<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Supporting IT Professionals Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/supporting-it-professionals/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/supporting-it-professionals/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Fri, 23 Aug 2024 21:15:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Supporting IT Professionals Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/supporting-it-professionals/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>AI Implementation Roadmap: The Executive&#8217;s Guide to Avoiding Million-Dollar Mistakes</title>
		<link>https://fosterinstitute.com/ai-implementation-roadmap-the-executives-guide-to-avoiding-million-dollar-mistakes/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 23 Aug 2024 21:15:15 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[CCPA]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Supporting IT Professionals]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5866</guid>

					<description><![CDATA[<p>As a cybersecurity professional specializing in cybersecurity and AI, I&#8217;ve seen firsthand the importance of involving key stakeholders when implementing AI solutions. This guide highlights many essential steps to help ensure a smooth, secure, and compliant AI deployment in your organization. 1. Assemble Your AI Implementation Team Choose a person or team to lead AI [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/ai-implementation-roadmap-the-executives-guide-to-avoiding-million-dollar-mistakes/">AI Implementation Roadmap: The Executive&#8217;s Guide to Avoiding Million-Dollar Mistakes</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="whitespace-pre-wrap break-words">As a cybersecurity professional specializing in cybersecurity and AI, I&#8217;ve seen firsthand the importance of involving key stakeholders when implementing AI solutions. This guide highlights many essential steps to help ensure a smooth, secure, and compliant AI deployment in your organization.</p>
<h2 class="font-600 text-xl font-bold">1. Assemble Your AI Implementation Team</h2>
<ul class="-mt-1 list-disc space-y-2 pl-8">
<li class="whitespace-normal break-words">Choose a person or team to lead AI implementation</li>
<li class="whitespace-normal break-words">Include representatives from leadership, legal, and IT</li>
</ul>
<h2 class="font-600 text-xl font-bold">2. Educate Your Team on AI Applications</h2>
<ul class="-mt-1 list-disc space-y-2 pl-8">
<li class="whitespace-normal break-words">Watch the 7-minute educational video showcasing <a href="https://fosterinstitute.com/top-conversations-the-executives-playbook-for-conversing-with-ai-short-fast-paced-video/" target="_blank" rel="noopener">23 Business Uses for Chatbots in 7 minutes</a></li>
<li class="whitespace-normal break-words">Alternatively, schedule a &#8220;lunch and learn&#8221; webinar or workshop to explore practical AI uses</li>
</ul>
<h2 class="font-600 text-xl font-bold">3. Collaborate and Brainstorm</h2>
<ul class="-mt-1 list-disc space-y-2 pl-8">
<li class="whitespace-normal break-words">Discuss insights from the video/workshop</li>
<li class="whitespace-normal break-words">Identify potential AI applications relevant to your business</li>
</ul>
<h2 class="font-600 text-xl font-bold">4. Explore Multiple AI Tools</h2>
<ul class="-mt-1 list-disc space-y-2 pl-8">
<li class="whitespace-normal break-words">Test various chatbots (e.g., Perplexity, Anthropic Claude, ChatGPT, Microsoft Copilot, Google Gemini)</li>
<li class="whitespace-normal break-words">Consider paid plans, privacy of sensitive information, and the ability to create custom chatbots</li>
<li class="whitespace-normal break-words">The setting to make the model better for everyone means your data will be less private</li>
</ul>
<h2 class="font-600 text-xl font-bold">5. Review Industry-Specific AI Tools</h2>
<ul class="-mt-1 list-disc space-y-2 pl-8">
<li class="whitespace-normal break-words">Investigate AI solutions tailored to your industry</li>
<li class="whitespace-normal break-words">Consult a curated list of AI tools for practical options</li>
</ul>
<h2 class="font-600 text-xl font-bold">6. Consult with Your IT Team</h2>
<ul class="-mt-1 list-disc space-y-2 pl-8">
<li class="whitespace-normal break-words">Discuss potential added support requirements</li>
<li class="whitespace-normal break-words">Address concerns about job complexity</li>
<li class="whitespace-normal break-words">Develop strategies to integrate AI without overburdening your IT team</li>
</ul>
<h2 class="font-600 text-xl font-bold">7. Engage Your Legal Counsel</h2>
<ul class="-mt-1 list-disc space-y-2 pl-8">
<li class="whitespace-normal break-words">Address privacy concerns</li>
<li class="whitespace-normal break-words">Review automatic ingestion vs. uploading of data for different AI tools</li>
<li class="whitespace-normal break-words">Analyze privacy and security policies of prospective AI solutions</li>
<li class="whitespace-normal break-words">Consider internal data access and permissions per user or department</li>
<li class="whitespace-normal break-words">Evaluate potential implications for mergers and acquisitions</li>
<li class="whitespace-normal break-words">Consider that data from recordings of meetings will be discoverable during the due diligence phase</li>
</ul>
<h2 class="font-600 text-xl font-bold">8. Assess User Access Control</h2>
<ul class="-mt-1 list-disc space-y-2 pl-8">
<li class="whitespace-normal break-words">Discuss with IT about controlling access to AI tools</li>
<li class="whitespace-normal break-words">Implement measures to manage access to AI on company networks and devices</li>
</ul>
<h2 class="font-600 text-xl font-bold">9. Establish an AI Ethics Framework</h2>
<ul class="-mt-1 list-disc space-y-2 pl-8">
<li class="whitespace-normal break-words">Develop guidelines for ethical AI use within your organization</li>
<li class="whitespace-normal break-words">Address issues like bias, fairness, and transparency</li>
</ul>
<h2 class="font-600 text-xl font-bold">10. Create a Data Governance Strategy</h2>
<ul class="-mt-1 list-disc space-y-2 pl-8">
<li class="whitespace-normal break-words">Establish protocols for data handling, storage, and access in AI systems</li>
<li class="whitespace-normal break-words">Ensure compliance with relevant data protection regulations (e.g., GDPR, CCPA)</li>
</ul>
<h2 class="font-600 text-xl font-bold">11. Implement Security Measures</h2>
<ul class="-mt-1 list-disc space-y-2 pl-8">
<li class="whitespace-normal break-words">Work with IT to set up necessary security protocols for AI systems</li>
<li class="whitespace-normal break-words">Consider encryption, access controls, and monitoring systems</li>
<li>Utilize sensitivity labels and permissions to limit employee access by role, etc.</li>
<li>Establish data retention time policies</li>
</ul>
<h2 class="font-600 text-xl font-bold">12. Plan for Ongoing Monitoring and Evaluation</h2>
<ul class="-mt-1 list-disc space-y-2 pl-8">
<li class="whitespace-normal break-words">Establish KPIs to measure the effectiveness and impact of AI implementation</li>
<li class="whitespace-normal break-words">Set up regular review processes to assess and adjust AI usage</li>
</ul>
<h2 class="font-600 text-xl font-bold">13. Develop a Crisis Management Plan</h2>
<ul class="-mt-1 list-disc space-y-2 pl-8">
<li class="whitespace-normal break-words">Prepare for potential AI-related incidents or breaches</li>
<li class="whitespace-normal break-words">Outline response procedures and communication strategies</li>
</ul>
<h2 class="font-600 text-xl font-bold">14. Draft an AI Policy</h2>
<ul class="-mt-1 list-disc space-y-2 pl-8">
<li class="whitespace-normal break-words">Based on input from IT and legal, create a comprehensive AI usage policy</li>
<li class="whitespace-normal break-words">Define the scope and purpose of the AI policy</li>
<li class="whitespace-normal break-words">List approved AI tools and outline acceptable use cases</li>
<li class="whitespace-normal break-words">Establish guidelines for data handling and privacy compliance</li>
<li class="whitespace-normal break-words">Specify required security measures for AI use</li>
<li class="whitespace-normal break-words">Address ethical considerations like bias and fairness</li>
<li class="whitespace-normal break-words">Clarify ownership of AI-generated content and intellectual property</li>
<li class="whitespace-normal break-words">Outline required AI literacy training for employees</li>
<li class="whitespace-normal break-words">Define monitoring procedures and consequences for policy violations</li>
<li class="whitespace-normal break-words">Set criteria for selecting and evaluating AI vendors</li>
<li class="whitespace-normal break-words">Provide a framework for responding to AI-related incidents</li>
<li class="whitespace-normal break-words">Establish a schedule for reviewing and updating the policy</li>
</ul>
<h2 class="font-600 text-xl font-bold">15. Conduct User Training</h2>
<ul class="-mt-1 list-disc space-y-2 pl-8">
<li class="whitespace-normal break-words">Train employees on approved AI resources</li>
<li class="whitespace-normal break-words">Educate staff about the new AI policy, including ethics and protecting sensitive information</li>
<li>Encourage users to look at their daily tasks and see which tasks AI might streamline or improve in other ways</li>
</ul>
<h2 class="font-600 text-xl font-bold"></h2>
<p class="whitespace-pre-wrap break-words">By following all these steps, you&#8217;ll be more prepared to deploy AI in your organization while addressing some essential security, legal, and operational concerns. Successful AI implementation is an ongoing process requiring continuous attention and adaptation. AI is here to stay; you want to be thoughtful sooner to avoid costly problems later.</p>
<div class="et_pb_module et_pb_post_content et_pb_post_content_0_tb_body">
<p>&nbsp;</p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
</div>
<p>The post <a href="https://fosterinstitute.com/ai-implementation-roadmap-the-executives-guide-to-avoiding-million-dollar-mistakes/">AI Implementation Roadmap: The Executive&#8217;s Guide to Avoiding Million-Dollar Mistakes</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Demystifying Questions Cyber Insurance Companies Will Ask You</title>
		<link>https://fosterinstitute.com/questions-cyber-insurance-companies-will-ask-you/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 08 Jul 2024 22:00:22 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Supporting IT Professionals]]></category>
		<category><![CDATA[Wireless Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5302</guid>

					<description><![CDATA[<p>If you have existing or are applying for new Cyber Insurance coverage, be prepared for the questionnaire. Knowing what they’ll ask can give you time to implement systems to answer “yes” to the questions affecting your premium rates and whether you’re still considered insurable. Common questions on insurance applications include: Do you use MFA? Multi-factor authentication [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/questions-cyber-insurance-companies-will-ask-you/">Demystifying Questions Cyber Insurance Companies Will Ask You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you have existing or are applying for new Cyber Insurance coverage, be prepared for the questionnaire. Knowing what they’ll ask can give you time to implement systems to answer “yes” to the questions affecting your premium rates and whether you’re still considered insurable.</p>
<p><strong>Common questions on insurance applications include:</strong></p>
<p><strong>Do you use MFA?</strong> Multi-factor authentication means users must go through a second step when logging in. A prevalent method for the second factor is using an authentication application on users’ phones. It is essential to use a number-matching requirement so that a user must type in a code displayed on their phone into their computer before authentication. Another second factor is time-based one-time password (TOTP) apps on phones that display a number on the phone that the user enters as part of the authentication process. The number displayed in the app resets periodically, typically every 30 seconds. Other factors include using hardware keys that plug into USB ports and biometrics, including fingerprints or facial recognition. A typical second factor is receiving an SMS text message with a code, but that method is vulnerable to attacks such as SIM Swapping. In the interest of security, you should enforce MFA everywhere possible, including VPN, Remote Desktop, and SaaS offerings.</p>
<p><strong>Do you provide ongoing cybersecurity awareness training and periodic phishing simulation emails to measure worker proficiency?</strong> Your users must receive regular security awareness training, such as once per month and perhaps a comprehensive webinar or other presentation once a year. Additionally, services can send users a fraudulent or email phishing message once a month to measure their response, such as if they open the message, click on the simulated fraudulent link, and are duped into entering credentials. One often overlooked aspect of training and simulated phishing is that it might take time for your already overworked staff to configure, send, monitor, and produce reports about the results every month. You’re welcome to contact us to provide that service, and we do 100% of the work, so there is no additional burden on your workers. Training for new employees is available. We also provide comprehensive yearly training webinars and other presentations. Whatever training you use, be sure that it adapts to keep your users current with the rapidly evolving threat landscape.</p>
<p><strong>Do you provide password management tools to users?</strong> Tools that remember and automatically enter users’ passwords can help encourage users to use different passwords for every login. Users with the habit of reusing passwords pose a risk to your organization. Once attackers compromise a password, they will attempt to use that same password at popular sites. This practice is sometimes called credential stuffing, and attackers can be very successful at breaking into sites if users reuse passwords. An added benefit is user productivity and user happiness. Ensure the company&#8217;s password manager uses strong encryption to store your passwords securely. Single Sign-On (SSO) is becoming more popular, allowing users to log in once to access multiple sites or resources.</p>
<p><strong>Do you utilize geo-blocking or geo-filtering?</strong> These technologies identify computers, users, and email messages based on geographical locations. You will be more secure if you block email and login attempts from geographical areas where you never do business and block user logins from countries without users. While attackers can bypass these protections using VPNs, the protections are still helpful.</p>
<p><strong>Are users local administrators?</strong> When you set up a new Windows or Apple computer, the user has local administrator access and can perform many activities, including installing programs. If an attacker manages to compromise that user’s account, the attacker has tremendous power to compromise that computer and potentially your entire organization. This topic is complex, but the goal of every organization must be to ensure all workers are “standard users” on their computers. Being a standard user limits what an attacker can damage and makes the user account more difficult to compromise in the first place. Privilege Access Management (PAM) solutions help manage local admin rights by controlling and monitoring privileged access to critical systems.</p>
<p><strong>Do you segment your network?</strong> Network segmentation splits your network into smaller parts based on the purpose or type of device. For example, suppose you isolate your security cameras from your servers on a different network segment, such as a subnet or VLAN. If an attacker breaks into a security camera, segmentation can block their ability to hack your servers through the camera. Common segments include:</p>
<p>-Servers<br />
-Desktops and Laptops<br />
-Wireless Network<br />
-VPN users<br />
-Security cameras<br />
-VoIP systems<br />
-Different floors in your building or different buildings on your campus</p>
<p>It is possible to over-segment and create too much work for your IT Team, but that rarely happens. Your team will set up Access Control List (ACL) rules that limit communications between the segments to block unauthorized activities.</p>
<p><strong>Have you established a security baseline for your systems?</strong> Have a documented standard configuration for security controls you enforce on your servers, workstations, and mobile devices.</p>
<p><strong>How soon after release do you apply critical security updates to your devices?</strong> Microsoft, Apple, your firewall manufacturer, and other providers release security updates to programs to block attackers from using previously undetected security holes. You must apply the patches quickly to prevent attackers from exploiting the vulnerabilities. Testing patches before deployment is essential to avoid errors. Staging patches allows you to help ensure they don&#8217;t disrupt your production network. Zero-day patches and updates fix problems that attackers are already using to compromise systems.</p>
<p><strong>Do you allow workers to use family computers or mobile devices to access email and work from home?</strong> Family computers are significantly less secure than company-issued devices that your IT Team manages, monitors and protects 24×7. It is relatively common for organizations to permit users to use their BYOD phones to access company email. Your insurance company could see that as a red flag against providing or renewing a policy. You’ll want to demonstrate other safeguards you use to minimize the risk.</p>
<p><strong>Do you enforce EPP on all devices?</strong> Endpoint protection is a tool your IT Team can use to protect each device on your network. Ask your IT Team. Chances are they’ve implemented this solution. They might use Security Information and Event Management (SIEM) to enhance visibility and response. SIEM systems aggregate and analyze activity from different resources across your IT infrastructure.</p>
<p><strong>Do you utilize EDR/XDR tools?</strong> Using Endpoint Detection and Response (EDR), Extended Detection and Response (XDR), or Managed Detection and Response (MDR) agents on the laptops can increase security by monitoring for malicious behavior known as an indicator of compromise (IoC). EDR/XDR tools provide many benefits, including continuously monitoring network devices and watching for suspicious activities or evidence that an attacker is compromising a system. EDR/XDR is designed to identify, isolate, and mitigate threats. EDR and XDR must be effectively monitored, managed, and updated. One way many organizations ease the burden on their internal IT Teams is to utilize a third-party MSSP to perform these tasks. Managed Detection and Response (MDR) means you pay a third-party provider to manage your EDR/XDR. One key point to remember is that attackers can also obtain these protection tools and continually seek ways to bypass them. We perform Red Team Exercises at companies to test the capabilities of the EDR and XDR protections. Do not make the common mistake of letting your guard down in other security areas after implementing EDR or XDR.</p>
<p><strong>How frequently do you conduct internal and external security audits, vulnerability assessments, penetration tests, and Red Team Exercises?</strong> These tests identify previously undiscovered weaknesses in your security. Please get in touch with us if you need these services as part of a comprehensive security advisory service for executives to help them secure their organizations. We guide and become a resource for your existing IT team rather than replacing them.</p>
<p><strong>Does your spam filter scan messages and attachments for malicious links?</strong> If the answer is no, you need to add these features immediately.</p>
<p><strong>Do you use web filtering and DNS filtering?</strong> Web filtering features, often integrated with firewalls, allow your IT team to block known malicious sites, gambling, and other categories of websites. Domain Name Service (DNS) maps URL website names to addresses of servers on the web. DNS filtering services strive to identify malicious web servers and automatically block communications from your network to them. As a bonus, some services permit you to hinder users from accessing sites you might deem inappropriate.</p>
<p><strong>Do you use SPF for email messages?</strong> The Sender Policy Framework is a protective solution that your IT Team can enable to permit your email servers to confirm that inbound email messages came from an approved server rather than a fraudster impersonating or spoofing a legitimate source. While they are at it, your IT Team can enable DKIM to help other organizations’ mail servers confirm that messages they receive from you are legitimate and unaltered. They can configure DMARC to tell remote email servers to throw away messages from fraudsters attempting to impersonate your organization. It is essential to regularly review your SPF, DKIM, and DMARC records to adapt to the changing configurations and threat landscape.</p>
<p><strong>Do you identify storage locations and isolate PII, PHI, and other sensitive data?</strong> Determining where you store Personally Identifiable Information (PII), Protected Health Information (PHI), Cardholder Data (CHD), and other sensitive information is essential. Knowing where to store sensitive information is a fundamental step in protecting it. Do you keep the information isolated and protected? This identification and isolation is becoming even more critical due to the integration of AI into organizations, which might give AI access to company information.</p>
<p><strong>Do you use role-based access control (RBAC) to limit user access based on their job functions, and how do you manage and monitor privileged accounts? </strong>Role-Based Access Control (RBAC) ensures that users only have access to the data and systems necessary for their specific job functions. This minimizes the risk of unauthorized access to sensitive information. Privileged accounts with higher access levels are managed through Privilege Access Management (PAM) solutions that monitor and control their use, reducing the risk of misuse or compromise. Regular audits and real-time monitoring of these accounts are essential to detect and respond to suspicious activities.</p>
<p><strong>Do you encrypt sensitive data at rest and in transit, and what encryption standards do you use? </strong>Encryption is critical for protecting sensitive data when it is stored (at rest) and transmitted (in transit). Encryption standards such as Advanced Encryption Standard (AES) with 256-bit keys are commonly used to ensure robust security. Data at rest is encrypted to protect it from unauthorized access, even if physical security is breached. Data in transit is encrypted using protocols like TLS (Transport Layer Security) to prevent interception during transmission over networks.</p>
<p><strong>How do you assess and manage third-party vendors&#8217; cybersecurity risks and ensure vendors follow appropriate security practices? </strong>Third-party vendors can introduce significant cybersecurity risks. Assessing these risks involves regular security evaluations and audits of the vendors&#8217; practices. It’s important to have contracts that require vendors to follow appropriate security practices tailored to their roles and services. Continuous monitoring and periodic reassessments ensure that vendors maintain the required security posture over time. Organizations can manage risks by working collaboratively with vendors to meet security expectations without imposing stringent certification requirements.</p>
<p><strong>Do you use firewalls, intrusion detection/prevention systems (IDS/IPS), and other network security measures? </strong>Firewalls act as a barrier between the internal network and external threats, controlling incoming and outgoing traffic based on predetermined security rules. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) monitor network traffic for suspicious activities and take action to prevent potential breaches. These network security measures are crucial for protecting against unauthorized access and cyberattacks.</p>
<p><strong>How do you secure remote access to your network? </strong>Securing remote access involves implementing measures such as Virtual Private Networks (VPNs), which encrypt the connection between remote users and the corporate network. Your IT professionals must manage remote devices to help increase security. Multi-factor authentication (MFA) adds an extra layer of security by requiring additional verification steps beyond just a password. Additionally, restricting remote access to only essential personnel and monitoring for unusual login activities are critical components of a secure remote access strategy. This is an extensive topic; please let us know if you want more information.</p>
<p><strong>What physical security measures do you have in place to protect your data centers and offices? </strong>Physical security measures are essential to protect data centers and office premises from unauthorized access. These measures include access control systems like key cards or biometric scanners, surveillance cameras, and security personnel. Secure facilities should also have environmental controls such as fire suppression systems and backup power supplies to safeguard against physical threats and disasters. The Foster Institute offers full-scale Physical Red Team Exercises to test your physical security measures.</p>
<p><strong>Are you compliant with relevant regulations and industry standards, such as GDPR, HIPAA, PCI-DSS, or ISO/IEC 27001, and how do you ensure ongoing compliance with these standards? </strong>Compliance with regulations and industry standards demonstrates a commitment to maintaining high security and privacy standards. Regular audits and assessments help ensure compliance with frameworks such as GDPR (General Data Protection Regulation), HIPAA (Health Insurance Portability and Accountability Act), PCI-DSS (Payment Card Industry Data Security Standard), and ISO/IEC 27001. Ongoing compliance is maintained through continuous monitoring, employee training, and updates to policies and procedures as standards evolve. Please let us know if you need help with achieving or maintaining compliance. The Foster Institute, Inc. can simplify and manage the process for you.</p>
<p><strong>How do you secure mobile devices employees use to access company data and use mobile device management (MDM) solutions to enforce security policies on mobile devices? </strong>Mobile Device Management (MDM) solutions enforce security policies on employees&#8217; mobile devices that access company data. These solutions can remotely manage and secure devices, ensuring they comply with organizational security standards. Features include enforcing strong passwords, encrypting data stored on the device, and remotely wiping data if a device is lost or stolen. This ensures that mobile devices do not become a weak point in the company&#8217;s overall security posture.</p>
<p><strong>Do you store backups offline or on immutable storage?</strong> If an attacker gains access with the intent of encrypting or deleting data to demand ransom, they might attempt to destroy your ability to restore. They know you’re more likely to pay the ransom if you cannot restore sensitive data. So, you must isolate some backup data so the attacker cannot damage it. It is essential to have backups that threat actors cannot delete or damage if they break into your network. Immutable storage is data stored where you can access it, but no users, not even your administrators, can delete or alter the backup files. Cloud providers, such as Microsoft, offer immutable cloud storage. Other devices use write-once-read-many (WORM) technology to store data immutably. Offline backup is disconnected from your network. Some companies might use backup tapes or hard drives disconnected from the network and store them in a safe location for offline storage. Other organizations have a secondary network, isolated from the primary network, dedicated to their backup servers; the only connection is a server that transfers production network data to the backup network. It is best to store backups in diverse locations for redundancy and eliminate any single points of failure.</p>
<p><strong>Do you encrypt your backups?</strong> If an unauthorized person accesses your backup data, it is useless if they cannot read the contents. Encryption is a setting in your backup software. There was a time when people wouldn’t encrypt backups because the backups would take much longer. With today’s technology, there should be little added time.</p>
<p><strong>How often do you practice the restore process?</strong> If you have never practiced your complete restore process, do it now. Many organizations find out they cannot restore from their backups. Often, their failed attempt was the first time they’d ever tried to restore. It can be complicated to perform a test restore, so be prepared to give your IT Team additional time. If you outsource your IT, it is understandable that they’ll charge you for practicing the restore. Always perform restore tests in a controlled environment, separate from your production systems.</p>
<p><strong>How long will it take to restore your data from backups?</strong> When you practice your complete restore process, measure the time it takes to restore. If you find out the duration is too long, you can take steps to speed up the process.</p>
<p><strong>What steps do you take to prevent ransomware attacks?</strong> This space on the insurance application allows you to list the items above in statement form. Almost all security measures you use can protect against ransomware attacks or limit the impact.</p>
<p><strong>Do you have a documented Disaster Recovery Plan (DRP) and Business Continuity Plan (BCP) in place?</strong> Documented disaster recovery plans demonstrate that you’ve thought through the processes required to recover from disruptive events. These plans should outline specific procedures for data recovery, system restoration, and maintaining business operations during and after an incident.</p>
<p><strong>Do you conduct disaster recovery drills?</strong> Regular drills ensure your team is prepared to execute the DRP and BCP effectively. These drills can be as basic as tabletop exercises, where team members discuss their roles and responses to hypothetical scenarios, or as comprehensive as full-scale exercises that simulate actual disaster conditions and involve all aspects of the organization.</p>
<p>These are some of the most common questions on our customer’s insurance policy application and renewal forms. If you find others, please reach out for guidance.</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/questions-cyber-insurance-companies-will-ask-you/">Demystifying Questions Cyber Insurance Companies Will Ask You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Short List of Essential Cybersecurity Statistics Exposes Attackers and Can Help You Secure Your Systems</title>
		<link>https://fosterinstitute.com/short-list-of-essential-cybersecurity-statistics-exposes-attackers-and-can-help-you-secure-your-systems/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 10 Jan 2023 16:52:41 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Supporting IT Professionals]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5361</guid>

					<description><![CDATA[<p>Verizon&#8217;s 2022 Data Breach Investigation Report reveals some interesting information from extensive worldwide research. In North America, System Intrusion (Now up to 80%) attacks surpass Social Engineering (down to 20%). System Intrusion is when attackers gain access to networks, plant ransomware, establish remote access, and otherwise compromise data and processes in a network. 90% of [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/short-list-of-essential-cybersecurity-statistics-exposes-attackers-and-can-help-you-secure-your-systems/">Short List of Essential Cybersecurity Statistics Exposes Attackers and Can Help You Secure Your Systems</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Verizon&#8217;s 2022 Data Breach Investigation Report reveals some interesting information from extensive worldwide research.</p>
<p>In North America, System Intrusion (Now up to 80%) attacks surpass Social Engineering (down to 20%). System Intrusion is when attackers gain access to networks, plant ransomware, establish remote access, and otherwise compromise data and processes in a network.</p>
<p>90% of system intrusion attacks in North America were performed by threat actors external to the company. But the 10% of internal attacks highlights the concern of insider threats. Insider threat is when someone working for an organization accidentally or intentionally gives attackers access.</p>
<p>In North America, the motivation for attacks are:<br />
For financial gain: 96%<br />
Espionage and spying: 3%<br />
Grudges and anger: 1%</p>
<p>Of attacks in North America, 14% were caused Primarily by Cloud Security Misconfigurations, highlighting the need to ensure IT professionals are familiar with the complex security settings related to cloud services. An excellent resource for Microsoft Cloud Security is <a href="https://learn.microsoft.com/en-us/microsoft-365/solutions/setup-secure-collaboration-with-teams?view=o365-worldwide#securing-teams-for-sensitive-and-highly-sensitive-data" target="_blank" rel="noopener">https://learn.microsoft.com/en-us/microsoft-365/solutions/setup-secure-collaboration-with-teams?view=o365-worldwide#securing-teams-for-sensitive-and-highly-sensitive-data</a></p>
<p>To see statistics in other parts of the world and overall, you can find the report at <a href="https://www.verizon.com/business/resources/reports/dbir/" target="_blank" rel="noopener">https://www.verizon.com/business/resources/reports/dbir/</a></p>
<p>The post <a href="https://fosterinstitute.com/short-list-of-essential-cybersecurity-statistics-exposes-attackers-and-can-help-you-secure-your-systems/">Short List of Essential Cybersecurity Statistics Exposes Attackers and Can Help You Secure Your Systems</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Reasons to Keep Your Same Outsourced Computer Consultant or Managed Service Provider</title>
		<link>https://fosterinstitute.com/reasons-to-keep-your-same-outsourced-computer-consultant-or-managed-service-provider/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 22:57:37 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Supporting IT Professionals]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5319</guid>

					<description><![CDATA[<p>Our role is to be security advisors to organizations, some of whom outsource their IT services. Executives sometimes express their frustration and ask us whether to fire a Managed Service Provider or third-party IT consulting company that handles all aspects of their IT needs. We always listen to the executive and ask them about specific [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/reasons-to-keep-your-same-outsourced-computer-consultant-or-managed-service-provider/">Reasons to Keep Your Same Outsourced Computer Consultant or Managed Service Provider</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Our role is to be security advisors to organizations, some of whom outsource their IT services. Executives sometimes express their frustration and ask us whether to fire a Managed Service Provider or third-party IT consulting company that handles all aspects of their IT needs. We always listen to the executive and ask them about specific experiences. 99% of the time, organizations are better off sticking with their existing provider, and here are some reasons.</p>
<p>An exception will be if you feel held hostage by them, or if there is some other outstanding reason they’ve failed you. Yes, we&#8217;ve seen horror stories. In those extreme cases, the executives had already decided to fire their outsourced firm.</p>
<p>When we perform cybersecurity consulting, unless the executives ask us to approach it differently, we give the outsourced firm the benefit of the doubt that their intentions are always to provide you with the best service possible. If we encounter a grave security mistake, that&#8217;s one purpose of the audit – for us to catch things like that so your IT providers can fix it. We almost always find at least one gaping hole, which is our specialty. After all, third-party IT companies are responsible for many aspects of your IT operations, while our focus is cybersecurity. Once outsourced IT firms realize we&#8217;re there to help and not replace them or their services, they relax, welcome input, and ask questions about the best way to protect you.</p>
<p>If you move to a new provider, there could be a steep learning curve before they can serve you at the same level. Keep in mind that your IT provider is already familiar with your systems and understands the unique challenges you face. Unless their turnover is high, the professionals that serve you know your team members and maintain a friendly, professional working relationship with them.</p>
<p>If you consider changing providers because some well-meaning person says you have the wrong brands of products, find out if their personal bias is evidence-based. If the specific solution your provider prefers meets all the functionality criteria, it is almost always best to allow your IT Professionals to select brands and vendors they like. They typically prefer particular brands and solutions for important reasons.</p>
<p>For example, their engineers might be most familiar with Cisco, Juniper, SonicWALL, WatchGuard, or one of the many other firewall brands. Most brands, if configured properly, will serve you well. As with automobile repairs, you want a technician familiar with your car&#8217;s brand. If you ask your outsourced IT company to support an unfamiliar product, you&#8217;re putting them in an uncomfortable position. They want to consistently produce excellent outcomes for you, and if you insist that they support a brand they are unfamiliar with, you could be setting them up for failure.</p>
<p>Your outsourced IT firm almost certainly has you set up with specific vendors for your anti-virus, anti-spam, backup solution, etc., because they have automated tools that allow them to monitor and manage your solutions. That efficiency of scale facilitates them taking optimum care of you. Deviating from their standard brands creates unnecessary expense and frustration. For this reason, if you do decide to change providers, prepare yourself for needing to replace some of your software and hardware to conform to the new IT provider&#8217;s preferred configuration.</p>
<p>If your provider is too slow to respond, perhaps they&#8217;re understaffed but have an expedited service option you could invest in to get priority access to their best engineers. Or maybe they have a different brand or product solution that permits them to use streamlined tools, but you&#8217;re still using products a previous IT firm installed.</p>
<p>Without knowing the brands you are using, I cannot say if you&#8217;ve got great ones. I can share that most brands have excellent products and solutions that work well when appropriately configured by knowledgeable professionals who&#8217;ve proven their proficiency by earning certifications on those brands.</p>
<p>Executives sometimes ask if they should seek a cheaper provider. We rarely see third-party IT companies overcharging for services. They are aware of the competitive nature of their business. Consider how much it would cost you if all your systems were down, and the investment you pay your IT support firm is probably worth it.</p>
<p>Yes, your IT provider might be priced higher, but consider their level of professionalism too. Are they quick to reply when you need them? Do they fix issues the first time?</p>
<p>It can be an excellent sign if you feel you don&#8217;t need your provider because you never have any problems. That can indicate that your IT firm is taking such good care of the inner workings of your systems that everything runs smoothly for you. If you did terminate your IT provider, things could start falling apart slowly, without being observable, until everything stacks up to the point when you suffer a disaster.</p>
<p>If you wonder if they are competent, consider asking them for a list of certifications they&#8217;ve earned from Microsoft, Cisco, or the brands and technologies they provide and support for you. If they&#8217;re not certified, encourage them to take the training and pass the tests. Certifications often involve significant expense and time, so don&#8217;t expect them to earn the credentials overnight. Passing the certificate will be a breeze if they&#8217;re already knowledgeable about the products they support. And during the training, they might find new ways to help your organization without you needing to buy more stuff. Everyone benefits.</p>
<p>Your firm may not have top-level cybersecurity certifications. Cybersecurity is a complicated and rapidly evolving field that requires intense specialization. We never have expectations that third-party computer services companies know everything there is to know about cybersecurity. We expect them to be open to cybersecurity recommendations. We&#8217;re thrilled to discuss and answer their questions as they tune the solutions from brands they sell and support.</p>
<p>As cybersecurity advisors, it is rewarding to see and facilitate, if necessary, our customers strengthening their relationship with their MSPs and other third-party IT firms. Sometimes it is a matter of us helping you identify the pros and cons of the add-on cybersecurity packages your provider offers. Or, if their package isn&#8217;t the perfect fit, sometimes you can negotiate the offerings to get the best solution.</p>
<p>Please forward this to your friends if they wonder if they should change to a new outsourced IT consulting firm. As long as they&#8217;re well-staffed, competent, and professional, there are many advantages to staying with the company with whom they have an established working relationship.</p>
<p>The post <a href="https://fosterinstitute.com/reasons-to-keep-your-same-outsourced-computer-consultant-or-managed-service-provider/">Reasons to Keep Your Same Outsourced Computer Consultant or Managed Service Provider</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Make Logging into Websites and Networks a Happier Experience Using One-Tap Login</title>
		<link>https://fosterinstitute.com/make-logging-into-websites-and-networks-a-happier-experience-using-one-tap-login/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 21 Jan 2022 00:38:17 +0000</pubDate>
				<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Supporting IT Professionals]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5103</guid>

					<description><![CDATA[<p>Sometimes, when you log in, you must enter a code you receive by text or from an app on your phone. However, if you use one-tap login, all you need to do is click a checkmark on your phone&#8217;s screen. Some organizations, including Microsoft, give you the option to skip the password component altogether. Your [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/make-logging-into-websites-and-networks-a-happier-experience-using-one-tap-login/">Make Logging into Websites and Networks a Happier Experience Using One-Tap Login</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Sometimes, when you log in, you must enter a code you receive by text or from an app on your phone. However, if you use one-tap login, all you need to do is click a checkmark on your phone&#8217;s screen.</p>



<p>Some organizations, including Microsoft, give you the option to skip the password component altogether. Your users will be so happy not to need passwords anymore. Your IT Professionals will be so happy not to deal with resetting users&#8217; passwords. Learn more at <a href="https://fosterinstitute.com/microsoft-lets-you-stop-using-passwords/" target="_blank" rel="noreferrer noopener">https://fosterinstitute.com/microsoft-lets-you-stop-using-passwords/</a></p>



<p>You can let your IT Pros choose which service. Options include Duo Security, PhoneFactor, Entrust, SecureID, Google, and more. (The Foster Institute doesn’t receive any kind of compensation for mentioning brand names, nor do we endorse any of those organizations.)</p>



<p>Please forward this to your friends, so they know how logging in can be more fun.</p>
<p>The post <a href="https://fosterinstitute.com/make-logging-into-websites-and-networks-a-happier-experience-using-one-tap-login/">Make Logging into Websites and Networks a Happier Experience Using One-Tap Login</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Executives: Celebrate IT Appreciation Days</title>
		<link>https://fosterinstitute.com/executives-celebrate-it-appreciation-days/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 23 Dec 2021 19:18:25 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Supporting IT Professionals]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5082</guid>

					<description><![CDATA[<p>Technical issues happen all the time, and you don&#8217;t hear about them because your IT professionals solve the problem efficiently and quietly. They use their skills and experience to perform monumental feats every month, and most executives have no idea what their professionals accomplished. Once, a CEO told me that he thought he should fire [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/executives-celebrate-it-appreciation-days/">Executives: Celebrate IT Appreciation Days</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Technical issues happen all the time, and you don&#8217;t hear about them because your IT professionals solve the problem efficiently and quietly. They use their skills and experience to perform monumental feats every month, and most executives have no idea what their professionals accomplished.</p>



<p>Once, a CEO told me that he thought he should fire all three of his IT Pros because they never did anything. I asked him about the stability of his network. He responded that nothing ever goes wrong. I gently smiled and explained that if everything is working fine, that means his team is working diligently behind the scenes to keep it that way.</p>



<p>In some organizations, IT professionals rarely get noticed until something is wrong. They may be working many more hours than you pay them for or that you expect from them. COVID creates constant challenges for them, too, as they keep your systems flexible to meet demands. And your workers sometimes ask for help on the same day your IT team planned to implement a significant update or reconfiguration.</p>



<p>Your internal and outsourced IT professionals are courageous, patient, experienced, and have bulldog tenacity to solve every problem you assign. They must research and be in a constant learning mode because technology changes so rapidly.</p>



<p>You&#8217;ve got superheroes supporting you! Remember them every time you log in. As you make new year’s resolutions, consider scheduling IT appreciation days for 2022! They deserve them.</p>



<p>Happy Holidays!</p>
<p>The post <a href="https://fosterinstitute.com/executives-celebrate-it-appreciation-days/">Executives: Celebrate IT Appreciation Days</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Help Your Third-Party Providers Be More Secure Because Your Security is Only as Good as Their Security</title>
		<link>https://fosterinstitute.com/help-your-third-party-providers-be-more-secure-because-your-security-is-only-as-good-as-their-security/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 12 Nov 2021 18:16:11 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Supporting IT Professionals]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5017</guid>

					<description><![CDATA[<p>Below is a letter you can send your third-party service providers if you want to give them pointers on being more secure. We’ve done the work to make this quicker for you. None of these are unreasonable for you to request. You and your IT team can customize the letter to fit the relationship best. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/help-your-third-party-providers-be-more-secure-because-your-security-is-only-as-good-as-their-security/">Help Your Third-Party Providers Be More Secure Because Your Security is Only as Good as Their Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Below is a letter you can send your third-party service providers if you want to give them pointers on being more secure. We’ve done the work to make this quicker for you.</p>



<p>None of these are unreasonable for you to request. You and your IT team can customize the letter to fit the relationship best. These recommendations apply even if a company doesn’t have servers and do all of their work in the cloud.</p>



<p>Dear – you fill in the blank,</p>



<p>We are checking in with all of our valued service providers, including you. If your organization suffers a significant security incident, you might not be able to provide the service we count on from you. A security breach at your organization could impact our business too. In the interest of helping you protect your organization, here are some guidelines:</p>



<p>You must have a robust disaster recovery plan. You must be able to recover quickly if you lose access to your information. Your IT team needs to practice restoring because experiencing ransomware is not the best time to practice restoring all of your data for the first time.</p>



<p>It is essential that your IT team, or IT company, manage the security of all of your computers, including the computers any work from home employees use. Your IT professionals need to monitor the security update status, manage anti-virus, and perform other administrative functions that help protect the computers that your workers use.</p>



<p>Please discuss with your IT team or IT company how quickly they deploy critical security updates to your computers. Security updates sometimes cause issues, so it is best to test updates, especially server updates if you have servers, before deploying them. Because the updates often prevent attacks, there is a level of urgency.</p>



<p>Remove programs you aren’t using. Attackers sometimes gain access to your systems through programs, and they cannot exploit a program that’s not installed. Flash is an example of a program installed on many computers, but it provides a security risk. Your IT team can give you the details and identify other programs they can remove from computers to increase security.</p>



<p>Ask your IT team to make sure to make your user accounts a “standard local user” on your computers. This one step can increase your security immensely. By default, users are local administrators on their computers. This setting applies to Mac and Windows computers. If an attacker breaks into their computer, they will have elevated abilities to conquer your security protections if the user is a local administrator.</p>



<p>Enable two-step verification on all the websites that require a login. In its most basic form, once a two-step login feature is enabled, when a user enters a username and password, their phone will receive a text message with a code to complete the login process. This added protection helps you tremendously if an attacker steals one of your website passwords. The setting is usually in the security settings of the website. Three places two-step login is essential:</p>



<p>-SaaS programs your users run in the cloud. Zoom, QuickBooks Online, an ERP, G Suite, Office 365, and SalesForce are SaaS offerings.<br>-VPN Connections<br>-Remote Desktop Connections</p>



<p>Realize that connecting from public networks, including coffee shops and hotels, is risky, even if the user uses a VPN. It is more secure to use a phone or personal hot-spot to connect a computer to the Internet. The added phone charges may be lower than you expect, especially if you change to a plan with unlimited data.</p>



<p>Please forward this to your service providers; it can help prevent big heartaches and expenses for you and them.</p>
<p>The post <a href="https://fosterinstitute.com/help-your-third-party-providers-be-more-secure-because-your-security-is-only-as-good-as-their-security/">Help Your Third-Party Providers Be More Secure Because Your Security is Only as Good as Their Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>If You Outsource Your IT, it is Their Job to Keep You Happy, Not the Other Way Around.</title>
		<link>https://fosterinstitute.com/if-you-outsource-your-it-it-is-their-job-to-keep-you-happy-not-the-other-way-around/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 01 Oct 2021 14:21:01 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Supporting IT Professionals]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=4967</guid>

					<description><![CDATA[<p>After we performed a cybersecurity audit for a company many years ago, the President and CEO assigned the recommendations to their IT consulting firm. What is different about this lead executive is that he gently applies firm pressure on their IT consultants to complete the recommended improvements. He&#8217;s kind and respectful to his consulting company, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/if-you-outsource-your-it-it-is-their-job-to-keep-you-happy-not-the-other-way-around/">If You Outsource Your IT, it is Their Job to Keep You Happy, Not the Other Way Around.</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>After we performed a cybersecurity audit for a company many years ago, the President and CEO assigned the recommendations to their IT consulting firm. What is different about this lead executive is that he gently applies firm pressure on their IT consultants to complete the recommended improvements. He&#8217;s kind and respectful to his consulting company, communicates expectations, asks many questions, and involves himself in cybersecurity decisions.</p>



<p>I admire seeing how he communicates, and I&#8217;ve asked his secret. He tells me he focuses on his responsibility to protect his workers&#8217; and customers&#8217; sensitive information. Everything else falls into place.</p>



<p>If the consultants need to charge money to implement changes, he asks us if we feel the price is fair and then decides. He makes sure his consultants know he&#8217;s holding them accountable by bringing us back every year to audit the systems and provide new recommendations.</p>



<p>The outsourced computer consulting company was never upset and eagerly followed the executive&#8217;s directives. The IT firm has great respect for the executive because of his bold leadership. I admire the proficiency of his IT consulting firm in meeting requirements, even when they are surprised a customer has higher expectations than most of their other customers.</p>



<p>Fast forward many years: This company is, and continues to be, one of the most secure customers we have. The leader&#8217;s no-nonsense approach to cybersecurity works best. Thieves might have stolen the air conditioning compressor units from outside their buildings, but no hackers have broken into their network!</p>



<p>If you outsource IT, your consultant company respects that you make the decisions. They&#8217;ll welcome audit recommendations and your directives if you&#8217;re willing to pay a fair fee. Their goal is to keep you happy, not the other way around.</p>



<p></p>
<p>The post <a href="https://fosterinstitute.com/if-you-outsource-your-it-it-is-their-job-to-keep-you-happy-not-the-other-way-around/">If You Outsource Your IT, it is Their Job to Keep You Happy, Not the Other Way Around.</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protect Against Work From Home Computer Attacks Compromising your Primary Network</title>
		<link>https://fosterinstitute.com/protect-against-work-from-home-computer-attacks-compromising-your-primary-network/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 13 Aug 2021 20:05:59 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Supporting IT Professionals]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=4864</guid>

					<description><![CDATA[<p>Tell your IT provider, or internal IT team, that you want them to isolate or filter the VPN connections. At least discuss this security step with them. If any users connect via VPN to your office, be sure your IT team isolates or filters the data that travels from the VPN connections to your primary [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/protect-against-work-from-home-computer-attacks-compromising-your-primary-network/">Protect Against Work From Home Computer Attacks Compromising your Primary Network</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Tell your IT provider, or internal IT team, that you want them to isolate or filter the VPN connections. At least discuss this security step with them.</p>



<p>If any users connect via VPN to your office, be sure your IT team isolates or filters the data that travels from the VPN connections to your primary network. Filter the data going back too. If the VPN data comes directly, or unfiltered, into your network, that facilitates an attacker gaining access to your primary network if they compromise a remote worker&#8217;s computer.</p>



<p>(The rest of this message is a bit technical. You can forward this to your IT team if you wish. Please forward this message to fellow executives so they can consider this strong security protection.)</p>



<p>Their router or firewall might already provide an option to filter the traffic. Default settings are usually weak, so ask your IT team to enable the feature. The filtering must happen, not in a computer, but in an infrastructure device such as a firewall, router, or switch.</p>



<p>You can share this example with your IT team: If the IP address for the primary network is 10.10.10.0, then it is dangerous for the VPN connections to connect to the same subnet. It is helpful, for cybersecurity, to use separate filtered subnets. Here is an example of segmenting the VPN connections away from the primary network:</p>



<p><br>10.1.1.0 &#8211; Primary Network<br>10.1.2.0 &#8211; VPN Connections</p>



<p>The addresses might start with 172 or 192.168, and that isn&#8217;t important. Your IT team knows the significance of using different classes of numbers.</p>



<p>Your IT team must establish robust filtering rules in the firewall, router, or switch to limit the VPN connections and the internal network traffic. Rules are sometimes called ACLs (Access Control Lists).</p>



<p>When creating the rules, your IT team must only allow traffic essential for remote users. They can filter using parameters including source IP, destination IP, protocol, and ports. Sometimes, the only protocol remote users need is RDP (Remote Desktop Protocol).</p>



<p>If the rules permit, ask your IT team to block connections from countries other than where your remote users will connect.</p>
<p>The post <a href="https://fosterinstitute.com/protect-against-work-from-home-computer-attacks-compromising-your-primary-network/">Protect Against Work From Home Computer Attacks Compromising your Primary Network</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
