<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Preventative IT Mainenance Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/preventative-it-mainenance/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/preventative-it-mainenance/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Thu, 05 Sep 2019 18:27:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Preventative IT Mainenance Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/preventative-it-mainenance/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Microsoft Will Stop Protecting Windows 7 on January 14, 2020</title>
		<link>https://fosterinstitute.com/microsoft-will-stop-protecting-windows-7-on-january-14-2020/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 05 Sep 2019 18:27:54 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Preventative IT Mainenance]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows 7]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2989</guid>

					<description><![CDATA[<p>Windows 7 computers will still run, your anti-virus will still work, as will your other programs. But you are taking a significant risk because Microsoft will no longer provide security updates that help keep attackers out of your network. Security patches are one of the best ways to protect your systems from attacks. Any of [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/microsoft-will-stop-protecting-windows-7-on-january-14-2020/">Microsoft Will Stop Protecting Windows 7 on January 14, 2020</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Windows 7 computers will still run, your anti-virus will still work, as will your other programs. But you are taking a significant risk because Microsoft will no longer provide security updates that help keep attackers out of your network.<br />
<span id="more-2989"></span><br />
Security patches are one of the best ways to protect your systems from attacks.</p>
<p>Any of your computers that you purchased six years ago came with Windows 7 installed. Unless you paid for new licenses and gave your team time to upgrade them, those computers run Windows 7 today.</p>
<p>Some of your options include:<br />
&#8211; Buy new computers<br />
&#8211; If the computer is strong enough, upgrade Windows 7 to Windows 8.1 or Windows 10<br />
&#8211; You can ask your IT team if you use a technology called VDI. If so, they can uninstall Windows 7 completely. They can install Linux, or make a bootable thumb drive, or use a No Touch Desktop program. The computer can function as a screen and keyboard to a server where Windows runs</p>
<p>If, for any reason, you need to keep Windows 7 on some workstations, be sure to give your IT team time to implement compensating controls. For example, they can isolate the computers from the rest. Ask them to install Microsoft&#8217;s downloadable EMET security tool that works in Windows 7.</p>
<p>Support for Windows 8.0 ended in 2016.<br />
Support for Windows 8.1 ends on January 10, 2023.</p>
<p>Please forward this to your friends and business associates, so they know January 14 is the when Windows 7 becomes a severe security risk to their networks.</p>
<p>The post <a href="https://fosterinstitute.com/microsoft-will-stop-protecting-windows-7-on-january-14-2020/">Microsoft Will Stop Protecting Windows 7 on January 14, 2020</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Delta Airlines Believes their Epic Technology Failure is like Painting a Bridge</title>
		<link>https://fosterinstitute.com/delta-airlines-believes-their-epic-technology-failure-is-like-painting-a-bridge/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 18 Aug 2016 20:26:34 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Preventative IT Mainenance]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[data loss prevention]]></category>
		<category><![CDATA[Delta Glitch]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Preventative IT Maintenance Cyber]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2366</guid>

					<description><![CDATA[<p>On August 8, Delta had to cancel 2,000 flights due to a major technology malfunction. It could have been prevented. Delta reports that the glitch was triggered by a 22 year old power control system device that failed in their datacenter. Back in June, Delta’s CIO Rahul Samant made a very telling statement, “Technology is [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/delta-airlines-believes-their-epic-technology-failure-is-like-painting-a-bridge/">Delta Airlines Believes their Epic Technology Failure is like Painting a Bridge</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On August 8, Delta had to cancel 2,000 flights due to a major technology malfunction. It could have been prevented. <span id="more-2366"></span></p>
<p>Delta reports that the glitch was triggered by a 22 year old power control system device that failed in their datacenter. </p>
<p>Back in June, Delta’s CIO Rahul Samant made a very telling statement, “Technology is like painting a bridge. Work is never done.”</p>
<p>That was two months before this disaster. I wonder if his statement about how “work is never done” is an excuse for not trying. It would be best if he remains focused on doing the best he possibly can. </p>
<p>I do not know the CIO, and give him the benefit of the doubt of doing the best possible job he can do.</p>
<p>As I type this blog at 35,000 feet, it is important to trust in the airlines to be very focused on safety. If only IT was afforded the same attention.</p>
<p>In 2008, after the bridge collapses received major media attention, the government provided resources to maintain bridges. </p>
<p>The government needn’t step in to force companies to keep their IT bridges painted and in great shape. But CEOs should step in when necessary.</p>
<p>Many IT departments are plagued by a lack of resources. But it doesn’t help to throw money at IT either. The problems can often be solved by using tools you’ve already paid for, and systems can be configured in ways to save IT Pros time.</p>
<p>Many organizations rely on service providers. Target learned the hard way that some service providers’ carelessness might cause big problems at the organizations that trust them. </p>
<p>Disaster Recovery and Business Continuity plans are crucial. But keep preventative maintenance in mind too. Just ask Delta. </p>
<p>The post <a href="https://fosterinstitute.com/delta-airlines-believes-their-epic-technology-failure-is-like-painting-a-bridge/">Delta Airlines Believes their Epic Technology Failure is like Painting a Bridge</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
