<li>Password Resets: If not erasing your phone, consider resetting passwords for critical accounts if passwords are stored on the phone or if apps login automatically.</li>
</ul>
<p>As always, threat actors will seek ways to bypass this protection. As of now, this feature is a huge leap forward to protect an iPhone and iPad from thieves who see the passcode. Congratulations, and thank you, Apple!</p>
<p>*If your phone or tablet is too old to update to iOS version 17.3 or newer, see <a href="https://fosterinstitute.com/be-prepared-know-the-impact-of-iphone-theft-and-what-to-do-right-now/." target="_blank" rel="noopener">https://fosterinstitute.com/be-prepared-know-the-impact-of-iphone-theft-and-what-to-do-right-now/.</a> for recommendations.</p>
<p>Note: Testing the Stolen Device Protection feature at home may not work, as Apple devices might waive the strict requirements in familiar locations like home or work. You can read all of the details about Apple Stolen Device Protection for iPhone here: <a href="https://support.apple.com/en-us/HT212510" target="_blank" rel="noopener">https://support.apple.com/en-us/HT212510</a></p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h6></h6>
<h6></h6>
<h6></h6>
<h6>Disclaimer: The information provided in this blog is for general informational purposes only. Technology changes constantly, and some of this information might become obsolete or incorrect. We do not endorse or receive compensation for mentioning products, services, or brand names. Any outbound links provided are for your convenience and to get you started, but we cannot guarantee the security or safety of those external websites. Conducting your research and making an informed decision about any products or services mentioned here is essential. We shall not be held responsible for any actions taken based on the information provided.</h6>
<p>The post <a href="https://fosterinstitute.com/safeguard-your-apple-iphones-and-ipads-activate-the-latest-theft-protection-setting-now/">Safeguard Your Apple iPhones and iPads: Activate the Latest Theft Protection Setting Now!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>One Way to Identify Dangerous Text Message Scams</title>
		<link>https://fosterinstitute.com/one-way-to-identify-dangerous-text-message-scams/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 28 Oct 2021 22:10:49 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=4982</guid>

					<description><![CDATA[<p>If you haven&#8217;t already, you will receive text messages that entice you to respond. Some of the messages contain links that can infect your phone with spyware and other malicious programs. Before you click a link, follow instructions, or consider believing a text message, look at the sender&#8217;s phone number. Major organizations do not text [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/one-way-to-identify-dangerous-text-message-scams/">One Way to Identify Dangerous Text Message Scams</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>If you haven&#8217;t already, you will receive text messages that entice you to respond. Some of the messages contain links that can infect your phone with spyware and other malicious programs.</p>



<p>Before you click a link, follow instructions, or consider believing a text message, look at the sender&#8217;s phone number.</p>



<p>Major organizations do not text you from a phone number; they use an SMS Short Code. The code is five to eight digits long and is much more difficult for attackers to spoof.</p>



<p>See if you can figure out which of these messages is fake:</p>



<p>Sender: 59569<br>Thank you for joining Target Circle! Reply STOP to unsubscribe</p>



<p>Sender: 26096<br>Use verification code 908197 for Microsoft Authentication</p>



<p>Sender: 754-555-1279<br>Your credit card is suspended due to fraudulent activity. Proceed immediately to HTTPS://…</p>



<p>Sender: 14105550009<br>Did you claim your gift from ATT? Hurry up! HTTP://…</p>



<p>You&#8217;re right. The third and fourth messages are fake, and less aware users who follow the link are likely to experience a cybersecurity event they might not recognize. Attackers could install malware that will spy on their phone, download contact lists, record conversations, and more. The link could take them to a fake login screen for their bank. The screen will look perfectly accurate and ask them to reset their password. The trusting phone owner will enter their old password when prompted. They might install an app that can attempt to access the smart devices in their home to gather personal information. You get the idea.</p>



<p>Please forward this to your friends so that they can keep an eye out for the SMS Short Codes and know those are more difficult for attackers to spoof. They&#8217;ll know to be suspicious of messages that claim to be a major organization but come from what looks like a phone number.</p>
<p>The post <a href="https://fosterinstitute.com/one-way-to-identify-dangerous-text-message-scams/">One Way to Identify Dangerous Text Message Scams</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>1 Million Android User Accounts Reported Hacked</title>
		<link>https://fosterinstitute.com/1-million-android-user-accounts-reported-hacked/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 01 Dec 2016 17:32:02 +0000</pubDate>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Application Updates]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Infected Apps]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Patch Release]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[Android Hacked]]></category>
		<category><![CDATA[Android Phones]]></category>
		<category><![CDATA[App Security]]></category>
		<category><![CDATA[blackberry]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Google Accounts Hacked]]></category>
		<category><![CDATA[Gooligan Code]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Malicious Apps]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Patches]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2401</guid>

					<description><![CDATA[<p>It was reported yesterday that malicious apps running on Android phones has resulted in 1 million Google user accounts being hacked. Check Point Software Technologies estimates that 75% of Android phones are still vulnerable to this attack. Once the attackers take over the phone, they can then gain access to the user&#8217;s Google accounts. Often [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/1-million-android-user-accounts-reported-hacked/">1 Million Android User Accounts Reported Hacked</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It was reported yesterday that malicious apps running on Android phones has resulted in 1 million Google user accounts being hacked. Check Point Software Technologies estimates that 75% of Android phones are still vulnerable to this attack. Once the attackers take over the phone, they can then gain access to the user&#8217;s Google accounts. Often the best way to steal data from a mobile device is <span id="more-2401"></span>to simply steal data and images stored in a user&#8217;s account. That applies to all brands, not just Android.</p>
<p>A big problem is that security patches that protect against these kinds of breaches never reach users&#8217; Android devices because of something known as Android fragmentation. When Google releases security patches, the patches are sent to device manufacturers, who are then responsible for releasing the patches for their different models. Some do not release the patches, or do so after a long delay.</p>
<p>Google is taking steps to help mitigate the problem, such as scanning phones and apps to look for Gooligan code and forcing resets of credentials to Google accounts. But so far that hasn&#8217;t been enough to protect those million users that have had their accounts hacked.</p>
<p>So, what can you do? Always stay up to date with the latest Android versions and patches. Choose a brand that has a track record for releasing patches every 30 days. Blackberry is one of those brands, but few people use those devices. If 30 days is too long to wait, consider using the Google Pixel line of Android phones since, because Google makes the devices, patches and upgrades should be available for download immediately upon release. Note: Brand names are mentioned to provide value to you. We do not receive any kind of compensation for mentioning brands.  Another strategy is to install as few apps as possible on your device. Each app is a potential security issue and many people have installed apps that they realize are not essential, and some apps are rarely, if ever used.</p>
<p>Please forward this to anyone you know that uses Android devices and would like to be more secure.</p>
<p>The post <a href="https://fosterinstitute.com/1-million-android-user-accounts-reported-hacked/">1 Million Android User Accounts Reported Hacked</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>iPhone and iPad Hacking Alert</title>
		<link>https://fosterinstitute.com/iphone-and-ipad-hacking-alert/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 28 Sep 2015 14:40:54 +0000</pubDate>
				<category><![CDATA[Adobe]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple Virus]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Infected Apps]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Apple apps]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[infected apps]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[PDF reader virus]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Winzip virus]]></category>
		<category><![CDATA[XcodeGhost]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2153</guid>

					<description><![CDATA[<p>You may have heard by now about XcodeGhost and how it is the biggest infection for Apple yet. Hackers inserted malicious code into a tool that programmers use to develop Apps for the App store. What should you do now? First of all: Don&#8217;t panic. Apple is removing the infected apps from the App Store. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/iphone-and-ipad-hacking-alert/">iPhone and iPad Hacking Alert</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You may have heard by now about XcodeGhost and how it is the biggest infection for Apple yet. Hackers inserted malicious code into a tool that programmers use to develop Apps for the App store. What should you do now? <span id="more-2153"></span></p>
<p>First of all: Don&#8217;t panic. </p>
<p>Apple is removing the infected apps from the App Store. </p>
<p>If you receive an email about XcodeGhost, even if it appears to be from Apple themselves, be wary. If there are any links in the email message, or if there are any attachments, do not click the links or open any attachments. You may be infected by attackers who are taking advantage of frightened users.</p>
<p>Online lists of infected apps includes a PDF Reader app, WinZip, and card scanner applications. More apps are being discovered as the investigations continue. </p>
<p>If you want to find more information, enter this search into Google:  XcodeGhost site:apple.com</p>
<p>Finally, and most importantly, raise your awareness that all devices are susceptible to attacks. It doesn&#8217;t matter what manufacturer, what platform, what operating system, or whether it is a phone, tablet, laptop, or desktop. We are living in a different kind of world now. Some people on the planet, very brilliant people, have different ethics and morals than you do. </p>
<p>Keep using good security habits!</p>
<p>The post <a href="https://fosterinstitute.com/iphone-and-ipad-hacking-alert/">iPhone and iPad Hacking Alert</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>New Big Screen iPhone</title>
		<link>https://fosterinstitute.com/new-big-screen-iphone/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 22 Jul 2014 15:46:46 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Big Screen iphone]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[apple iphone]]></category>
		<category><![CDATA[big screen iphone]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[new iphone]]></category>
		<category><![CDATA[security awareness training]]></category>
		<category><![CDATA[technology tips]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1933</guid>

					<description><![CDATA[<p>The iPhone 6 will have options for both the normal screen size as well as a new, larger, 5.5 inch screen. It is doubtful that they will be shipping for months, and Apple hasn’t made an official announcement – but one might come as early as today. Discussing this with a chief executive last week, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/new-big-screen-iphone/">New Big Screen iPhone</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The iPhone 6 will have options for both the normal screen size as well as a new, larger, 5.5 inch screen. It is doubtful that they will be shipping for months, and Apple hasn’t made an official announcement – but one might come as early as today. <span id="more-1933"></span></p>
<p>Discussing this with a chief executive last week, he expressed that his phone needs to be able to fit into his pocket in order for the phone to be useful. That makes a lot of sense.<br />
In my experience, temporarily switching to a larger phone with a six-inch screen, just as an experiment, became permanent. With big fingers, and eyesight affected by experiencing more and more birthdays, the larger screen is a wonderful thing!</p>
<p>Perhaps with perfect timing, that phone fell on the ground last night and the screen cracked. Moments later, I ordered a replacement despite the scratches caused to my left ear. If the new iPhone 6 with the larger screen were already shipping, it would have been very tempting to order it instead.</p>
<p>If you choose to purchase an iPhone 6, will you opt for the new larger screen or prefer to stick with the normal screen? And why?</p>
<p>The post <a href="https://fosterinstitute.com/new-big-screen-iphone/">New Big Screen iPhone</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fire Phone at Work</title>
		<link>https://fosterinstitute.com/fire-phone-at-work/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 19 Jun 2014 16:10:54 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Fire Phone]]></category>
		<category><![CDATA[IT Professionals]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Save time]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[amazon]]></category>
		<category><![CDATA[amazon fire phone]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[fire phone]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[mobile devices]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[Relating to IT Professionals]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1922</guid>

					<description><![CDATA[<p>Amazon just announced the new Amazon Fire phone. The first thing I wanted to know was about BYOD (Bring Your Own Device) features. How will your business utilize this great new device? The news is good… The Fire Phone, scheduled to be available the end of July from AT&#038;T, tracks your face for “sort of [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/fire-phone-at-work/">Fire Phone at Work</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Amazon just announced the new Amazon Fire phone. The first thing I wanted to know was about BYOD (Bring Your Own Device) features. How will your business utilize this great new device? The news is good…<span id="more-1922"></span></p>
<p>The Fire Phone, scheduled to be available the end of July from AT&#038;T, tracks your face for “sort of 3D,” sports an amazing camera, can recognize almost everything it sees or hears, but what about features for your company?</p>
<p>You will have the ability to view MS Word, Excel, and PowerPoint files. The phone provides Outlook and uses your Exchange server for messages, contacts, calendar, tasks, etc. The device supports encryption and is supposed to support VPN connectivity soon. Then, of course, there are so many apps available in Amazon’s own Fire Phone Apps in Amazon’s store. See details by googling: &#8220;Fire Phone for Work site:amazon.com” or click here: <a href="http://www.amazon.com/gp/feature.html?ie=UTF8&#038;docId=1002658251" title="Fire Phone for Work">Fire Phone for Work</a></p>
<p>For IT Pros, they will be happy that the phone supports their ability to remote-wipe a lost or stolen phone and control the installation of applications. A notable tool is <a href="https://whispercast.amazon.com/" title="Amazon's Whispercast">Amazon’s Whispercast</a>.  </p>
<p>Whispercast is a stable platform that schools and businesses use already. It provides an easy interface for your IT professionals to manage these devices including limiting Wi-Fi connectivity and provide content restriction (such as blocking access to social media sites). IT Pros can configure users into “groups,” with each group receiving different content and restrictions. </p>
<p>Soon other MDM (Mobile Device Management) tools will add robust features that your IT Pros need in order to enhance security and productivity for devices using your network.</p>
<p>Is there a Fire Phone in your future? Can your IT manage the BYOD features? At least you know it can “do business.”</p>
<p>Please post your comments below&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/fire-phone-at-work/">Fire Phone at Work</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Two Reasons Why Microsoft Phones are Better than Apple Phones</title>
		<link>https://fosterinstitute.com/two-reasons-why-microsoft-phones-are-better-than-apple-phones/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 02 Jan 2014 06:00:30 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[apple]]></category>
		<category><![CDATA[iphones]]></category>
		<category><![CDATA[windows phones]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1777</guid>

					<description><![CDATA[<p>And these are two reasons Microsoft doesn’t even advertise… After months of using the Windows Phone as an experiment, I saw no compelling reason to stay with the Windows Phone. So I moved back to an iPhone 5S and was shocked to realize how much better the Windows Phone really is. Voice quality is much [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/two-reasons-why-microsoft-phones-are-better-than-apple-phones/">Two Reasons Why Microsoft Phones are Better than Apple Phones</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>And these are two reasons Microsoft doesn’t even advertise…<span id="more-1777"></span></p>
<p>After months of using the Windows Phone as an experiment, I saw no compelling reason to stay with the Windows Phone. So I moved back to an iPhone 5S and was shocked to realize how much better the Windows Phone really is. Voice quality is much better for one thing. </p>
<p>The first big improvement: Selecting text</p>
<p>Copy and paste are two very important functions for people who like to move paragraphs. Some people like to pull information from web sites and other email messages into a new email (or text) message.</p>
<p>When &#8220;Select All&#8221; includes text you don&#8217;t want, have you ever tried to use an iPhone to select specific text in order to copy and paste? Success can be hit-and-miss, especially for text close to the edge of the screen. The Windows phone provides a significantly better experience. Granted, I have comparatively big fingers. My wife is much more adept at using the tiny touch screen. </p>
<p>Even if you never copy and paste, consider the second biggest improvement:  Auto-correct</p>
<p>When typing an email message on an iPhone, when the iPhone is supposedly “correcting” your typos, you have to click the little x to tell Apple to leave your word alone the way you typed it. That can mean &#8220;one more click&#8221; per word. Extra clicks just slow you down.</p>
<p>Except for the most obvious typos, the Windows phone actually leaves your text as you typed it. It provides options from which you can choose if you realize you made a typo. </p>
<p>It seems to learn complete sentences that you&#8217;ve used before and makes &#8220;next word&#8221; suggestions accordingly.</p>
<p>In summary, the improved &#8220;copy and paste&#8221; and better auto-correct will be enough reason for some people to switch to a Windows Phone.</p>
<p>Thank goodness for the 14 day testing period. I traded the 5S right back in for an upgraded Windows Phone. The 6-inch screen and processing power of the Lumina 1520 are impressive.</p>
<p>Please post your comments below&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/two-reasons-why-microsoft-phones-are-better-than-apple-phones/">Two Reasons Why Microsoft Phones are Better than Apple Phones</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Apple is Silly for Not Offering Touch Screens</title>
		<link>https://fosterinstitute.com/apple-is-idiotic-for-not-offering-touch-screens/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 13 Dec 2013 17:20:49 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[laptops]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1754</guid>

					<description><![CDATA[<p>Here is something I don&#8217;t understand: Apple still doesn&#8217;t have touch screen monitors! I&#8217;ve owned three MacBook Air computers and have loved them all. I bought the Airs because they are compact to carry, are very powerful, lightweight, durable, and really nice looking. Apple iPhones and iPads have touch screens that we all love. We’ve [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/apple-is-idiotic-for-not-offering-touch-screens/">Apple is Silly for Not Offering Touch Screens</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Here is something I don&#8217;t understand: Apple still doesn&#8217;t have touch screen monitors!</p>
<p>I&#8217;ve owned three MacBook Air computers and have loved them all. I bought the Airs because they are compact to carry, are very powerful, lightweight, durable, and really nice looking. </p>
<p>Apple iPhones and iPads have touch screens that we all love. We’ve become a touch-centric world, and Apple has driven that transition perhaps more than anyone.</p>
<p>The post <a href="https://fosterinstitute.com/apple-is-idiotic-for-not-offering-touch-screens/">Apple is Silly for Not Offering Touch Screens</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
