<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Password Safety Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/password-safety/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/password-safety/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Wed, 17 Dec 2025 02:35:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Password Safety Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/password-safety/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Six Essential AI Safety Practices for Leaders</title>
		<link>https://fosterinstitute.com/six-essential-ai-safety-practices-for-leaders/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 17 Dec 2025 02:35:38 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Safety]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=6164</guid>

					<description><![CDATA[<p>Six Essential AI Safety Practices for Leaders As organizations increasingly adopt AI tools, it&#8217;s crucial to implement basic safety measures to help maintain your competitive advantage, prevent costly breaches, and preserve client trust. But there are so many considerations, where do you start? Here are six essential AI safety tips every leader should follow: 1. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/six-essential-ai-safety-practices-for-leaders/">Six Essential AI Safety Practices for Leaders</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3>Six Essential AI Safety Practices for Leaders</h3>
<p>As organizations increasingly adopt AI tools, it&#8217;s crucial to implement basic safety measures to help maintain your competitive advantage, prevent costly breaches, and preserve client trust. But there are so many considerations, where do you start? Here are six essential AI safety tips every leader should follow:</p>
<h3>1. Choose Which AI Tools You Will Trust with Your Data</h3>
<p>There are third-party tools that offer features such as recording and summarizing meeting notes, ingesting all your data to augment their responses, and more.</p>
<p>Review their privacy policies before you use the tools. If it states the tool and company keep your information private, but then explains they share data with third parties over whom the provider has limited control, treat the tool as having no meaningful privacy protections.</p>
<p>Sharing sensitive information such as your customers’ information, business practices, or anything else you want to protect, with third parties can be concerning, as it could go anywhere those third parties want to share it.</p>
<p>That&#8217;s why some organizations stick with the primary chatbots that are under more scrutiny. But don’t give up on the third-party tools; some of them can be very useful. Just be sure to weigh the risks of sensitive data exposure vs. the benefits.</p>
<h3>2. Clear Your Chat Histories Periodically</h3>
<p>Chat histories are very useful for going back and picking up conversations where you left off, potentially weeks or even months later. The reality is, even with a search function, it can be difficult to go back and find a specific chat when you have too many to look through.</p>
<p>The reason to remove old chats is so that a threat actor cannot read them if they break in with your login information or another way. If you don’t need the old chats, remove them.</p>
<p>Some chatbots state that they will remove your chats 30 days after you delete them. Because they can change frequently, always check the current policy for all tools.</p>
<p>Some enterprise subscriptions to chatbots permit your IT department to set policies to automatically delete all chats older than the number of days you specify.</p>
<h3>3. Disable Automatic Sharing of Meeting Notes</h3>
<p>Meeting notes are unreliable until a human edits and finalizes them.</p>
<p>If you&#8217;ve used AI at all, you&#8217;re familiar with the term hallucination. Participants in the meeting know the context of the meeting; AI must attempt to figure that out. AI tools are often designed to estimate and present the most likely meaning of conversations, even when they&#8217;re not certain.</p>
<p>If you have a meeting where people use a lot of words like &#8220;it,&#8221; &#8220;they,&#8221; &#8220;that,&#8221; &#8220;thing,&#8221; and so on, AI sometimes guesses what they mean, and it might get everything so wrong that the summary is inaccurate. Sometimes it can get the meaning in the notes that&#8217;s exactly opposite of what was really discussed.</p>
<p>A key step is to disable the automatic sharing of meeting notes after the meeting finishes. The meeting notes must always be reviewed by a human, preferably you, so you can correct any mistakes in the meeting summary before sending them out. There may be people who make decisions, important ones, based on the meeting summary. Meetings contain tasks assigned and accepted, status of decisions, and other key information, so it&#8217;s essential to confirm the accuracy of the summaries.</p>
<p>Some organizations have elected to completely omit recording meetings to protect the privacy of the meeting and prevent inaccurate summaries from leaving their organization. If they do have AI make notes, they think twice before sending them to someone outside the organization. If meeting notes or a summary contain misinformation that leaks, you have no control of information already sent.</p>
<h3>4. Anonymize Member or Client Information When You Give Information to AI</h3>
<p>For example, if you&#8217;re creating a sensitive email to someone who&#8217;s upset, you might substitute a fictitious name for the person&#8217;s real name and the organization’s name, just in case there&#8217;s an information leak. Anonymization can be very simple: just use the word &#8220;Jim&#8221; where you would normally use &#8220;Tom.&#8221; This one&#8217;s up to you, but some people sleep better at night knowing they didn&#8217;t put their customer&#8217;s actual name into the AI tool.</p>
<p>Then, after you finish tuning up your correspondence, before you send out that message or that document, you simply do a find-and-replace to restore the names of the person and the company to their correct names. And you&#8217;re doing that outside of the AI tool.</p>
<p>Many people forgo anonymization most of the time because it adds two extra steps, but they use it in special cases. Keep in mind that changing people’s and organizations’ names might still not be enough to anonymize the discussion if you enter a unique event, location, project name, or another bit of context that ties back to the actual person or organization.</p>
<h3>5. Disable the AI Model&#8217;s Training Features in the Settings</h3>
<p>The most common concern I hear from business executives is that their organization’s sensitive information will leak into the public domain. The term “training” describes a large language model learning from your chats. If you provide information such as a customer list and the training or learning is disabled, the chatbot should not remember your sensitive information or share it with another user at another company, unbeknownst to you, anywhere on the planet.</p>
<p>Most chatbots allow you to disable learning or training based on the information you enter, and sometimes the training setting is “off” by default.</p>
<p>Disabling training typically means your data is not used to improve the public AI model. There is no guarantee that data isn’t stored, reviewed by a human, or exposed through a security incident.</p>
<h3>6. Always Use Strong Passwords and Multi-Factor Authentication on All of Your AI Accounts</h3>
<p>If a stranger or other unauthorized party were able to log in to your chatbot account, they could read all your saved chats and learn a lot about you and your organization. They can craft fraudulent email messages so accurately that you or members of your team would fall for them without hesitation. Threat actors could also use your chatbot in unethical ways that would appear to be you. You could get locked out of your account for misbehavior. Another risk is that threat actors are designing tailored prompts that cause chatbots to bypass their alignment boundaries. Furthermore, attackers can use compromised chatbot accounts as a trusted pathway into systems and data. Just as you benefit from AI’s power, the attackers can use your AI’s power against you.</p>
<p>As with any website or service, use the strongest sign-in protection the chatbot supports. Using a password alone is considered insufficient authentication protection. Passwordless multi-factor authentication is usually the strongest option available and relies on your phone, fingerprint, facial recognition, a physical USB key, or another method that doesn’t require entering a password but still has more than one factor.</p>
<p>If the login doesn’t support passwordless login, using an authenticator app on your phone with number matching is sometimes the next best option.</p>
<p>If an authenticator is not available, use a text or email message as your second factor. It is far better than having no multi-factor authentication.</p>
<p>Always remember that authentication protection, no matter how advanced, is not immune to threat actors using techniques to bypass MFA. Always be wary of unexpected login prompts, as they may be attempts by a threat actor to gain access through you.</p>
<h3>Conclusion</h3>
<p>Those are some basic AI safety tips for leaders. These are all very simple to accomplish, and there&#8217;s a good chance you&#8217;re already doing most or all of them. Please forward this to your friends so that they can make sure they&#8217;re following these steps too.</p>
<h3 style="margin-bottom: 15px;">About the Author</h3>
<p style="margin-bottom: 10px;"><strong>Mike Foster, CISSP®, CISA®</strong><br />
Cybersecurity Consultant and Keynote Speaker<br />
📞 805-637-7039<br />
📧 mike@fosterinstitute.com<br />
🌐 www.fosterinstitute.com</p>
<p style="margin-bottom: 15px;">Mike Foster is a leading cybersecurity consultant with decades of experience helping organizations across North America secure their digital assets. He holds CISSP® and CISA® certifications and is the author of The Secure CEO. As the founder of The Foster Institute, Michael has delivered over 1,500 keynote presentations and consulting engagements, equipping executives and IT leaders to strengthen their cybersecurity posture and defend against evolving threats.</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/six-essential-ai-safety-practices-for-leaders/">Six Essential AI Safety Practices for Leaders</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MFA Fatigue: The Hidden Danger and How to Combat It</title>
		<link>https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 28 Apr 2023 17:50:21 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5443</guid>

					<description><![CDATA[<p>Benefits you will experience with the upgrade from Chat GPT-3.5 to Chat GPT-4 include:</p>
<p>The post <a href="https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/">MFA Fatigue: The Hidden Danger and How to Combat It</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Attackers notoriously figure out users’ passwords; hence, organizations and individuals must make logging in more secure.</p>
<p>Logins often go like this:<br />
1. User enters a password<br />
2. The user receives a text message with a code to confirm it is them</p>
<p>That second step is called MFA (Multi-Factor Authentication).</p>
<p>Entering numbers is frustrating, so some organizations use push notifications:<br />
1. User enters a password<br />
2. The user has an authenticator app asking, “Is that you trying to log in?” The user can click “Yes,” and they’re in. If it is an attacker, the user can ignore the alert or click “no.”</p>
<p>Attackers are overwhelmingly bypassing push notification protection. Here&#8217;s how: Once the bad guys obtain the user’s password, they make frequent attempts to log in, sending many alerts to the targeted user’s phone. The user is annoyed by the interruptions. Sometimes, users click &#8220;approve&#8221; to stop the annoyance. They don’t realize they are allowing an attacker into the system. <strong>This phenomenon is known as MFA fatigue.</strong></p>
<p>If you use push notifications, ensure that your push notifications require the user to enter at least two digits displayed on the device where they entered the password rather than simply pressing the approve button in their phone app. This verification helps prove the user has the device. The process becomes:<br />
1. The user enters a password on the device they’re logging into.<br />
2. The user has an authenticator app asking them, “What code is your device displaying?” The user enters the code, and they’re logged in.</p>
<p>Microsoft calls the process “Number Matching.” Duo calls it “Verified Duo Push.” Okta calls this a number challenge.</p>
<p>If you use push notifications, enable some form of number matching verification ASAP to combat MFA Fatigue.</p>
<p>Please tell your friends to be sure they know this hidden danger and can tighten security in their organizations.</p>
<p>The post <a href="https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/">MFA Fatigue: The Hidden Danger and How to Combat It</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Beware: Attackers Buy Top Search Engine Results to Trick You</title>
		<link>https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 16:40:14 +0000</pubDate>
				<category><![CDATA[browser security]]></category>
		<category><![CDATA[Credit Card Security]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[Malicious Advertising]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Website Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3351</guid>

					<description><![CDATA[<p>What seems to be the best way to find a company&#8217;s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site. Here is how the scam works: Suppose you want to look up a company online [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/">Beware: Attackers Buy Top Search Engine Results to Trick You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>What seems to be the best way to find a company&#8217;s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site. <span id="more-3351"></span></p>
<p>Here is how the scam works: Suppose you want to look up a company online named Super Duper, so you type the store&#8217;s name into your favorite search engine. An attacker might have purchased the top result to take you to the website superduperco.com. However, if you knew to scroll down past the paid-for-results, you would have seen that the real website is superduper.com. Attackers set up a website and named it superduperco.com.</p>
<p>Their deceptive site might contain malicious advertising, ask you to enter credit card numbers during checkout, or tempt you to download malicious programs and apps. They might ask you to login or reset a password, and they capture the password you type in.</p>
<p>If you look up a retailer in a search engine, skip past the ads and paid results. Scroll down to see real search results. Even then, be skeptical in case attackers used SEO techniques to appear at the top of the actual search results.</p>
<p>Please forward this to your friends to alert their users that top search engine results can be a trap.</p>
<p>The post <a href="https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/">Beware: Attackers Buy Top Search Engine Results to Trick You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Alert Your Team &#8211; USB Devices, Login Prompts, and Apps</title>
		<link>https://fosterinstitute.com/alert-your-team-usb-devices-login-prompts-and-apps/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 27 Mar 2020 20:56:16 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[recommendations]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3065</guid>

					<description><![CDATA[<p>Warn your users about three ways attackers continue to exploit the COVID-19 crisis: USB: A new ploy is bad actors mailing USB devices, appearing to be from your company to your users. Once plugged in, they can open up a channel that permits unauthorized remote control and capturing keystrokes, including passwords. Fake Login Prompts: Remind [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/alert-your-team-usb-devices-login-prompts-and-apps/">Alert Your Team &#8211; USB Devices, Login Prompts, and Apps</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Warn your users about three ways attackers continue to exploit the COVID-19 crisis:<span id="more-3065"></span></p>
<p>USB: A new ploy is bad actors mailing USB devices, appearing to be from your company to your users. Once plugged in, they can open up a channel that permits unauthorized remote control and capturing keystrokes, including passwords.</p>
<p>Fake Login Prompts: Remind your users to beware of login screens when they don&#8217;t expect them. Attackers create persuasive prompts that ask your users passwords for their logon, VPN, or Microsoft Office 365 login, and more. Sometimes the windows tell the user that their connection dropped, and to provide credentials to reestablish their link. Your Users must ignore those prompts and notify your IT team immediately.</p>
<p>Fraudulent websites and apps: Sites may have useful coronavirus information, but they also contain malicious attack software that strives to infect computers. Attackers create bad apps offering online statistics, tracking of the virus spread, and more.</p>
<p>Please forward this to your friends so they can alert their users too.</p>
<p>The post <a href="https://fosterinstitute.com/alert-your-team-usb-devices-login-prompts-and-apps/">Alert Your Team &#8211; USB Devices, Login Prompts, and Apps</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>773 Million Passwords Exposed &#8211; Were You Exposed?</title>
		<link>https://fosterinstitute.com/773-million-passwords-exposed-were-you-exposed/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 17 Jan 2019 23:22:23 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Password Manager]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Hardware Key]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Modlishka]]></category>
		<category><![CDATA[password code]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[two step verification]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2699</guid>

					<description><![CDATA[<p>Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords that have shown up on the dark web over the past two or three years. Think of Collection #1 as being a value pack of bundled old password lists. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/773-million-passwords-exposed-were-you-exposed/">773 Million Passwords Exposed &#8211; Were You Exposed?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords<br />
<span id="more-2897"></span><br />
that have shown up on the dark web over the past two or three years. Think of Collection #1 as being a value pack of bundled old password lists.</p>
<p>If you want to find out if your passwords were released, visit his site called <a href="https://haveibeenpwned.com">https://haveibeenpwned.com</a>. If you elect to enter your email address, he will tell you if it is in the collection and give you more details.</p>
<p>What do you do if you are on the list? Reset your passwords. Use a password manager that will remember your passwords for you to make your life easier when you use a different password at each website from now on.</p>
<p>Now is a great time to enable two-step verification. A basic form of two-step verification is when you enter a username and password, and you receive a text message code to type in. Enable two-step verification on PayPal, LinkedIn, Dropbox, Facebook and every other web service you use. On each website, look for Settings &gt; Security. You may need to dig down, but more reputable sites now support two-step verification, but you must enable the feature.</p>
<p>Some bad news is that, about a week ago, a tool called Modlishka shows how to break two-step verification so it isn&#8217;t that secure, but two-step verification is still more secure than a simple username password combination. If it allows, have a website use some other method than texting you a password. Using an app on your phone or calling you via a voice call are options that are often more secure than the text message. Microsoft, Google, and a service called Duo offer these options and more. Having a hardware key is even better unless your laptop users leave the key stored in the laptop case, and their password written on the bottom of the laptop.</p>
<p>The post <a href="https://fosterinstitute.com/773-million-passwords-exposed-were-you-exposed/">773 Million Passwords Exposed &#8211; Were You Exposed?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else</title>
		<link>https://fosterinstitute.com/the-insanity-of-your-network-storing-keys-in-the-same-place-as-everyone-else/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 10 Sep 2018 16:07:03 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[master passwords]]></category>
		<category><![CDATA[password access]]></category>
		<category><![CDATA[password location]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[safely storing passwords]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2666</guid>

					<description><![CDATA[<p>Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet. You assign your IT team the responsibility to secure and manage the keys to the vehicles, so you give each member of your IT [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/the-insanity-of-your-network-storing-keys-in-the-same-place-as-everyone-else/">The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet.</p>
<p>You assign your IT team <span id="more-2666"></span>the responsibility to secure and manage the keys to the vehicles, so you give each member of your IT team a copy of the master key.</p>
<p>Here is where it gets crazy: Suppose that there is a well-known tradition, in all companies, for IT professionals to store their master keys in the top drawer of their desks. Unfortunately, if someone wants to steal a vehicle, they know right where to find a master key. They can take all the cars once they gain access to the master, and they know exactly where to find it.</p>
<p>In the real world, your IT team has the responsibility to secure and manage your most sensitive data. In doing so, they have the master keys that unlock all the other keys. It is a tradition to give all IT professionals, and even outside consultants, keys to the master lockbox. The shocking part is that all IT professionals are encouraged to store the master keys in the same place, in the default well-known security groups named schema, enterprise, and domain admins.</p>
<p>Your IT team must create new security groups, with different names, in which to store the master keys. It is crucial that the new groups only provide specific privileges to member users on a need to know basis. It is ok if this strategy is new to them.</p>
<p>To measure this, ask your IT professionals to show you what users are members of those default security groups. Discuss moving those users into specific groups that provide the least amount of access they need to perform their work. Depending on the complexity of your system, this may take more time. IT professionals are always busy, so discuss with them their current projects, then prioritize this essential security improvement accordingly.</p>
<p>Storing master keys in a well-known location is absurd, and it is likely that you are doing that now.</p>
<p>The post <a href="https://fosterinstitute.com/the-insanity-of-your-network-storing-keys-in-the-same-place-as-everyone-else/">The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to E-Mail Encrypted Attachments</title>
		<link>https://fosterinstitute.com/how-to-e-mail-encrypted-attachments/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 11 May 2018 15:31:58 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Encrypted Attachments]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Secure Attachments]]></category>
		<category><![CDATA[Secure email]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2637</guid>

					<description><![CDATA[<p>E-mail messages can be intercepted or read by an unauthorized individual. When you want privacy, one way is to encrypt your documents before you attach them to your email message. Microsoft Office, for Windows and Mac, has a feature on the File menu called Protect Document. Choose that option, and enter a secret password. Use [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/how-to-e-mail-encrypted-attachments/">How to E-Mail Encrypted Attachments</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>E-mail messages can be intercepted or read by an unauthorized individual.<span id="more-2637"></span></p>
<p>When you want privacy, one way is to encrypt your documents before you attach them to your email message.</p>
<p>Microsoft Office, for Windows and Mac, has a feature on the File menu called Protect Document. Choose that option, and enter a secret password.</p>
<p>Use a phrase such as: the chairs are in a row.</p>
<p>E-mail that file to your recipient.</p>
<p>Then, phone, or text, the password to your recipient. If you email the recipient the password, even if it is in a separate email message, whoever is reading your email messages will receive both the attachment and the secret code.</p>
<p>Please forward this to any of your friends who may want to send sensitive email attachments.</p>
<p>The post <a href="https://fosterinstitute.com/how-to-e-mail-encrypted-attachments/">How to E-Mail Encrypted Attachments</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Make Life Easier &#8211; Go Back to Easy Passwords</title>
		<link>https://fosterinstitute.com/make-life-easier-go-back-to-easy-passwords/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 05 Sep 2017 16:09:08 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST Recommendations]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[NIST passwords]]></category>
		<category><![CDATA[password length]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[password suggestions]]></category>
		<category><![CDATA[pw safety]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2530</guid>

					<description><![CDATA[<p>NIST, the National Institute of Standards and Technology in the US, is releasing new password standards that make passwords so much easier… Using plain letters is enough; numbers and symbols are optional. Passwords need to be long, at least 8 characters. 16 or more is better. You don’t have to reset passwords unless you suspect [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/make-life-easier-go-back-to-easy-passwords/">Make Life Easier &#8211; Go Back to Easy Passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>NIST, the National Institute of Standards and Technology in the US, is releasing new password standards that make passwords so much easier…<span id="more-2530"></span></p>
<p>Using plain letters is enough; numbers and symbols are optional.</p>
<p>Passwords need to be long, at least 8 characters. 16 or more is better.</p>
<p>You don’t have to reset passwords unless you suspect a data breach. Wow!</p>
<p>However, passwords cannot match a database of stolen or easy to guess passwords. And, your login mechanism has to have a way to verify that.</p>
<p>That’s the basic gist. You can read the details in the NIST Special Publication 800-63 at https://pages.nist dot gov/800-63-3/sp800-63-3.html It covers secret questions, two step login, etc.</p>
<p>Now, hopefully PCI and other standards will update their rules too.</p>
<p>Please forward this to anyone who is sick of complicated passwords and having to change them every 90 days.</p>
<p>The post <a href="https://fosterinstitute.com/make-life-easier-go-back-to-easy-passwords/">Make Life Easier &#8211; Go Back to Easy Passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Online Password Warehouse, OneLogin, Discovers Massive Breach</title>
		<link>https://fosterinstitute.com/online-password-warehouse-onelogin-discovers-massive-breach/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 21 Jun 2017 19:34:42 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[LastPass]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Manager]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Centrify]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[login information]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[Okta]]></category>
		<category><![CDATA[OneLogin]]></category>
		<category><![CDATA[password managers]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[RSA]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[SalesForce App Cloud]]></category>
		<category><![CDATA[SecureID Access]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Strong Network]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2506</guid>

					<description><![CDATA[<p>Without getting complicated, OneLogin, Okta, Centrify, Microsoft, RSA SecureID Access, SalesForce App Cloud, and even more basic password managers store user identities, and login information. Using these services means that users only need to remember one password and all of their other logins are handled for them. The most important thing about the OneLogin breach: [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/online-password-warehouse-onelogin-discovers-massive-breach/">Online Password Warehouse, OneLogin, Discovers Massive Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Without getting complicated, OneLogin, Okta, Centrify, Microsoft, RSA SecureID Access, SalesForce App Cloud, and even more basic password managers store user identities, and login information. Using these services means that users only need to remember one password and all of their other logins are handled for them.</p>
<p>The most important thing about the OneLogin breach: It affects you and everyone else, not just the 2000 customers of OneLogin.</p>
<p>If you store information in the cloud, including information your customers entrust to you, and if your cloud provider uses OneLogin internally, then your sensitive information could possibly be accessible as well. Cloud based service providers you use every day might use identity management.</p>
<p>This is another example of how someone else’s breach can hurt you, including exposing your customers’ sensitive information.</p>
<p>The big question is: How long have attackers had access? Thank goodness OneLogin at least identified that they’d been breached. Are any other identity management firms breached and don’t yet realize it? What are attackers accessing around the world using stolen passwords?</p>
<p>Please forward this to anyone you know who may not realize that these single points of failure, holding login information for many services that even your service providers may use internally, are very attractive targets for attackers. One successful attack results in a goldmine of information, including yours.</p>
<p>The post <a href="https://fosterinstitute.com/online-password-warehouse-onelogin-discovers-massive-breach/">Online Password Warehouse, OneLogin, Discovers Massive Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Alert &#8211; A Popular Password Manager Has Serious Security Flaw Right Now</title>
		<link>https://fosterinstitute.com/alert-a-popular-password-manager-has-serious-security-flaw-right-now/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 28 Mar 2017 15:33:51 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[LastPass]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Patch Updates]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[LastPass Breach]]></category>
		<category><![CDATA[Password Manager Breach]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[password security]]></category>
		<category><![CDATA[password storage]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[two step verification]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2456</guid>

					<description><![CDATA[<p>A password manager company announced that there is a vulnerability that could allow attackers to gather stored passwords. Password managers are very helpful since they make it so convenient to be secure, and can greatly simplify and speed up the login process at websites. Many people feel password managers are worth the risks, especially when the [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/alert-a-popular-password-manager-has-serious-security-flaw-right-now/">Alert &#8211; A Popular Password Manager Has Serious Security Flaw Right Now</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A password manager company announced that there is a vulnerability that could allow attackers to gather stored passwords.<span id="more-2456"></span></p>
<p>Password managers are very helpful since they make it so convenient to be secure, and can greatly simplify and speed up the login process at websites. Many people feel password managers are worth the risks, especially when the risks can be minimized as summarized below:</p>
<p>First, as you can see, there is no guarantee that password managers are perfect. Never store super-sensitive passwords into your password manager. Store them in your head.</p>
<p>Second, enable two-step verification on all websites. Then, if an unauthorized person obtains your password, they will have a difficult time logging in, if they cannot perform the second step.</p>
<p>Third, one of the ways to launch the exploit involves tricking the user into clicking a link, such as a link in an email message, or getting a script to run on a web page as the user visits the page. Using click-to-play can greatly minimize those risks.</p>
<p>To learn more about the first two, see last week’s newsletter posted at www.fosterinstitute dot com/blog/your-iphone-and-ipad-are-in-danger. Never mind the title; the content addresses the first two steps listed above even if you use Windows or Android.</p>
<p>As for the third point, we&#8217;ll cover click-to-play next week, or you can simply google those terms and get started right away.</p>
<p>The announcement came from LastPass, and don&#8217;t panic if you use it. LastPass says the exploit is very difficult for an attacker to use, but not impossible. Resetting your passwords is not going to help, yet. Only after LastPass develops a patch, and then only when LastPass on your computers are patched. LastPass said this only affects users using the LastPass extension in Chrome, but that researchers have used the exploit in other browsers too. Email us if you want more technical details.</p>
<p>Please forward this to anyone you know who may use a password manager or lets their browsers remember their passwords.</p>
<p>The post <a href="https://fosterinstitute.com/alert-a-popular-password-manager-has-serious-security-flaw-right-now/">Alert &#8211; A Popular Password Manager Has Serious Security Flaw Right Now</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
