<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Technology Security Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/technology-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/technology-security/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Thu, 01 Feb 2024 23:31:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Technology Security Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/technology-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Consequences of Infrastructure Disruptions: A Realistic Assessment for Business Leaders</title>
		<link>https://fosterinstitute.com/consequences-of-infrastructure-disruptions-a-realistic-assessment-for-business-leaders/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 01 Feb 2024 23:27:15 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[Workplace Safety]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5730</guid>

					<description><![CDATA[<p>This article outlines some realistic consequences of major infrastructure disruptions and provides insights into how these might affect business functionality and employee well-being. By understanding these possibilities, leaders can better strategize and fortify their businesses against unforeseen disruptions, ensuring resilience and continuity. &#160; Considerations for Workplace Operations Loss of Electricity: Without power, most businesses would [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/consequences-of-infrastructure-disruptions-a-realistic-assessment-for-business-leaders/">Consequences of Infrastructure Disruptions: A Realistic Assessment for Business Leaders</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This article outlines some realistic consequences of major infrastructure disruptions and provides insights into how these might affect business functionality and employee well-being. By understanding these possibilities, leaders can better strategize and fortify their businesses against unforeseen disruptions, ensuring resilience and continuity.</p>
<h3></h3>
<p>&nbsp;</p>
<h3><strong>Considerations for Workplace Operations</strong></h3>
<p><strong>Loss of Electricity:</strong> Without power, most businesses would experience an immediate halt in operations. This affects everything from lighting to the operation of computers and machinery. Companies that do not have backup power sources might be unable to continue any form of production or service delivery.</p>
<p><strong>Water Supply Disruption:</strong> The loss of water would impact sanitary conditions and halt processes that require water, affecting sectors like manufacturing, food and beverage, and healthcare services. It also raises serious concerns for employee welfare at workplaces.</p>
<p><strong>Natural Gas Outage:</strong> For companies relying on natural gas for heating or as a part of their production process, a disruption would halt operations and affect the heating and comfort of work environments, especially in colder climates.</p>
<p><strong>Communication Breakdown:</strong> The loss of phone and cell services would severely disrupt communication, both internally among staff and externally with clients, suppliers, and partners. This could lead to breakdowns in coordination, missed opportunities, and a drop in customer service quality.</p>
<p><strong>Shipping and Logistics Challenges:</strong> The inability of shipping companies to operate would disrupt supply chains, leading to shortages of materials and products. This would cascade, causing production delays and potentially leading to financial losses.</p>
<p><strong>Food Service Disruptions:</strong> If restaurants and food services cannot operate, it could affect food availability for employees, especially for businesses that rely on nearby food services for staff meals.</p>
<p><strong>Manufacturing Disruptions:</strong> Manufacturing operations would be severely impacted, especially those reliant on continuous processes. This could lead to significant financial losses and contractual penalties.</p>
<p><strong>Financial Impact:</strong> The cumulative effect of these disruptions would be substantial financial losses due to halted operations, spoiled goods, contractual penalties, and loss of business opportunities.</p>
<p><strong>Unusable Work Environment:</strong> Inability to see or work due to power outages, coupled with extreme hot or cold conditions, would affect productivity.</p>
<p><strong>Employee Safety and Morale:</strong> The safety and morale of employees would be significantly affected. Companies may face challenges in maintaining workforce engagement and productivity during such crises.</p>
<p><strong>Employee Prioritization of Family Needs:</strong> With schools closing and potential dangers at home, employees would naturally prioritize the safety and well-being of their families. This would result in increased absenteeism and a significant decrease in workforce availability.</p>
<p><strong>Dependency on External Aid:</strong> Companies would be heavily reliant on external assistance, whether from government aid, emergency services, or community support, to navigate through the crisis.</p>
<p><strong>Long-Term Recovery Challenges:</strong> Even after services are restored, businesses would face challenges in resuming operations, managing backlogs, and dealing with the financial and operational aftermath.</p>
<p>&nbsp;</p>
<h3><strong>Challenges You and Your Employees May Face in Personal Life</strong></h3>
<p>And just as important, how will you support your workers as they face the challenges at home with their immediate and extended families? How will you take care of your family? Here are some of the challenges that company leaders can consider to help employee well-being:</p>
<p><strong>Food Supply Issues:</strong> The lack of electricity would lead to food spoilage at stores and homes, creating a food scarcity crisis. Companies should consider ways to support their employees with necessities in such scenarios.</p>
<p><strong>Cooking and Sanitation Challenges:</strong> Without electricity or gas, cooking would become a significant challenge. Lack of water would also impact basic sanitation, including dishwashing and toilet flushing.</p>
<p><strong>Automobile Fuel Shortage:</strong> Fuel pumps would cease to function without electricity, leading to a fuel shortage. This would impact employees&#8217; ability to commute, further reducing workforce availability and potentially halting any operations involving transportation. Work from home is not an option when Internet connections are down.</p>
<p><strong>Increase in Crime:</strong> A breakdown in public services could lead to increased theft and other crimes, as law enforcement may be overstretched or focused on their own families&#8217; safety. Companies must enhance their security measures to protect their assets and personnel.</p>
<p><strong>Hygiene and Health Concerns:</strong> The lack of water and proper sanitation facilities could lead to hygiene issues and the spread of diseases. This would have a direct impact on employee health and absenteeism.</p>
<p><strong>Inadequate Healthcare Services:</strong> Healthcare facilities might be overwhelmed or incapacitated, limiting access to medical services. This could exacerbate health issues among employees and their families.</p>
<p><strong>Payment and Transaction Challenges:</strong> With credit card machines down, transactions must be conducted in cash, a medium that might become scarce. This would affect both personal transactions and business operations.</p>
<p><strong>Lack of Resilience and Knowledge:</strong> Most people are accustomed to modern infrastructure and might not be resilient to such a drastic change. This could lead to widespread panic and confusion, affecting mental health and the ability to cope with the situation.</p>
<p><strong>Influx of Refugees:</strong> Should your area maintain functional infrastructure, expect an influx of refugees from impacted zones. This could stretch your community&#8217;s resources thinner, intensifying issues like food scarcity, healthcare access, and public safety.</p>
<p>&nbsp;</p>
<h3><strong>Steps to Take:</strong></h3>
<p>Be sure to see the article about ways to make your organization more resilient <a href="https://fosterinstitute.com/executive-guide-to-navigating-power-internet-and-infrastructure-disruptions/" target="_blank" rel="noopener">https://fosterinstitute.com/executive-guide-to-navigating-power-internet-and-infrastructure-disruptions/</a></p>
<h3></h3>
<h3><strong>Conclusion:</strong></h3>
<p>The ramifications of a disruption in a nation&#8217;s infrastructure extend far beyond the workplace, affecting every aspect of employees&#8217; lives and, by extension, the overall resilience of the business. Leaders must, therefore, not only focus on fortifying their operational infrastructures but also invest in strategies that support their workforce in times of crisis.</p>
<h3></h3>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>The post <a href="https://fosterinstitute.com/consequences-of-infrastructure-disruptions-a-realistic-assessment-for-business-leaders/">Consequences of Infrastructure Disruptions: A Realistic Assessment for Business Leaders</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Executive Guide to Navigating Power, Internet, and Infrastructure Disruptions</title>
		<link>https://fosterinstitute.com/executive-guide-to-navigating-power-internet-and-infrastructure-disruptions/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 01 Feb 2024 22:16:45 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[Workplace Safety]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5727</guid>

					<description><![CDATA[<p>It&#8217;s imperative for business leaders to consider how their companies can remain resilient during possible disruptions of their country’s infrastructure for utilities. Expand your disaster recovery and business continuity plans to include: Envisioning the Business Impact: Understanding the potential consequences of an infrastructure attack is critical. This includes being aware of how a loss of [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/executive-guide-to-navigating-power-internet-and-infrastructure-disruptions/">Executive Guide to Navigating Power, Internet, and Infrastructure Disruptions</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It&#8217;s imperative for business leaders to consider how their companies can remain resilient during possible disruptions of their country’s infrastructure for utilities. Expand your disaster recovery and business continuity plans to include:</p>
<p><strong>Envisioning the Business Impact</strong>: Understanding the potential consequences of an infrastructure attack is critical. This includes being aware of how a loss of electricity or water supply, communication breakdowns, or disruptions in shipping and logistics can impact your business. It’s not about anticipating doom; it&#8217;s about recognizing and planning for possible business interruptions.</p>
<p><strong>Interrupted Cloud Connectivity</strong>: In this digital age, many companies have transitioned to cloud-based operations. It&#8217;s crucial to acknowledge that while cloud services offer tremendous benefits, they also present unique challenges, especially in scenarios of power failures and internet outages. Be sure your business continuity and disaster recovery plans consider periods of limited or no access to cloud services, including critical functions like email.</p>
<p><strong>Emergency Communication Plan</strong>: Diversification in communication methods is key. Developing a plan that extends beyond digital and cellular networks can ensure continuous operations. Alternatives like two-way radios, messengers, and satellite phones for key personnel are not just about crisis management, but about maintaining uninterrupted communication channels under various circumstances.</p>
<p><strong>Financial Resilience</strong>: Financial strategies that encompass scenarios like cash-based transactions and alternative payroll methods demonstrate foresight in financial planning. It&#8217;s about ensuring that your business remains operational and your employees are taken care of, regardless of the situation.</p>
<p><strong>Supply Chain Resilience:</strong> In the face of fuel shortages and electricity disruptions, rethinking your supply chain is vital. Local sourcing can reduce dependence on long-distance transport, while increasing buffer stocks of key materials ensures consistent supply flow. Adapting to manual or low-tech inventory management maintains operational continuity when digital systems fail. This strategy is not just about responding to crises; it&#8217;s about proactively creating a robust and flexible supply network for any situation.</p>
<p><strong>Employee Support and Training</strong>: In any challenging situation, the well-being of your workforce is paramount. Educating employees on fundamental resilience skills and establishing support systems for essentials like food and water are not only about disaster readiness but also about nurturing a strong and supportive corporate culture.</p>
<p><strong>Regular Drills and Plan Updates</strong>: Engaging in routine exercises to test and update disaster recovery plans is not just about remaining resilient in worst-case scenarios. It&#8217;s about ensuring that your team is ready and efficient in any form of business interruption, maintaining agility and responsiveness.</p>
<p><strong>Supporting Employees in Crisis</strong>: In any significant disruption, employees will prioritize their families&#8217; needs. Acknowledging and planning for this – through support in food supply, healthcare, and security – is an integral part of maintaining a resilient workforce. The support you provide will encourage employees to remain engaged and productive at your organization during challenging times.</p>
<p><strong>Conclusion:</strong></p>
<p>This article offers essential insights to help your business thrive amidst a wide spectrum of operational challenges. Please forward this to your friends so they can increase their organization’s resilience too.</p>
<p><strong>Comprehensive List of What to Expect:</strong></p>
<p><a href="https://fosterinstitute.com/consequences-of-infrastructure-disruptions-a-realistic-assessment-for-business-leaders/" target="_blank" rel="noopener">https://fosterinstitute.com/consequences-of-infrastructure-disruptions-a-realistic-assessment-for-business-leaders/</a></p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/executive-guide-to-navigating-power-internet-and-infrastructure-disruptions/">Executive Guide to Navigating Power, Internet, and Infrastructure Disruptions</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Safeguard Your Apple iPhones and iPads: Activate the Latest Theft Protection Setting Now!</title>
		<link>https://fosterinstitute.com/safeguard-your-apple-iphones-and-ipads-activate-the-latest-theft-protection-setting-now/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sun, 28 Jan 2024 03:46:40 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Technology Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5714</guid>

					<description><![CDATA[<p>Imagine this: You&#8217;re waiting for a friend, texting them on your iPhone, unaware that a thief is watching you enter your passcode. Moments later, your phone is stolen. In an instant, your Apple life, including Apple Pay, Keychain passwords, and family photos, is at risk. To combat this, Apple&#8217;s iOS 17.3 introduces “Stolen Device Protection”. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/safeguard-your-apple-iphones-and-ipads-activate-the-latest-theft-protection-setting-now/">Safeguard Your Apple iPhones and iPads: Activate the Latest Theft Protection Setting Now!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine this: You&#8217;re waiting for a friend, texting them on your iPhone, unaware that a thief is watching you enter your passcode. Moments later, your phone is stolen. In an instant, your Apple life, including Apple Pay, Keychain passwords, and family photos, is at risk.</p>
<p>To combat this, Apple&#8217;s iOS 17.3 introduces “Stolen Device Protection”. Here’s why activating it is crucial:</p>
<ol>
<li><strong>Face ID/Touch ID Requirement</strong>: Your iPhone will require your Face ID or Touch ID to turn off lost mode or erase the phone.</li>
<li><strong>Time-Delay Security</strong>: Changes to your Apple ID password, iPhone passcode, and key settings now have a one-hour delay.</li>
</ol>
<p><strong>Settings for Theft Protection</strong>:</p>
<ul>
<li>Quick Tip to find specific settings: Open Settings, swipe down slightly, and <strong>use the search box that appears at the top</strong>. You will find all of the settings in <strong>bold</strong> text by searching in Settings:</li>
<li><strong>Software Update</strong>: iOS 17.3 enables Stolen Device Protection.*</li>
<li><strong>Backup</strong>: Check your backup status by searching for <strong>Backup</strong> in Settings.</li>
<li>Use <strong>Face ID</strong> or <strong>Touch ID </strong>so potential thieves won&#8217;t see you enter your passcode.</li>
<li>Activate <strong>Stolen Device Protection</strong>:This is the new setting that spurred me to write this blog for you<strong><br />
</strong></li>
<li>Ensure &#8220;<strong>Find My</strong>&#8221; is enabled on Apple devices. Use iCloud.com/find or the Find My app to be sure tracking works.</li>
</ul>
<p><strong>Other Essential Steps:</strong></p>
<ul>
<li>Have alternate login methods for resetting passwords for apps and websites that use multi-factor and two-step logins.</li>
<li>If you use authentication apps, ensure you configure ways to generate codes or recover keys if you lose or erase your phone.</li>
</ul>
<p><strong>If Your Phone is Stolen</strong>:</p>
<ul>
<li>Act Fast: Use <strong>iCloud.com/find</strong> or the Find My app to enable “lost mode” and track your phone.</li>
<li>Consider Carrier Notification: They can disable phone calls and cellular data but might limit Find My functionality.</li>
<li>Device Erasure: If you have backups, and ways to recover keys in authentication apps, use Find My to erase your device to help prevent data access.</li>
<li>Password Resets: If not erasing your phone, consider resetting passwords for critical accounts if passwords are stored on the phone or if apps login automatically.</li>
</ul>
<p>As always, threat actors will seek ways to bypass this protection. As of now, this feature is a huge leap forward to protect an iPhone and iPad from thieves who see the passcode. Congratulations, and thank you, Apple!</p>
<p>*If your phone or tablet is too old to update to iOS version 17.3 or newer, see <a href="https://fosterinstitute.com/be-prepared-know-the-impact-of-iphone-theft-and-what-to-do-right-now/." target="_blank" rel="noopener">https://fosterinstitute.com/be-prepared-know-the-impact-of-iphone-theft-and-what-to-do-right-now/.</a> for recommendations.</p>
<p>Note: Testing the Stolen Device Protection feature at home may not work, as Apple devices might waive the strict requirements in familiar locations like home or work. You can read all of the details about Apple Stolen Device Protection for iPhone here: <a href="https://support.apple.com/en-us/HT212510" target="_blank" rel="noopener">https://support.apple.com/en-us/HT212510</a></p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h6></h6>
<h6></h6>
<h6></h6>
<h6>Disclaimer: The information provided in this blog is for general informational purposes only. Technology changes constantly, and some of this information might become obsolete or incorrect. We do not endorse or receive compensation for mentioning products, services, or brand names. Any outbound links provided are for your convenience and to get you started, but we cannot guarantee the security or safety of those external websites. Conducting your research and making an informed decision about any products or services mentioned here is essential. We shall not be held responsible for any actions taken based on the information provided.</h6>
<p>The post <a href="https://fosterinstitute.com/safeguard-your-apple-iphones-and-ipads-activate-the-latest-theft-protection-setting-now/">Safeguard Your Apple iPhones and iPads: Activate the Latest Theft Protection Setting Now!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6</title>
		<link>https://fosterinstitute.com/when-you-buy-new-wi-fi-devices-be-sure-they-support-wi-fi-version-6/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 18 Jun 2019 15:39:45 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[wi-fi best practices]]></category>
		<category><![CDATA[wi-fi safety]]></category>
		<category><![CDATA[wi-fi security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security assessment]]></category>
		<category><![CDATA[cybersecuirty awareness training]]></category>
		<category><![CDATA[cybersecurity consultant]]></category>
		<category><![CDATA[it audit]]></category>
		<category><![CDATA[IT review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2973</guid>

					<description><![CDATA[<p>Wi-Fi technology is always changing. When you buy new Wi-Fi equipment, be sure to ask if there is a Wi-Fi version 6 option available. You will increase speed, security, and help futureproof your investment. Wi-Fi version 6 will become the new standard for several reasons: Faster: Wi-Fi version 6 won’t necessarily speed up your network [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/when-you-buy-new-wi-fi-devices-be-sure-they-support-wi-fi-version-6/">When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Wi-Fi technology is always changing. When you buy new Wi-Fi equipment, be sure to ask if there is a Wi-Fi version 6 option available. You will increase speed, security, and help futureproof your investment. Wi-Fi version 6 will become the new standard for several reasons:<span id="more-2973"></span></p>
<p>Faster: Wi-Fi version 6 won’t necessarily speed up your network if you have few wireless devices because it only offers faster speeds when multiple wireless phones, computers, appliances, and other devices connect to the access point. Up to 8 devices can communicate simultaneously with the access points, twice as many as before. The new technology even makes mobile device batteries last longer because Wi-Fi v6 can permit devices to draw less power.</p>
<p>More Secure: The primary security-related feature is mandating a security technology called WPA3. The prior version, WPA2, is more than ten years old and vulnerable to remote password guessing attacks. WPA3 requires an attacker to stay physically close to a network when guessing passwords, and your devices can detect frequent guesses. WPA3 encryption is optional in Wi-Fi v5 but required with Wi-Fi version 6.</p>
<p>Futureproofing and Interoperability: When you buy new devices, they may be so expensive that you don’t replace them for years. The good news is that your old Wi-Fi version 5 devices can work with your new access points, and vice versa, so you don’t need to replace everything immediately. However, over time, replace both to experience all of the benefits of version 6.</p>
<p>Nomenclature: You may have noticed that the Wi-Fi Alliance is ditching the old way of naming wireless technology like 802.11b, 802.11a, etc. Now, they are moving to increase version numbers, starting with Wi-Fi v6. The next version will be v7, then v8, and so on.</p>
<p>Please forward this message to people you know who are buying new Wi-Fi devices so they can seek Wi-Fi v6 certified devices when available. They’ll help futureproof their investment, increase security, and enjoy faster connections in busy environments.</p>
<p>The post <a href="https://fosterinstitute.com/when-you-buy-new-wi-fi-devices-be-sure-they-support-wi-fi-version-6/">When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Mac Vulnerability Permits Unauthorized Login</title>
		<link>https://fosterinstitute.com/mac-vulnerability-permits-unauthorized-login/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 29 Nov 2017 16:25:29 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[High Sierra]]></category>
		<category><![CDATA[Mac Protection]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[Apple operating system]]></category>
		<category><![CDATA[apple risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[enable root user]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[High Sierra Vulnerability]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Mac security]]></category>
		<category><![CDATA[MacOS High Sierra risk]]></category>
		<category><![CDATA[OS Vulnerability]]></category>
		<category><![CDATA[reset root password]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[unauthorized]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2578</guid>

					<description><![CDATA[<p>Apple’s newest operating system has a serious vulnerability that can allow someone else to logon to your Mac. Here’s what to do:  First, see if you are vulnerable. Click on the apple symbol on the top left of your screen, then choose About This Mac. If you have macOS High Sierra, you are probably vulnerable. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/mac-vulnerability-permits-unauthorized-login/">Mac Vulnerability Permits Unauthorized Login</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Apple’s newest operating system has a serious vulnerability that can allow someone else to logon to your Mac. Here’s what to do: <span id="more-2578"></span></p>
<p>First, see if you are vulnerable. Click on the apple symbol on the top left of your screen, then choose About This Mac. If you have macOS High Sierra, you are probably vulnerable. If you have anything else, stop here.</p>
<p>Second, you can protect yourself by making sure nobody other than you can get to your computer. So far, though theoretically possible, the vulnerability has not been exploited remotely unless you have enabled “Share my Screen.” If you feel confident that no bad actors will have access to your computer, you can stop here.</p>
<p>Third, reset the root password. Apple provides the 8 necessary steps at <a href="http://support.apple.com/en-us/HT204012">support.apple.com/en-us/HT204012</a> , Scroll down to the section entitled: Change the Root Password. In their step 7, if the option Edit &gt; Change Root Password is grayed out on your Mac, then instead click the option Edit &gt; Enable Root User and continue with step 8.</p>
<p>Please forward this to everyone you care about that has a Mac.</p>
<p>The post <a href="https://fosterinstitute.com/mac-vulnerability-permits-unauthorized-login/">Mac Vulnerability Permits Unauthorized Login</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protect Yourself and Your Organization – New Ransomware Outbreak with Added Poison</title>
		<link>https://fosterinstitute.com/protect-yourself-and-your-organization-new-ransomware-outbreak-with-added-poison/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 28 Jun 2017 19:31:37 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Petya]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[Added Poison]]></category>
		<category><![CDATA[Click to Play]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[PETYA]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Strong Network]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2508</guid>

					<description><![CDATA[<p>A new strain of Ransomware, dubbed P e t y a, is gaining momentum infecting companies and home users. Worst of all, in addition to holding files ransom until you pay up, it appears to be infiltrating corporate networks to steal usernames and passwords too. Be sure that you: 1. Apply the most recent security [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/protect-yourself-and-your-organization-new-ransomware-outbreak-with-added-poison/">Protect Yourself and Your Organization – New Ransomware Outbreak with Added Poison</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A new strain of Ransomware, dubbed P e t y a, is gaining momentum infecting companies and home users. Worst of all, in addition to holding files ransom until you pay up, it appears to be infiltrating corporate networks to steal usernames and passwords too. Be sure that you:<span id="more-2508"></span></p>
<p>1. Apply the most recent security patches including the ones for Flash and Java.<br />
2. Use click-to-play in your browsers to stop them from automatically running scripts.<br />
3. Be sure all users are local standard users.</p>
<p>Find more details at https://www.fosterinstitute dot com/blog/patching-10-steps-to-seal-the-holes-in-your-armor/</p>
<p>Please forward this to your friends and business associates so they can be sure that they are protected too.</p>
<p>The post <a href="https://fosterinstitute.com/protect-yourself-and-your-organization-new-ransomware-outbreak-with-added-poison/">Protect Yourself and Your Organization – New Ransomware Outbreak with Added Poison</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization</title>
		<link>https://fosterinstitute.com/finally-a-solution-to-solve-what-may-be-the-biggest-cyber-security-risk-at-your-organization/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 12 Dec 2016 17:00:32 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Spam Phishing]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[Wire Transfer Fraud]]></category>
		<category><![CDATA[Authetnic8]]></category>
		<category><![CDATA[Bad Link]]></category>
		<category><![CDATA[Biggest Security Risk]]></category>
		<category><![CDATA[Citrix]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Email Link]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hosted browser]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[malicious websites]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Wire transfer fraud]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2404</guid>

					<description><![CDATA[<p>It happens all the time: A user clicks on a link in an email message, and the computer gets infected. Ransomware can lock up the data on the drive or even your servers. Sensitive data can be stolen, wire transfers attempted, and other bad things can happen. When a user is tricked into clicking on [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/finally-a-solution-to-solve-what-may-be-the-biggest-cyber-security-risk-at-your-organization/">Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It happens all the time: A user clicks on a link in an email message, and the computer gets infected. Ransomware can lock up the data on the drive or even your servers. Sensitive data can be stolen, wire transfers attempted, and other bad things can happen. When a user is tricked into clicking on a bad link, the link instantaneously takes the user to a malicious website. It may even look like a real website or pop-up window. Now the attackers win.</p>
<p>A drastic solution is to <span id="more-2404"></span>uninstall all browsers. Browsers can’t get hacked when they don’t exist. You can switch to hosted browser service that runs browsers in the cloud, not on your computer.</p>
<p>To see how this works, watch the short videos at authentic8 dot com and Citrix dot com/virtualization/secure-browser </p>
<p>This newsletter is targeted to executives who don’t need to understand technology, so you may choose to forward the following technical information to your IT Department.</p>
<p>And please forward this to anyone whose cybersecurity you care about.</p>
<p>For our more technical audience: As of today, only authentic8’s solution supports general web browsing, but both support web applications.</p>
<p>Since these services put security first, and functionality a close second, you may still need a local browser for some applications if they don’t function properly in the hosted browser environment. But, if that is the case, you may be able to remove Flash and Java from your systems to make your local browsers more secure.</p>
<p>The biggest problem with both products is that they do not have a way to be set as the default browser to be used if a user clicks inside an email message. So, if you must leave a local browser installed, your users will still need to be careful about clicking links in email messages. The solution may be available soon.</p>
<p>Hosted browsers still protect your computers during web browsing sessions. And it becomes practically impossible for an attacker to use a hosted browser to access the sensitive data stored on your network drives.</p>
<p>Investigate using a hosted browser for added protection against the many threats on the Internet that exploit browsers and plugins such as Flash and Java.</p>
<p>The post <a href="https://fosterinstitute.com/finally-a-solution-to-solve-what-may-be-the-biggest-cyber-security-risk-at-your-organization/">Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Attackers Can Hack Your Phone Without Having Your Phone</title>
		<link>https://fosterinstitute.com/attackers-can-hack-your-phone-without-having-your-phone/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 18 Nov 2016 15:52:26 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[wi-fi safety]]></category>
		<category><![CDATA[Cell Phone Security]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cloud Hack]]></category>
		<category><![CDATA[Cloud Safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Phone Hack]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2393</guid>

					<description><![CDATA[<p>Phone operating systems store much of the information that you have in your phone in the cloud too. So, attackers stealing information from your phone can be as simple as gaining access to that data in the cloud. Additionally, some of the apps on your phone can mine all of this information and more, even [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/attackers-can-hack-your-phone-without-having-your-phone/">Attackers Can Hack Your Phone Without Having Your Phone</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Phone operating systems store much of the information that you have in your phone in the cloud too. So, attackers stealing information from  your phone can be as simple as gaining access to that data in the cloud. Additionally, <span id="more-2393"></span>some of the apps on your phone can mine all of this information and more, even the amount of electricity left in your battery.</p>
<p>Gaining access to your account can provide everything from photos stored in your phone, to the passwords of Wi-Fi access points to which you&#8217;ve connected to in the past. That is very concerning.</p>
<p>When attackers know your browsing history, your email messages, your past search terms and the links you&#8217;ve clicked, they can use that information to perform very effective attacks tailored to trick you and the members in your company. With knowledge of your passwords, they can wreak all kinds of havoc.</p>
<p>Go get an idea of the kind of data that is stored in the cloud and is potentially accessible to attackers who use the right tools, see google dot com /policies/privacy/</p>
<p>Additionally, there are tools available, such as cloud explorer, that make it easy for even non-technical attackers to conveniently gain access to the sensitive information stored in your phone. </p>
<p>Please forward this to whomever is concerned about their mobile device&#8217;s security.</p>
<p>The post <a href="https://fosterinstitute.com/attackers-can-hack-your-phone-without-having-your-phone/">Attackers Can Hack Your Phone Without Having Your Phone</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Find Out if Your Password Might Have Been Hacked</title>
		<link>https://fosterinstitute.com/how-to-find-out-if-your-password-might-have-been-hacked/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 14 Oct 2016 14:34:49 +0000</pubDate>
				<category><![CDATA[browser security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Hacked Passwords]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Have I been hacked]]></category>
		<category><![CDATA[Have I Been Pwned]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pro tips]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[login credential safety]]></category>
		<category><![CDATA[Preventative IT Maintenance Cyber]]></category>
		<category><![CDATA[pwned]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Troy Hung]]></category>
		<category><![CDATA[Web Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2381</guid>

					<description><![CDATA[<p>You hear in the news that Yahoo, or some other company, got hacked and your username and password may be in the hands of attackers. There is a way to find out if your credentials were exposed. An Australian Web Security Specialist, Troy Hunt, has compiled a database containing usernames that have been stolen in [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/how-to-find-out-if-your-password-might-have-been-hacked/">How to Find Out if Your Password Might Have Been Hacked</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You hear in the news that Yahoo, or some other company, got hacked and your username and password may be in the hands of attackers. There is a way to find out if your credentials were exposed.<span id="more-2381"></span></p>
<p>An Australian Web Security Specialist, Troy Hunt, has compiled a database containing usernames that have been stolen in hacks and then published or sold.  Some people use his site to look up their own email address or username.<br />
His website is haveibeenpwned dot com.  (In this case, Pwned refers to a condition of someone else having access to your login credentials.) </p>
<p>At his site, people enter their email address or any usernames they’ve used for online logins. Sometimes, they look up addresses of their family members. If there is a hit, the details of the breach are displayed on the site.</p>
<p>Even if not on the list, there is no guarantee that person’s credentials haven’t been stolen, but it still helps to know.</p>
<p>If you ever suspect that your login credentials to any website have been exposed, it is very important that you reset the password on that site, as well as any other sites where you may have used the same password.</p>
<p>There are other strategies to protect yourself. Enabling two-step-logon is very important these days since it can thwart attackers who know your username and password. Using a password manager, as opposed to letting your browser store passwords, can help make password security more convenient, but it still needs to be used carefully. These strategies are explained in detail elsewhere in this blog.</p>
<p>Forward this to anyone who might want to know if their username and password has been hacked… </p>
<p>The post <a href="https://fosterinstitute.com/how-to-find-out-if-your-password-might-have-been-hacked/">How to Find Out if Your Password Might Have Been Hacked</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>&#8220;This is Your Captain Speaking &#8211; No Samsung Phones Allowed&#8221;</title>
		<link>https://fosterinstitute.com/this-is-your-captain-speaking-no-samsung-phones-allowed/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 13 Sep 2016 18:39:09 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Professionals]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Galaxy Note 7]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pro tips]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[No Samsung Phones Allowed]]></category>
		<category><![CDATA[Phone Ban]]></category>
		<category><![CDATA[Preventative IT Maintenance Cyber]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Samsung Galaxy Note 7]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2377</guid>

					<description><![CDATA[<p>Yesterday afternoon, I and some of the more than 100 other passengers on our jet were paying attention to the safety demo. Unexpectedly, the announcement included a statement that prohibited the use of a Samsung Galaxy Note 7 phone. Additionally, charging such a device is prohibited too. Now that&#8217;s harsh&#8230; or is it? Due to [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/this-is-your-captain-speaking-no-samsung-phones-allowed/">&#8220;This is Your Captain Speaking &#8211; No Samsung Phones Allowed&#8221;</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Yesterday afternoon, I and some of the more than 100 other passengers on our jet were paying attention to the safety demo.  Unexpectedly, the announcement included a statement that prohibited the use of a Samsung Galaxy Note 7 phone. Additionally, charging such a device is prohibited too. Now that&#8217;s harsh&#8230; or is it?<span id="more-2377"></span></p>
<p>Due to more than 35 instances of Samsung Galaxy Note 7 phones exploding, Samsung has recalled the 2.5 million devices.</p>
<p>Fortunately, none of the explosions happened in an airliner. Yet. And may it please never, ever, happen.</p>
<p>Will the ban be enforced and, if so, how? Do all Samsung device owners know which model they have? </p>
<p>Are we all gambling with our lives when we fly on planes with phones that might explode? Will the airlines deny use of other Lithium battery operated devices to make things easier to enforce? If you cannot take phones with you on a business trip, is this a new business opportunity for someone to rent phones to travelers arriving at airports?</p>
<p>The post <a href="https://fosterinstitute.com/this-is-your-captain-speaking-no-samsung-phones-allowed/">&#8220;This is Your Captain Speaking &#8211; No Samsung Phones Allowed&#8221;</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
