<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Patches Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/patches/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/patches/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Fri, 23 Oct 2020 19:03:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Patches Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/patches/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them</title>
		<link>https://fosterinstitute.com/attackers-can-take-control-of-your-network-in-three-seconds-and-how-to-stop-them/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 23 Oct 2020 19:03:56 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Remote Worker Security]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3333</guid>

					<description><![CDATA[<p>An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network. The attacker does not need to know any passwords; they do not even need a username. They plug in a cable, and 3 seconds later, they&#8217;ve completely compromised your network. An attacker posing as [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/attackers-can-take-control-of-your-network-in-three-seconds-and-how-to-stop-them/">Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network.<span id="more-3333"></span></p>
<p>The attacker does not need to know any passwords; they do not even need a username. They plug in a cable, and 3 seconds later, they&#8217;ve completely compromised your network. An attacker posing as a visitor, a copier repair person, or a member of a cleaning crew can all compromise your organization. They can steal sensitive information, install ransomware, and can shut down operations entirely. They bypass the majority of, if not all, of your other protections because now they&#8217;re a Domain Administrator.</p>
<p>This exploit is so severe that the Department of Homeland Security directed all federal agencies to apply the patch in accordance with the Federal Emergency Directive 20-04.</p>
<p>Take these three steps ASAP:</p>
<p>First, ask your IT team if they&#8217;ve backed up your Domain Controller servers and applied Microsoft&#8217;s patches that address the Zerologon exploit CVE-2020-1472. They must do this immediately. Be compassionate if they&#8217;ve not. IMPORTANT: Realize that if an attacker already took over a network, the patch doesn&#8217;t help.</p>
<p>Second, if you have Domain Controllers using operating systems older than Windows Server 2008 R2, your IT professionals must shut them down for good. Be sure to migrate any mission-critical services to other servers.</p>
<p>Third, does your organization rely on third parties to support you? What if one of your major suppliers, a distributor, or your biggest customer falls prey to an attack? Prepare your organization now for an interruption of their operations. Be sure their executives know about this flaw and these three steps. You do not want a catastrophe at their organization to domino and cause a disaster for you, even though you&#8217;ve protected your systems.</p>
<p>Additional steps:</p>
<p>Inform your work-from-home team members that, in some cases, the attacker can take over your network using a VPN connection. Do you have an armed guard at every work-from-home user&#8217;s home to watch visitors? Of course not. But your entire organization might rely on their security. What if a teenager&#8217;s friend feels like playing around, experimenting, with this new cool exploit on a mom or dad&#8217;s computer?</p>
<p>The patches only protect you from attacks from Windows devices. If an attacker accesses a network port or cable with a non-Windows machine, the attacker can still take control of your network. Microsoft will release a second patch on February 9, 2021. Ask your IT team to configure alerts now to monitor security log events 5827 thru 5831 to see when connections are allowed or denied.</p>
<p>The average time for IT Professionals to apply critical security patches is five months, but you need to help yours be above average. Ask them what you can do to help them have time to test and install all critical security patches within 14 days or sooner. They might want to have a patch management tool. They might need more time to devote to applying updates.</p>
<p>Confirm that your IT Team disconnects or disables all unused Ethernet ports, including those in conference rooms. Lock doors to any offices and conference rooms that contain active Ethernet ports. Train everyone to be proactive and remove opportunities for anyone, including guests and repair people, to plug a device into a network port.</p>
<p>Keep in mind that 911 systems, airlines, governments, and every organization that you depend on are at risk for Zerologon exploit CVE-2020-1472 until they take action too.</p>
<p>Please forward this to fellow executives you care about so they can support their IT Professionals successfully backing up servers and applying the emergency patch.</p>
<p>The post <a href="https://fosterinstitute.com/attackers-can-take-control-of-your-network-in-three-seconds-and-how-to-stop-them/">Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Patching Nightmare – Please Forward to Your IT Pros</title>
		<link>https://fosterinstitute.com/patching-nightmare-please-forward-to-your-it-pros/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 23 Jan 2018 17:55:51 +0000</pubDate>
				<category><![CDATA[Adobe]]></category>
		<category><![CDATA[Adobe Flash]]></category>
		<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Patch Updates]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[CPU Chip Flaws]]></category>
		<category><![CDATA[CPU Chips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[deploying patches]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Intel]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[Java SE patch]]></category>
		<category><![CDATA[Oracle patches]]></category>
		<category><![CDATA[patching nightmare]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2607</guid>

					<description><![CDATA[<p>Intel says, again, to stop deploying patches. Java and other new patches need handling. Intel advises that IT Professionals stop deploying the current versions of patches for the recently discovered security flaws in CPU chips. Find details, just updated, by searching: Root Cause of Reboot Issue Identified Updated Guidance for Customers and Partners site:intel.com Do [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/patching-nightmare-please-forward-to-your-it-pros/">Patching Nightmare – Please Forward to Your IT Pros</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Intel says, again, to stop deploying patches. Java and other new patches need handling.<span id="more-2607"></span></p>
<p>Intel advises that IT Professionals stop deploying the current versions of patches for the recently discovered security flaws in CPU chips. Find details, just updated, by searching:<br />
Root Cause of Reboot Issue Identified Updated Guidance for Customers and Partners site:intel.com</p>
<p>Do not insert a space after the colon.</p>
<p>For most of you, deploying Microsoft patches is easy compared to managing Flash, Java, and browser updates. Oracle is releasing multiple security patches for Java SE. Additionally, if you are upgrading Chrome to the 64 bit version, Google is releasing new patches for that browser.</p>
<p>For executives wondering what to do at home, you may find it best to download fresh versions of any non-Microsoft browsers you use, and reinstall the most recent versions of Flash and Java, if you still use either, from <a href="https://get.adobe.com/flashplayer/">https://get.adobe dot com/flashplayer/</a> or <a href="https://www.java.com/en/">java dot com</a> . Your Microsoft and/or Apple patches are likely configured to install automatically.</p>
<p>For both organizations and home office users, if you can remove Flash and/or Java from some or all of your computers, then you can forget about patching them. If you haven’t already, try it on a few computers. You may find that all of the websites essential to your business no longer require either. Worst case, you can re-install the most recent version.</p>
<p>Executives, please forward this to your IT Professionals. Be sure to, if you have not already, have a conversation with them about how aggressive you want them to be with patching. They can share the pros and cons with you. These days, an aggressive posture related to patches can increase your security dramatically, when handled properly. Provide them time to test the patches, test un-installing the patches, and then to deploy the patches in stages. They will also need to contact your cloud providers to discuss how they are handling the flaws and patches.</p>
<p>The post <a href="https://fosterinstitute.com/patching-nightmare-please-forward-to-your-it-pros/">Patching Nightmare – Please Forward to Your IT Pros</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Get Apple’s Urgent Patches that Fix Dozens of Security Holes</title>
		<link>https://fosterinstitute.com/get-apples-urgent-patches-that-fix-dozens-of-security-holes/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 17 May 2017 16:08:20 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Patch Release]]></category>
		<category><![CDATA[Patch Updates]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[apple patch]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[fix security holes]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[how to apply apple patch]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[ipad updates]]></category>
		<category><![CDATA[iphone updates]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[updating apple products]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2495</guid>

					<description><![CDATA[<p>For those of you with Apple products, Apple just released some important updates. Knowing that updates might cause a problem, please back up your computer first. You are backing up all the time already, right? Time Machine is a wonderful tool and is built in. If you want to supplement Time Machine with an additional [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/get-apples-urgent-patches-that-fix-dozens-of-security-holes/">Get Apple’s Urgent Patches that Fix Dozens of Security Holes</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>For those of you with Apple products, Apple just released some important updates.</p>
<p>Knowing that updates might cause a problem, please back up your computer first. You are backing up all the time already, right? Time Machine is a wonderful tool and is built in. If you want to supplement Time Machine with an additional backup, Carbon Copy Cloner from Bombich dot com is very popular and clients experience great results. You’ll need a couple of external USB drives, but the investment is worth it.</p>
<p>In case you are not familiar with how to apply patches, here are instructions:</p>
<p>On your Apple computer, even if your computer is set for automatic updates, it is good to verify that you have the most recent patches. Click on the image of the apple in the top left corner, and choose App Store. If not already selected, choose Updates inside the title bar that already contains the words: Featured, Top Charts, Categories, Purchased, and Updates. You may see many updates for your applications, and those are fine to apply, but the urgent one is the update called macOS Sierra Update and the version is 10.12.5. If you’ve not updated in a while, you may see other macOS updates too.</p>
<p>iPhone and iPad users, press on the Settings icon that looks like a gear. In the left-hand column, select General, and you’ll see Software Update on the right-hand column near the top. The most recent patch is for iOS 10.3.2.</p>
<p>If you want to configure automatic updates for your Apple computers, find instructions by searching for this phrase in Google: Automatic security updates os x site:apple.com</p>
<p>If you want to configure automatic updates for the iPhone and iPad, find instructions by searching for this phrase in Google: Automatic security downloads iOS site:apple.com</p>
<p>Please forward this to everyone you know who uses Apple devices and you want to help be more secure…</p>
<p>The post <a href="https://fosterinstitute.com/get-apples-urgent-patches-that-fix-dozens-of-security-holes/">Get Apple’s Urgent Patches that Fix Dozens of Security Holes</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Patching – 10 Steps to Seal the Holes in Your Armor</title>
		<link>https://fosterinstitute.com/patching-10-steps-to-seal-the-holes-in-your-armor/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 15 May 2017 15:42:19 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Patch Updates]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[applying patches]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[ipad security]]></category>
		<category><![CDATA[iphone Security]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Microsoft patch]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[patch deployment]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[patches]]></category>
		<category><![CDATA[ransomware attack]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[updating patches]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2482</guid>

					<description><![CDATA[<p>You’ve likely heard of the massive ransomware attack that has taken down so many organizations, including hospitals, around the world. The ransomware appears to have exploited a bug for which Microsoft released a fix a little over a month ago. Follow these 10 steps to help protect your organization from this, and from future attacks: [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/patching-10-steps-to-seal-the-holes-in-your-armor/">Patching – 10 Steps to Seal the Holes in Your Armor</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You’ve likely heard of the massive ransomware attack that has taken down so many organizations, including hospitals, around the world. The ransomware appears to have exploited a bug for which Microsoft released a fix a little over a month ago. Follow these 10 steps to help protect your organization from this, and from future attacks:<span id="more-2482"></span></p>
<p>Instructions for Windows and Apple home users are listed below the numbers. For organizations, here are 10 Steps To Avoid Incidents Including the Massive Ransomware Attack:</p>
<p>1. The reality is that most organizations are missing critical security patches and there is a very strong likelihood that yours is too.</p>
<p>2. Provide your team with extra time, and perhaps additional personnel, to test and then deploy patches ASAP. Some organizations are adding a new IT professional to their team whose sole responsibility is to manage patches. If the patch fails testing, then time must be invested to resolve the issue or implement compensating controls.</p>
<p>3. Prioritize critical security patches for the operating system, all the browsers, Flash, Java, your PDF Reader, and Microsoft Office. They are usually the easiest to attack and form your first line of defense.</p>
<p>4. Many IT teams are very reluctant to apply patches for fear of breaking your systems that are already running. Help remove their fears by reassuring them that you take on responsibility if the patch causes a problem. Encourage them to follow a procedure that mitigates risks:</p>
<p>5. Test Patches in a test environment that uses the same applications as the rest of your network. For very small companies, your test environment might be a single computer. For larger organizations, and organizations that stand to lose a great deal in the event of an attack, create a separate testing environment that is isolated from the production environment.</p>
<p>6. Have a pre-tested rollback plan so that, if the patch does cause a problem, your IT team will already know what they need to do right away to roll back a patch that causes an unexpected problem. They will then go back to the testing phase.</p>
<p>7. Deploy the patches in stages rather than patching all machines simultaneously. That way, even if the patch does cause a problem, not all your machines will be affected.</p>
<p>8. You may decide to empower your IT team with a patch management tool such as Ninite, LANGuard, Shavlik, or others. Allow them to test and choose a tool, and provide them with the means and time to do so, ASAP.</p>
<p>9. Ask IT, perhaps weekly and at least monthly, to provide you with a list of missing patches, not a pie chart.</p>
<p>10. You must upgrade from older operating systems, any of the ones that Microsoft no longer supports. If some machines cannot be upgraded, then they must be isolated or some other compensating control put into place. Microsoft clearly states when they stop producing patches for old operating systems.  So, there was no patch available for Windows XP and others.</p>
<p>Call me if they are not able to apply patches. Let’s team up to help prevent this.</p>
<p>At home, or if your organization is so small that you do not have an IT team or have an outsourced IT company that takes care of your patches, be sure that the option that provides automatic updates to Microsoft is enabled. The instructions are easy to find – just google the phrase: configure automatic updates site:Microsoft.com</p>
<p>Apple computer users, google: Automatic security updates os x site:apple.com</p>
<p>iPhone and iPad users, google: Automatic security downloads ios site:apple.com</p>
<p>Additionally, manually check for updates in Microsoft Office to be sure those are applied. Be sure that automatic updates are enabled in your browsers. Regularly download and apply patches to, or new versions of, Flash, Java, and your PDF reader.</p>
<p>Please forward this to everyone you care about and want to help stay secure.</p>
<p>The post <a href="https://fosterinstitute.com/patching-10-steps-to-seal-the-holes-in-your-armor/">Patching – 10 Steps to Seal the Holes in Your Armor</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Alert Your IT Team &#8211; Urgent Patch for Network Servers</title>
		<link>https://fosterinstitute.com/alert-your-it-team-urgent-patch-for-network-servers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 18 Apr 2017 15:36:47 +0000</pubDate>
				<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Patch Release]]></category>
		<category><![CDATA[Patch Updates]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT professionals]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[patch deployment]]></category>
		<category><![CDATA[patches]]></category>
		<category><![CDATA[Patching]]></category>
		<category><![CDATA[pre-testing patches]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[VMware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2460</guid>

					<description><![CDATA[<p>Many organizations use VMware to host their servers. VMware has released an urgent update they label as Critical. Patching VMware, which is often used as a platform for many of your other servers, can be frustrating. If the patch causes a problem, there is a risk that all your servers hosted on that machine will [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/alert-your-it-team-urgent-patch-for-network-servers/">Alert Your IT Team &#8211; Urgent Patch for Network Servers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Many organizations use VMware to host their servers. VMware has released an urgent update they label as <span id="more-2460"></span>Critical.</p>
<p>Patching VMware, which is often used as a platform for many of your other servers, can be frustrating. If the patch causes a problem, there is a risk that all your servers hosted on that machine will go down.</p>
<p>This is one of those risk vs. benefit decisions that is so important, business executives must be involved.</p>
<p>On the one hand, the patch could interrupt business, but not applying the patch could be considered reckless.</p>
<p>Test the patch prior to deployment, when possible. Having a pre-planned, if not pre-tested, roll-back plan is crucial in case the patch causes a problem.</p>
<p>Preferably patch one server at a time so that, if the patch does cause a problem, at least the interruption is limited to that server.</p>
<p>Without the patch, someone could run programs on your computer, potentially taking control of the server.</p>
<p>The patch fixes a vulnerability in the VMware Customer Experience Improvement Program, even if a customer is not participating in the program.</p>
<p>Please emphasize the last phrase to your IT pros.</p>
<p>Ask your IT pros to look at VMware’s information by searching for VMSA-2017-0007.</p>
<p>Please forward this to everyone who may be using VMware, so that they can alert their IT pros just in case they don’t know already.</p>
<p>The post <a href="https://fosterinstitute.com/alert-your-it-team-urgent-patch-for-network-servers/">Alert Your IT Team &#8211; Urgent Patch for Network Servers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Alert IT to Graphics Component Patches</title>
		<link>https://fosterinstitute.com/alert-it-to-graphics-component-patches/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 09 Feb 2017 16:17:34 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Patch Release]]></category>
		<category><![CDATA[Patch Updates]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Graphics Component Patches]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Microsoft patches]]></category>
		<category><![CDATA[patches]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[updating patches]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2424</guid>

					<description><![CDATA[<p>Security patches are so important to security, but they are difficult to manage and you always stand the risk of a patch interrupting productivity. And there are some new patches your IT team needs to know about&#8230; Microsoft has released a series of patches related to the Windows Graphics Component. As IT professionals, we are [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/alert-it-to-graphics-component-patches/">Alert IT to Graphics Component Patches</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Security patches are so important to security, but they are difficult to manage and you always stand the risk of a patch interrupting productivity. And there are some new patches your IT team needs to know about&#8230;<span id="more-2424"></span></p>
<p>Microsoft has released a series of patches related to the Windows Graphics Component. As IT professionals, we are tempted to think that, since it only applies to graphics, the patch isn&#8217;t that important.</p>
<p>Actually, the patch is very important. An attacker can execute code on your computers, perhaps even ransomware, if the patch is not installed.</p>
<p>We are seeing a trend during audits, of these patches being missing.</p>
<p>If you are a home user, be sure you are applying patches too. Chances are that you have your computer configured to auto-update.</p>
<p>And at your organization, be sure to alert your IT team that these patches to the graphics component are important too. </p>
<p>As long as your IT team is provided enough time to keep your system backed up, and to test the patches, then their applying your patches isn&#8217;t as ominous as hackers hope they feel it is.</p>
<p>And, as executives, you can help a lot by providing them time to focus on testing and deploying the patches. They are very busy already.</p>
<p>Please forward this to everyone you know whose systems may be missing these seemingly unnecessary patches. It will help stop the attackers!</p>
<p>The post <a href="https://fosterinstitute.com/alert-it-to-graphics-component-patches/">Alert IT to Graphics Component Patches</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Only One Virus is a Huge Problem</title>
		<link>https://fosterinstitute.com/only-one-virus-is-a-huge-problem/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 03 Nov 2016 15:34:55 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Application Updates]]></category>
		<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Infected Apps]]></category>
		<category><![CDATA[Invisible Security Threats]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Virus]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Virus]]></category>
		<category><![CDATA[Click to Play]]></category>
		<category><![CDATA[cyber infection]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[cyber security warning IT Pro Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[network security protections]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[updating patches]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[virus infections]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2390</guid>

					<description><![CDATA[<p>If your office has even one instance of a virus, ransomware, or any other kind of malware, that is a huge symptom. Yesterday, someone told me their security was good since they only get infected by a few viruses each year. Even a single infection means there is a possibility that their machines are already [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/only-one-virus-is-a-huge-problem/">Only One Virus is a Huge Problem</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If your office has even one instance of a virus, ransomware, or any other kind of malware, that is a huge symptom. <span id="more-2390"></span></p>
<p>Yesterday, someone told me their security was good since they only get infected by a few viruses each year. </p>
<p>Even a single infection means there is a possibility that their machines are already infected. </p>
<p>If one virus can get in, other undetectable viruses can too.</p>
<p>Unless security protections are very poor on a network or computer, visible virus infections are rare these days. </p>
<p>People who see virus infections need to act, including patching their Internet facing applications and enabling click-to-play. Those features already come with Windows and applications so there is nothing to buy or download. For more information, see foster institute dot come slash blog.</p>
<p>If you know someone whose computers on their network catch viruses, tell them the viruses are more like chest pain, not like the common cold. Infections are the sign of some greater damage that is about to, or already has, occurred.</p>
<p>The post <a href="https://fosterinstitute.com/only-one-virus-is-a-huge-problem/">Only One Virus is a Huge Problem</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Security’s Three Essential Steps</title>
		<link>https://fosterinstitute.com/cyber-securitys-three-essential-steps/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 25 Nov 2015 19:12:03 +0000</pubDate>
				<category><![CDATA[Application Whitelisting]]></category>
		<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[application patches]]></category>
		<category><![CDATA[application whitelisting]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[cyber security business strategy]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Local Admin rights]]></category>
		<category><![CDATA[patch updates]]></category>
		<category><![CDATA[program installation]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2228</guid>

					<description><![CDATA[<p>In this time of gratitude, which is perhaps the most important foundation of happiness and success, it is important to thank you for helping make the world a safer place. Three controls, perhaps the most important three controls, help protect you from cyber-threats. They are: 1. Keep critical operating system and application patches up to [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/cyber-securitys-three-essential-steps/">Cyber Security’s Three Essential Steps</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In this time of gratitude, which is perhaps the most important foundation of happiness and success, it is important to thank you for helping make the world a safer place. Three controls, perhaps the most important three controls, help protect you from cyber-threats. They are:<span id="more-2228"></span></p>
<p>1. Keep critical operating system and application patches up to date, especially Flash, Java, Reader, and your browsers. Updates fix security loopholes in programs. The fear of a patch causing a program to malfunction can be reduced with proper testing, performing a staged rollout, and having a rollback plan.</p>
<p>2. Utilize Application Whitelisting. Application whitelisting allows you to specify what programs are permitted to run, such as Microsoft Office, your accounting program, and anything else your team needs for business purposes. Because of not being on the ok list, the majority of malicious software is blocked from running. The reason most companies don&#8217;t use application whitelisting is that their IT Pros know it can be a daunting process to set up and make it work well. Therefore, we can set that up for your IT pros. Why should they need to learn something when it only needs to be done once? The upkeep can be simple from then on.</p>
<p>3. Reduce the number of users with Local Admin rights as much as possible. This removes a user&#8217;s ability to install programs on their computer. As a result, it greatly hinders the ability for attackers to install malicious software too.</p>
<p>Other than implementation, none of those cost any money. You already paid for the technology. Emphasize the importance of, and support your IT Pros, as they implement these 3 powerful controls in your network. </p>
<p>Wishing you a thankful week and thank you all for remembering cyber-security as part of your main strategy for successful business operations!</p>
<p>The post <a href="https://fosterinstitute.com/cyber-securitys-three-essential-steps/">Cyber Security’s Three Essential Steps</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Microsoft Using Your Computer To Deliver Software</title>
		<link>https://fosterinstitute.com/microsoft-using-your-computer-to-deliver-software/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 31 Aug 2015 16:00:17 +0000</pubDate>
				<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[hotspot safety]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Microsoft Settings]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Delivery Optimization]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2144</guid>

					<description><![CDATA[<p>Microsoft built a feature into Windows 10 called Delivery Optimization. Your computer may deliver and receive apps and patches to and from computers belonging to complete strangers. Your computer becomes a server to deliver patches and apps to people on the Internet. Though it is likely enabled on your computers, you can turn this feature [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/microsoft-using-your-computer-to-deliver-software/">Microsoft Using Your Computer To Deliver Software</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Microsoft built a feature into Windows 10 called Delivery Optimization. Your computer may deliver and receive apps and patches to and from computers belonging to complete strangers. Your computer becomes a server to deliver patches and apps to people on the Internet. Though it is likely enabled on your computers, you can turn this feature off. <span id="more-2144"></span></p>
<p>Microsoft presents the feature to users saying, “Download apps and OS updates from multiple sources to get them more quickly&#8221;.</p>
<p>Think about it and it sort of makes sense. Rather than every computer on the planet having to go to Microsoft’s servers to download patches and apps, Windows 10 computers can reach out to other Windows 10 computers and obtain the patch from them. This helps prevent Microsoft’s servers from becoming overloaded, and can allow your computer to receive patches and apps sooner. Ultimately, this can even reduce the amount of traffic flowing on the Internet in general.</p>
<p>Microsoft has built in strong security – though security can be broken. </p>
<p>Microsoft does their best not to use your computer to deliver patches if you are connected to the Internet using a mobile hotspot – helping you avoid unexpected data charges. You can also specify what Wi-Fi connections are charged as metered networks.</p>
<p>One concern is that, if your computer is being used to deliver updates, your Internet connection may slow down. Or, perhaps you don’t want your computer to be, what some users may feel is, a zombie for Microsoft to use as part of their patch delivery mechanism.</p>
<p>How to turn this feature off in Windows 10: Go to the Start button icon, choose Settings > Update &#038; Security > Windows Update > Advanced Options. You can choose to not participate, or to select either PCs on your local network only, or PCs on your local network and PCs on the Internet” </p>
<p>Please help spread the word and forward this newsletter on to those you care about! </p>
<p>The post <a href="https://fosterinstitute.com/microsoft-using-your-computer-to-deliver-software/">Microsoft Using Your Computer To Deliver Software</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Huge Change in Scheduled Patches</title>
		<link>https://fosterinstitute.com/huge-change-in-scheduled-patches/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 07 May 2015 16:26:44 +0000</pubDate>
				<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[Patch Release]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[adobe patches]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Microsoft patches]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[patch deployment]]></category>
		<category><![CDATA[patch release]]></category>
		<category><![CDATA[patches]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[scheduled patches]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2089</guid>

					<description><![CDATA[<p>IT Pros know to clear their calendars right after the second Tuesday of the month. Dubbed “Patch Tuesday,” that’s when Microsoft releases most patches. Microsoft announced they are abandoning that practice and will release patches ASAP when they are available. What it means for your IT Pros… A benefit of knowing when to expect patches is that [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/huge-change-in-scheduled-patches/">Huge Change in Scheduled Patches</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>IT Pros know to clear their calendars right after the second Tuesday of the month. Dubbed “Patch Tuesday,” that’s when Microsoft releases most patches. Microsoft announced they are abandoning that practice and will release patches ASAP when they are available. What it means for your IT Pros…<span id="more-2089"></span></p>
<p>A benefit of knowing when to expect patches is that patch time could be planned in advance. Now your IT Pros will have to be vigilant about applying Microsoft patches any time of the month. That’s the way it is with Adobe Flash, Java, PDF Reader, and browser patches.</p>
<p>And, patches do you no good until they are installed on your systems.</p>
<p>Applying patches is one of the best things you can do to protect against hacker attacks.</p>
<p>3 Cardinal rules for patches:</p>
<p>First, test the patches. Patches sometimes cause problems, especially Java patches, so they have to be tested. Test them ASAP so you can deploy them ASAP.</p>
<p>Second, use a staged deployment. Patches need to be deployed first to a few machines, then more, then to the rest of your network. That way, if a patch causes a problem, not everyone is down at the same time.</p>
<p>Third, always have a plan on how to “roll back” the patches if they do cause a problem. That’s just another reason to always have good backups and test your ability to restore.</p>
<p>Microsoft says the new “ASAP” patch release proactive will start when Windows 10 is released. That will probably be in July 2015.</p>
<p>Please post your comments below&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/huge-change-in-scheduled-patches/">Huge Change in Scheduled Patches</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
