<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Technology Tips Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/technology-tips/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/technology-tips/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Mon, 02 Dec 2024 13:49:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Technology Tips Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/technology-tips/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Which AI Chatbot is Best? The Executive&#8217;s Guide for When to Use ChatGPT, Claude, Gemini, and Perplexity</title>
		<link>https://fosterinstitute.com/which-ai-chatbot-is-best-the-executives-guide-for-when-to-use-chatgpt-claude-gemini-and-perplexity/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sun, 01 Dec 2024 04:12:38 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5913</guid>

					<description><![CDATA[<p>Executive Summary: AI chatbots &#8211; ChatGPT, Claude, Gemini, and Perplexity &#8211; bring unique strengths to business tasks, from data analysis to strategic communication. Why have just one star player on your team when you can have several? While many executives have found remarkable success with one platform, utilizing multiple chatbots can unlock even greater value. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/which-ai-chatbot-is-best-the-executives-guide-for-when-to-use-chatgpt-claude-gemini-and-perplexity/">Which AI Chatbot is Best? The Executive&#8217;s Guide for When to Use ChatGPT, Claude, Gemini, and Perplexity</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Executive Summary:</strong></p>
<p>AI chatbots &#8211; ChatGPT, Claude, Gemini, and Perplexity &#8211; bring unique strengths to business tasks, from data analysis to strategic communication. Why have just one star player on your team when you can have several? While many executives have found remarkable success with one platform, utilizing multiple chatbots can unlock even greater value. As you become familiar with more chatbots, you will naturally develop your preferences for example, you might choose:</p>
<ul>
<li>ChatGPT for versatile tasks and data visualization</li>
<li>Claude for emotionally aware communication</li>
<li>Gemini for technical troubleshooting</li>
<li>Perplexity for research</li>
</ul>
<p>The goal here is to inspire you to explore chatbots you might not have used.</p>
<p>&nbsp;</p>
<p><strong>Introduction:</strong></p>
<p>When associations and organizations hire me to present about AI, audiences frequently ask me which chatbot is best. After presenting to thousands of executives across diverse industries, I&#8217;ve discovered something fascinating: each person develops their own preferences based on their unique needs and experiences.</p>
<p>There are many chatbots, each trying to earn your favor. If you only use one, you will benefit tremendously from trying others.</p>
<p>A great strategy is to give the same prompt to several chatbots and see which response you like best. Enter a prompt into one chatbot, copy it to your clipboard, and then paste it into other chatbots.</p>
<p>Capabilities change frequently with updates, so what works best might change tomorrow. As of today, here are some specific benefits you might appreciate as you multiply the number of chatbots on your team. Please adapt the example prompts to your specific industry or goals:</p>
<p>&nbsp;</p>
<p><strong>Expert Strategy:</strong></p>
<p>For the best results, always give the chatbot context and detail. Describe yourself, the interests relevant to the project, your role, your audience, and what you want to accomplish. For example, instead of asking, &#8220;Review this email draft,&#8221; tell the chatbot your industry, what your organization does, your role, and the challenges you&#8217;re addressing. Then say something like, &#8220;I wrote this follow-up email after yesterday&#8217;s board meeting. Review it and suggest if there are clearer ways to explain our quarterly results. The board members reading this want both the wins and challenges clearly explained, and they prefer brief, to-the-point documents.&#8221; The difference in response quality will amaze you. You can attach examples of previous successful communications you&#8217;ve written and tell the chatbot to use a similar tone and style.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><strong>ChatGPT: Amplify Your Productivity:</strong></p>
<p>Chatgpt dot com. Almost everyone has heard of this popular chatbot’s vast range of capabilities. In addition to what it has always done, I use ChatGPT when processing documents and generating or analyzing graphs.</p>
<ul>
<li><strong>Manufacturing:</strong> “Generate a workflow to reduce downtime by analyzing machinery data and prioritizing maintenance schedules.”</li>
<li><strong>Healthcare:</strong> “Create a patient satisfaction survey based on current trends in healthcare delivery.”</li>
<li><strong>Finance:</strong> “Summarize key takeaways from a quarterly earnings report for a stakeholder presentation.”</li>
<li><strong>Distribution: </strong>“Using the attached spreadsheet, generate a graph of Lead Time (Days) vs. Monthly Usage (Units) with data points colored by criticality. Label the material names using a large font.”</li>
</ul>
<p>&nbsp;</p>
<p>For executives on the move, ChatGPT&#8217;s voice mode transforms travel time into productive strategy sessions. While driving, you can brainstorm solutions to business challenges, rehearse important presentations, or analyze competitor strategies – all hands-free. You have a knowledgeable thought partner ready to explore any topic. For safety, please only use voice mode while driving.</p>
<p>&nbsp;</p>
<p><strong>Claude: Transform Your Business Communications:</strong></p>
<p>Claude dot ai. For written conversations and reviewing documents, Claude often causes me to pause and think, “Wow! That response is surprising in a good way!” Experienced business people know success comes through professional relationships. Claude seems the best at considering human attitudes, sentiments, and reactions. If you want to write a persuasive document, Claude might help you best refine the text you’ve already written.</p>
<ul>
<li><strong>Manufacturing: </strong>“Refine a message to factory staff emphasizing the importance of new safety protocols while maintaining morale.”</li>
<li><strong>Healthcare: </strong>“Draft a memo to staff addressing a sensitive policy change with a positive and empathetic tone.”</li>
<li><strong>Finance: </strong>“Rewrite an investment pitch to highlight potential ROI while addressing client concerns about risk.”</li>
<li><strong>Consulting: </strong>“Analyze this email conversation and tell me how this person feels frustrated, and gently suggest benefits to them by sharing examples of how other professionals have benefited from our practices. Do not strive to convince them since they will push back harder.”</li>
</ul>
<p>&nbsp;</p>
<p>Think of Claude as a collaborator. Converse back and forth about how the recipient or audience will react to specific words and phrases and refine them accordingly. Ask Claude if there are parts that can be left out. This process can produce emotionally intelligent content that produces results.</p>
<p>&nbsp;</p>
<p>I find that Claude often provides unsolicited suggestions that are very helpful. For example, while reviewing a business proposal, Claude will often point out valuable opportunities to strengthen the key benefits. Claude often thinks beyond the immediate request, offering insights and recommendations as a trusted strategic advisor would.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><strong>Gemini: Solve Technical Challenges:</strong></p>
<p>Gemini dot google dot com offers another option for technical information and troubleshooting steps. Many users appreciate Google&#8217;s extensive data repository for technical questions.</p>
<ul>
<li><strong>Manufacturing: </strong>“Provide troubleshooting steps for a PLC system showing error codes X, Y, and Z.”</li>
<li><strong>Healthcare: </strong>“Outline the process to integrate a new Electronic Health Record (EHR) system with existing software.”</li>
<li><strong>Finance:</strong> “Explain how to configure advanced security settings in a new financial analytics platform.”</li>
<li><strong>IT Director:</strong> “Identify potential pitfalls in the transition to cloud-based services.”</li>
<li><strong>Executive on the Weekend:</strong> “I am a non-technical executive, and my help desk is busy. Walk me through setting up a mail merge using a list of contacts and a form letter.”</li>
</ul>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><strong>Perplexity: Power Your Strategic Research:</strong></p>
<p>Perplexity dot ai excels at providing stunningly useful results searching the web. Other chatbots can provide citations for where they obtained their information, but what attracts me the most to Perplexity is how quickly it allows you to access the sources and see summaries of the content if you click the “show all” citations button.</p>
<ul>
<li><strong>Manufacturing: </strong>“Find and summarize case studies on how AI optimizes supply chain management.”</li>
<li><strong>Healthcare:</strong> “Research emerging telemedicine technologies and their potential ROI.”</li>
<li><strong>Finance: </strong>“Identify recent regulatory changes affecting the fintech industry and summarize key implications.”</li>
<li><strong>Expanding your AI Toolkit:</strong> “What are the best AI tools this year that will help me (fill in the rest, such as analyzing trends in my inventory turnover to identify ways I can improve my supply chain)?”</li>
<li><strong>Strategic Planning: </strong>“Research top competitors&#8217; strategies for market expansion.”</li>
</ul>
<p>&nbsp;</p>
<p>Perplexity has almost replaced my use of search engines since I receive the answers I need and can drill down to sources when needed. The sources earned their place in the list based on their content rather than which sites use the best search engine optimization techniques.</p>
<p>&nbsp;</p>
<p>Perplexity is excellent at crafting documents and generating lists of instructions, too.</p>
<p>&nbsp;</p>
<p><strong>Free vs. Paid:</strong></p>
<p>All these chatbots have free and paid versions. Some chatbots have elected to provide advanced features to free accounts, limiting the number of times unpaid users can use those features per day. As you use chatbots, evaluate the time savings or added value to decide when to upgrade to a paid version. Many executives find the ROI on paid versions substantial.</p>
<p>&nbsp;</p>
<p><strong>Risks:</strong></p>
<p>Chatbots can produce inaccurate results, known as hallucinations. For example, when generating financial projections or analyzing marketing insights, they might fabricate results. Always verify chatbot-generated information and avoid expensive mistakes.</p>
<p>&nbsp;</p>
<p>Feel free to challenge the chatbot’s biases. Sometimes, a good argument can be constructive.</p>
<p>&nbsp;</p>
<p>Always use privacy settings to help ensure sensitive data isn&#8217;t stored. Understand the chatbot&#8217;s privacy policies.</p>
<p>&nbsp;</p>
<p><strong>Customization:</strong></p>
<p>Some chatbots allow you to preload information about yourself and your company in settings or attached files.  Sometimes, you can generate custom profiles or unique chatbots. This can be very productive, saving you time and achieving specific results.</p>
<p>&nbsp;</p>
<p><strong>AI Ethics and Integrity:</strong></p>
<p>Excellence in AI requires the same principles that guide all business practices: honesty, integrity, and ethics. Just as we use presentation software to communicate clearly and CRM systems to build stronger customer relationships, AI tools help enhance our natural capabilities. They can analyze data more quickly, provide valuable insights, and help us communicate more effectively with our teams and customers.</p>
<p>Any powerful business tool, from email to social media, can be misused. However, responsible leaders use AI to enhance human judgment and creativity. Use AI tools to create value, improve efficiency, and drive success for your organization and the people you serve.</p>
<p>&nbsp;</p>
<p><strong>Conclusion: Using Multiple Chatbots is a Force Multiplier:</strong></p>
<p>Issue your prompts to multiple chatbots to see which resonates best for specific tasks. Remember that chatbots are continuously improving. If you keep experimenting with all of them, you might update your preference for specific tasks. Other fabulous chatbots are available, too; don&#8217;t feel limited to the four I discussed here.</p>
<p>I&#8217;d love to hear about your journey with AI tools. Whether at a conference where I&#8217;m speaking or through email, share which chatbots have transformed how you work and how. Your insights help me bring fresh perspectives to organizations worldwide, and I might feature them in a future blog. As chatbots continue to evolve, I&#8217;m committed to helping executives and their teams unlock the full potential of these powerful tools!</p>
<p>&nbsp;</p>
<p>Subscribe to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>The post <a href="https://fosterinstitute.com/which-ai-chatbot-is-best-the-executives-guide-for-when-to-use-chatgpt-claude-gemini-and-perplexity/">Which AI Chatbot is Best? The Executive&#8217;s Guide for When to Use ChatGPT, Claude, Gemini, and Perplexity</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Try This Now: ChatGPT Plus&#8217;s and Perplexity&#8217;s Fusion of Text, Internet Search, and Image Creation</title>
		<link>https://fosterinstitute.com/try-this-now-gpt-pluss-fusion-of-text-internet-search-and-image-creation/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sun, 12 Nov 2023 04:23:04 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Save time]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5704</guid>

					<description><![CDATA[<p>If you are a ChatGPT Plus subscriber, try at least one of these three prompts to see how you can meld real-time internet search, text processing, and image generation. Perplexity dot ai can process the first three at least. Try other ai ChatBots too: Exploring Space Exploration: &#8220;Find the latest news about NASA&#8217;s Mars missions. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/try-this-now-gpt-pluss-fusion-of-text-internet-search-and-image-creation/">Try This Now: ChatGPT Plus&#8217;s and Perplexity&#8217;s Fusion of Text, Internet Search, and Image Creation</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you are a ChatGPT Plus subscriber, try at least one of these three prompts to see how you can meld real-time internet search, text processing, and image generation. Perplexity dot ai can process the first three at least. Try other ai ChatBots too:</p>
<ul>
<li><strong>Exploring Space Exploration</strong>: &#8220;Find the latest news about NASA&#8217;s Mars missions. Summarize the key points of the most recent mission, and then generate an image that depicts a futuristic Mars rover based on the described technologies in the news article.&#8221;</li>
<li><strong>Discovering Cultural Cuisine</strong>: &#8220;Look up traditional Japanese cuisine and select a popular dish. Describe the dish&#8217;s ingredients and preparation method. Then, generate an image of this dish presented in an authentic Japanese dining setting.&#8221;</li>
<li><strong>Exploring a Famous Landmark</strong>: &#8220;Research the history and architectural features of the Eiffel Tower. Provide a summary of your findings and then generate an image of the Eiffel Tower as seen during a beautiful sunset.&#8221;</li>
<li><strong>Market Trend Analysis and Visualization</strong>: &#8220;Search for the latest trends in renewable energy technology. Summarize the key developments in solar power advancements over the past year, and then generate an image that visualizes the most innovative solar panel design mentioned in the articles.&#8221;</li>
<li><strong>Competitor Product Analysis and Conceptual Design</strong>: &#8220;Find recent product launches by major competitors in the electric vehicle (EV) market. Provide a summary of the unique features introduced by these competitors, focusing on one specific product. Then, create an image of an EV incorporating these features in a new, conceptual design.&#8221;</li>
<li><strong>Consumer Sentiment Analysis and Marketing Campaign Concept</strong>: &#8220;Research recent consumer reviews and sentiments about smart home technologies. Summarize the most desired features and common concerns. Based on this, generate an image of a hypothetical smart home product that addresses these consumer preferences and concerns in its design.&#8221;</li>
</ul>
<p>&nbsp;</p>
<div class="et_pb_module et_pb_post_content et_pb_post_content_0_tb_body">
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/" target="_blank" rel="noopener">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>(Image source: DALL-E via ChatGPT Plus)</p>
</div>
<div class="et_pb_module et_pb_post_title et_pb_post_title_1_tb_body post-bottom-meta et_pb_bg_layout_light et_pb_text_align_left">
<div class="et_pb_title_container">
<p class="et_pb_title_meta_container">
</div>
</div>
<p>The post <a href="https://fosterinstitute.com/try-this-now-gpt-pluss-fusion-of-text-internet-search-and-image-creation/">Try This Now: ChatGPT Plus&#8217;s and Perplexity&#8217;s Fusion of Text, Internet Search, and Image Creation</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Have You Explored ChatGPT Plus&#8217;s File Upload Feature Yet?</title>
		<link>https://fosterinstitute.com/have-you-explored-chatgpt-pluss-file-upload-feature-yet/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sun, 12 Nov 2023 03:27:32 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Save time]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5700</guid>

					<description><![CDATA[<p>ChatGPT Plus&#8217;s file upload feature opens up new possibilities for interacting with AI, offering a seamless way to enhance your experience. If you haven&#8217;t tried it yet, here&#8217;s why you should consider exploring this versatile tool. File Uploads Made Easy ChatGPT Plus allows you to upload various types of files for a more integrated interaction. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/have-you-explored-chatgpt-pluss-file-upload-feature-yet/">Have You Explored ChatGPT Plus&#8217;s File Upload Feature Yet?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>ChatGPT Plus&#8217;s file upload feature opens up new possibilities for interacting with AI, offering a seamless way to enhance your experience. If you haven&#8217;t tried it yet, here&#8217;s why you should consider exploring this versatile tool.</p>
<p><strong>File Uploads Made Easy</strong></p>
<p>ChatGPT Plus allows you to upload various types of files for a more integrated interaction. Whether it&#8217;s a PDF document for analysis or an image of an object for detailed inquiries, the process is straightforward. This feature eliminates the need for extensive copying and pasting, enabling ChatGPT to analyze your data in its intended format for more accurate responses.</p>
<p><strong>Bypassing Prompt Length Limitations</strong></p>
<p>Encountered the “The message you submitted was too long” error? Uploading a file is an effective workaround. Be mindful, though, if your file is exceptionally large, it might exceed the token limit, affecting ChatGPT&#8217;s ability to process the entire content. As technology advances, expect to see expansions in these limits.</p>
<p><strong>Versatile File Types and Actions</strong></p>
<ul>
<li><strong>Documents</strong> (.pdf, .docx, .txt): Ideal for generating summaries, updates, translations, and more. ChatGPT&#8217;s proficiency in extracting information from PDFs is particularly impressive. For instance, try asking, “Address challenges with solutions” after uploading a document.</li>
<li><strong>Images</strong> (.jpg, .png, .gif): Upload images for descriptions, analysis, or creative storytelling. Imagine uploading a photo of your pet and asking, “Generate an image of my pet sitting in First Class on a plane.” Mobile app users can directly take and upload pictures.</li>
<li><strong>Spreadsheets</strong> (.xls, .xlsx): While capabilities continue to grow, basic functions like finding, counting, and analyzing data work smoothly. If you encounter difficulties, consider converting your spreadsheet to a PDF for more efficient processing.</li>
<li><strong>Presentations</strong> (.ppt, .pptx): Share your slides for summaries and improvement recommendations. Converting to PDF might enhance ChatGPT&#8217;s understanding.</li>
</ul>
<p><strong>How to Use the File Upload Feature</strong></p>
<p>Utilize the &#8216;Upload&#8217; button in the ChatGPT interface to interact with your chosen file. This feature is accessible both in the browser and mobile app versions. For more advanced capabilities, ChatGPT Plus members can enable Advanced Data Analysis in the Settings under Beta features.</p>
<p><strong>Privacy Considerations</strong></p>
<p>Prioritize your privacy when using this feature. ChatGPT offers options to disable chat history and assures not to use your data for training purposes. Stay informed by checking <a href="https://help.openai.com/en/articles/7730893-data-controls-faq" target="_blank" rel="noopener">OpenAI&#8217;s Data Controls FAQ</a> and <a href="https://fosterinstitute.com/chatbots-helpful-friends-or-privacy-foes-how-to-safeguard-your-information/" target="_blank" rel="noopener">additional insights on chatbot privacy</a>.</p>
<p><strong>Experience the Enhanced ChatGPT</strong></p>
<p>The file upload feature significantly broadens ChatGPT&#8217;s utility, catering to educational, professional, or exploratory needs. Dedicate a few minutes to import non-sensitive files and experiment with various prompts. You&#8217;ll discover its strengths and limitations, pushing the boundaries of AI interaction.</p>
<p><strong>Comparing With Other Platforms</strong></p>
<p>At a subscription fee of twenty dollars per month, ChatGPT Plus stands out for its file upload capability. Yet, other chatbots, including free versions like Perplexity.ai and Google Bard, offer similar features, indicating a trend towards standardizing file uploads across AI platforms.</p>
<p>&nbsp;</p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/" target="_blank" rel="noopener">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>(Image source: DALL-E via ChatGPT Plus)</p>
<p>The post <a href="https://fosterinstitute.com/have-you-explored-chatgpt-pluss-file-upload-feature-yet/">Have You Explored ChatGPT Plus&#8217;s File Upload Feature Yet?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Executives, Guard Your Company&#8217;s Future: Why Ensuring Email Boundaries is Crucial for Security.</title>
		<link>https://fosterinstitute.com/executives-guard-your-companys-future-why-ensuring-email-boundaries-is-crucial-for-security/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 23 Oct 2023 21:17:27 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Spam]]></category>
		<category><![CDATA[Spear Phishing]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5689</guid>

					<description><![CDATA[<p>Most people realize the extreme importance of training employees to recognize and avoid phishing emails. But there are other essential components. &#160; Keep Personal Matters Out of Company Email: Attackers sometimes gain access to websites used for personal activities like watching movies, paying utility bills, personal checking accounts, and more. Bad actors leverage this information [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/executives-guard-your-companys-future-why-ensuring-email-boundaries-is-crucial-for-security/">Executives, Guard Your Company&#8217;s Future: Why Ensuring Email Boundaries is Crucial for Security.</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Most people realize the extreme importance of training employees to recognize and avoid phishing emails. But there are other essential components.</p>
<p>&nbsp;</p>
<h3>Keep Personal Matters Out of Company Email:</h3>
<p>Attackers sometimes gain access to websites used for personal activities like watching movies, paying utility bills, personal checking accounts, and more. Bad actors leverage this information to craft convincing email messages, enticing users to click on malicious links or open harmful attachments.</p>
<p><strong>If your workers avoid using their business email for personal activities</strong> like online shopping or personal social media, then a phishing email related to these topics would immediately stand out as suspicious. <strong>They are much more likely to recognize the message as fake.</strong></p>
<p>On the other hand, if they have used their business email for personal tasks like online shopping or social media, they&#8217;re at a higher risk for spear phishing when an attacker knows details about their activities. If they receive an &#8216;urgent message&#8217; related to these personal tasks in their business email account, they might be more easily deceived into thinking it&#8217;s legitimate.</p>
<p>&nbsp;</p>
<h3>Worsened Notification Burden:</h3>
<p>Another drawback of using work emails for personal matters is the heightened risk of exposing sensitive personal data. If <strong>employees use their work email to conduct personal business</strong>, such as insurance applications or other private matters, the <strong>likelihood of sensitive personal data residing on your servers</strong> increases. In the unfortunate event of a data breach, their sensitive information could necessitate you sending notification letters to affected parties, <strong>increasing your company&#8217;s expenses and vulnerability to potential lawsuits.</strong></p>
<h3></h3>
<p>&nbsp;</p>
<h3>Personal Webmail on Company Devices is a Significant Security Risk:</h3>
<p>The above situations refer to workers using their work address for personal use. But you must also address the issue of allowing employees to access personal webmail on company devices. <strong>IT departments have no control over the security of these personal email accounts</strong>. While your business email systems can have robust filters to block malicious links and attachments, allowing workers to access personal webmail sites can significantly reduce the overall security of your network, <strong>making your organization&#8217;s security as weak as the weakest personal email account.</strong></p>
<p>&nbsp;</p>
<h3>To Enhance Security:</h3>
<ol>
<li>Ask your IT Team to <strong>limit email access</strong> on company devices <strong>to approved business email servers only.</strong></li>
<li>Continuously <strong>remind employees to use their company email address exclusively for work</strong>-related matters.</li>
<li>Ask your IT team to <strong>block access to all webmail sites except those essential for business</strong>. If employees need to access personal email, they should do so on their personal devices. If connectivity is an issue and you must allow employees to connect personal devices to your Wi-Fi, use a separate &#8220;guest&#8221; network instead of the primary company network.</li>
</ol>
<p>&nbsp;</p>
<h3>Conclusion:</h3>
<p>By drawing clear boundaries between personal and professional email usage, you can reduce the risk of cyber threats and help protect your company and your employees. Please tell your associates and friends; spread the word.</p>
<p>&nbsp;</p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/" target="_blank" rel="noopener">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>(Image source: Bing. Learn more at [Bing.com].)</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/executives-guard-your-companys-future-why-ensuring-email-boundaries-is-crucial-for-security/">Executives, Guard Your Company&#8217;s Future: Why Ensuring Email Boundaries is Crucial for Security.</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated Problems</title>
		<link>https://fosterinstitute.com/your-phone-tablet-and-computer-started-hiding-you-and-how-to-overcome-the-associated-problems/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 25 Feb 2021 14:50:39 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3453</guid>

					<description><![CDATA[<p>A friend contacted me a few days ago and said, “Every few weeks, I’ll go to a site, and it will say that this appears to be a new device? For example, I’ve looked at my Twitter account this morning, and it put up my username and asked me for my password again. Is this [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/your-phone-tablet-and-computer-started-hiding-you-and-how-to-overcome-the-associated-problems/">Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated Problems</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A friend contacted me a few days ago and said, “Every few weeks, I’ll go to a site, and it will say that this appears to be a new device? For example, I’ve looked at my Twitter account this morning, and it put up my username and asked me for my password again. Is this anything to be concerned about?” <span id="more-4514"></span></p>
<p>A little background information helps explain what is going on: Every device connected to a network has a serial number, called a MAC address. That address is how the network identifies the device and differentiates it from all the other devices on a network. As you can imagine, networks need to know what devices are connected. Think of what might happen if the network thought your computer was a printer. Printer paper might not come shooting out of your keyboard, knock over your coffee or smoothie, but you get the idea.</p>
<p>Because the MAC address uniquely identifies you for everyone else, think of the MAC address as a fingerprint for your device. Potentially, an advertiser, or someone in a public place, could use your fingerprint, in this case, your device’s MAC address, to track you, your activities, and what networks you use.</p>
<p>Apple, Google, and Microsoft want to help protect your privacy, so they might periodically change the MAC address on your computer to a different address. The new behavior strives to help keep you more anonymous on public networks at hotels and coffee shops. However, randomly changing MAC addresses can break essential security features, including:</p>
<p>1) As my friend did, you might start receiving alarming alerts that another person connected a new device to one of your websites or accounts. The warnings are concerning until you realize it is your computer reconnecting with a new unique index. After a time, you might ignore the alerts. But then you won&#8217;t know if a real attacker broke into your account with some other computer, tablet, or phone.</p>
<p>2) Parental controls at home fail if the safety restrictions are unique for each family device. When a youngster disconnects and reconnects to your network, sometimes they are no longer protected.</p>
<p>3) Your company keeps an inventory of your computers, tablets, and phones. It is challenging to keep the list current when your IT team must track three times as many devices as you have.</p>
<p>How do you solve this? It is possible to disable the randomization feature, but it takes time to reconfigure. Time is a precious commodity for you and your IT team too. An example of how to disable the behavior on iPhones, iPads, and Apple Watches: <a href="http://support.apple.com/en-us/HT211227" target="_blank" rel="noopener">support.apple.com/en-us/HT211227</a></p>
<p>However, your employees or kids could change the feature back again to help them hide on your networks.</p>
<p>The answer to my friend&#8217;s question is that if the website tells you a date, time, and location of that person&#8217;s login, and you know you weren&#8217;t logging in from there at that time, yes, you need to be concerned. Otherwise, your experience may be because your device is disguising itself from the website. Disable the randomization feature, and the problem might go away.</p>
<p>Please forward this to your friends so that if they, or their IT team, cannot figure out why some of your security features are breaking, they will know to suspect their devices are rotating through MAC addresses.</p>
<p>If you want more technical details, a network identifies your device with an index number called a MAC address when you connect. There are more than 280 trillion possibilities for a MAC address; the odds are that nobody you know has the same number as your device. The first half of the number identifies the manufacturer; that makes it easier to find unidentified devices on a network.</p>
<p>Other problems you&#8217;ll notice because of rotating MAC addresses include:</p>
<p>4) Security tools at the office fail to work if the security tools rely on associating users with their computers, tablets, or phones. This problem affects both BYOD and company-issued devices.</p>
<p>5) IT Professionals can configure necessary reservations for computers, tablets, and phones. Those reservations are based on index numbers. When the index changes, the reservation stops working, and systems can fail or lose security.</p>
<p>6) Your websites will forget you. Some sites have a feature to Remember This Computer, so you do not need to go through as many steps each time you log in. The sites identify your devices by their index numbers. Your device will need to be re-remembered when your index changes.</p>
<p>MAC addresses look like FF:FF:FF:FF:FF:FF:FF:FF where each value I listed as F can be a hexadecimal digit 0,1,2,3,4,5,6,7,8,9, A, B, C, D, E, or F. If you know where to look, your phone, tablet, and computer can tell you the MAC addresses of each network interface.</p>
<p>The new behavior is causing lots of frustration in the cybersecurity world. This battle isn&#8217;t over yet.</p>
<p>The post <a href="https://fosterinstitute.com/your-phone-tablet-and-computer-started-hiding-you-and-how-to-overcome-the-associated-problems/">Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated Problems</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.</title>
		<link>https://fosterinstitute.com/the-solarwinds-breach-affects-you-too-ask-your-it-team-to-take-these-steps/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 30 Dec 2020 21:07:04 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3378</guid>

					<description><![CDATA[<p>The investigation into the SolarWinds breach keeps revealing more shocking ways attackers infiltrated organizations. Even if your organization doesn&#8217;t use SolarWinds, you must take action. Official channels report that some software giants, including at least one major cloud hosting platform, are compromised. Your suppliers and vendors might be compromised and that affects you, too, even [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/the-solarwinds-breach-affects-you-too-ask-your-it-team-to-take-these-steps/">The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The investigation into the SolarWinds breach keeps revealing more shocking ways attackers infiltrated organizations. Even if your organization doesn&#8217;t use SolarWinds, you must take action.<span id="more-3378"></span></p>
<p>Official channels report that some software giants, including at least one major cloud hosting platform, are compromised. Your suppliers and vendors might be compromised and that affects you, too, even if your systems are safe.</p>
<p>Some steps to take:</p>
<p>1. Remind all of your users that they will likely receive fraudulent email messages that look more realistic than ever. Never enter usernames, passwords, or sensitive data into any forms without checking with your IT Pros first. Never transfer money based on email messages alone.</p>
<p>2. If you receive an email that appears fraudulent, then phone or text the sender to discuss the authenticity. If you email the sender to ask if they sent the first message, a bad actor who compromised their email system will reply to you and say that the original message is safe. Email is less trustworthy than ever, even when you start the conversation.</p>
<p>3. Contact your vendors, suppliers, customers, and anyone you rely upon to ask if they are following this emergency and actively looking for breaches. Ask if they check with their suppliers to require their vigilance too. Assess your risk of one of those entities failing. Have a business continuity plan in place.</p>
<p>4. Many organizations are temporarily disabling SolarWinds. Nobody is sure of the extent of infiltration.</p>
<p>5. Ask your IT pros to implement a two-step login process wherever possible. Reset passwords. Install critical security updates. Restrict account privileges as much as possible. Uninstall all non-essential software. Be hyper-vigilant of anything that appears to be an attack. Our audits and security reviews will help your IT teams secure your systems too.</p>
<p>Rest assured that software giants are working round-the-clock to fight the attackers. The problem is that the attackers had a head start, so they are one step ahead. And, if an organization you rely upon is compromised, it might be too late to stop. The infected organization will need to resolve the problems. They might not realize they are compromised.</p>
<p>The post <a href="https://fosterinstitute.com/the-solarwinds-breach-affects-you-too-ask-your-it-team-to-take-these-steps/">The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Huge Data Leak Exposed Your Personal Information</title>
		<link>https://fosterinstitute.com/a-huge-data-leak-exposed-your-personal-information/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 04 Dec 2019 22:38:41 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3008</guid>

					<description><![CDATA[<p>The most massive data leak that&#8217;s ever happened includes neatly bundled information for more than 1 billion people. Keep in mind that the estimated population of the United States is only 330 million. If you use email, you are probably exposed. The leak exposed a tremendous amount of information about you, your personal and work [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/a-huge-data-leak-exposed-your-personal-information/">A Huge Data Leak Exposed Your Personal Information</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The most massive data leak that&#8217;s ever happened includes neatly bundled information for more than 1 billion people. Keep in mind that the estimated population of the United States is only 330 million. If you use email, you are probably exposed.<span id="more-3008"></span></p>
<p>The leak exposed a tremendous amount of information about you, your personal and work history, your interests and hobbies, current and past contact information, and more all gathered and stored in one package. If someone knows your email address, they could immediately know your birthdate if you ever entered that date into a social media profile.</p>
<p>The data might also include your religion, financial information, members of your family, buying preferences, and more. It is alarming that your information is now more readily available than ever. Even more disturbing is that interested parties can access your data all in one place. Do you read the privacy policies when you install applications or sign up for services? You often agree that they can share some or all of your information with third parties. Those third parties may be data aggregation companies, called enrichment companies. This leak&#8217;s source was an Elasticsearch server. It contained data from two data enrichment servers called People Data Labs and OxyData.</p>
<p>What should you do? Now, more than ever, watch for fraudulent messages that seem very legitimate. Consider an example if your data set includes your phone provider. Social engineers might pretend to be your phone provider. They will demonstrate that they know real towns where you&#8217;ve lived. They’ll add legitimacy by including your accurate birthdate, one of your hobbies, and potentially your credit history. On the flip side, people that have your information can impersonate you to organizations. They might reset a password or change your listed email address so they can access your protected accounts. They might be more successful at tricking your relatives and friends into clicking a link because they’ll recognize personal details.</p>
<p>Use different passwords at different websites. Enable two-step verification as suggested and described in prior newsletters. Warn your friends that they must be more vigilant than ever for frauds and scams, even when the contact seems to know all about them.</p>
<p><!--more--></p>
<p>The post <a href="https://fosterinstitute.com/a-huge-data-leak-exposed-your-personal-information/">A Huge Data Leak Exposed Your Personal Information</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What Will You Do if Your Customers’ Spam Filters Block Your Messages?</title>
		<link>https://fosterinstitute.com/what-will-you-do-if-your-customers-spam-filters-block-your-messages/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 03 Dec 2019 08:00:22 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Blacklist]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Spam]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[blocked server]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[prevent blacklisting]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3005</guid>

					<description><![CDATA[<p>One of the ways your spam filter helps to stop unwanted messages is to block messages from mail servers with a bad reputation for spamming. What will you do if your company gets labeled as a spammer? First of all, nobody will receive your company’s messages. What will you do when you send invoices, but [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/what-will-you-do-if-your-customers-spam-filters-block-your-messages/">What Will You Do if Your Customers’ Spam Filters Block Your Messages?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>One of the ways your spam filter helps to stop unwanted messages is to block messages from mail servers with a bad reputation for spamming. What will you do if your company gets labeled as a spammer? First of all, nobody will receive your company’s messages. <span id="more-3005"></span></p>
<p>What will you do when you send invoices, but your customers never receive them?</p>
<p>When you reply to your customers’ email messages, and they never receive your reply, what will you do when they think you are ignoring them?</p>
<p>What if your prospects never hear back from you?</p>
<p>Being blacklisted can cause havoc at your company because of lost communications. A common way to get blacklisted is to send repetitive email messages, such as a newsletter, from your email server. Instead of risking being blacklisted, many organizations use an email newsletter service to send newsletters.</p>
<p>A growing problem is when attackers take over your email server to send spam. The next thing you know, you’ll be blacklisted, and your email messages won’t reach your recipients. AI technology escalates the sensitivity of spam filters that feed blacklists.</p>
<p>Over the past several weeks numerous customers experienced instances when their email messages do not reach customers who use Office 365. Microsoft’s spam filter is very aggressive, and it is close to impossible to get Microsoft to stop blocking your organization’s email messages after their servers disapprove of your email addresses.</p>
<p>Sometimes your messages are blocked because of a long signature.</p>
<p>Even if an attacker cannot access your servers, all they need is one user’s email address in your company. If they use the user’s account to send out spam messages, spam filters may put your entire domain on a blacklist.</p>
<p>The key is to protect your email accounts and your email servers. Be sure your network and cloud security is substantial. Revisit your email server’s security, as well as your users’ accounts security, regularly to avoid being blacklisted.</p>
<p>Please forward this to your friends, so they know about blacklists too.</p>
<p>The post <a href="https://fosterinstitute.com/what-will-you-do-if-your-customers-spam-filters-block-your-messages/">What Will You Do if Your Customers’ Spam Filters Block Your Messages?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fix A Computer in Minutes and It Works Almost Every Time</title>
		<link>https://fosterinstitute.com/fix-a-computer-in-minutes-and-it-works-almost-every-time/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 21 Jul 2017 15:43:56 +0000</pubDate>
				<category><![CDATA[Acronis True Image]]></category>
		<category><![CDATA[Carbon Copy Cloner]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Restoring]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Shadow Protect Desktop]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[Troubleshooting]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Image backup tools]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Ransomware recovery]]></category>
		<category><![CDATA[restoring computers]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Storeage Craft]]></category>
		<category><![CDATA[Strong Network]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2518</guid>

					<description><![CDATA[<p>I was stranded in the Portland airport last night because of a mechanical failure on the first flight. You’ve had similar situations for sure. What would your travel experience be like if the airlines could immediately reset a plane to be brand new if it breaks? With computers, you can be up and running ASAP. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/fix-a-computer-in-minutes-and-it-works-almost-every-time/">Fix A Computer in Minutes and It Works Almost Every Time</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I was stranded in the Portland airport last night because of a mechanical failure on the first flight. You’ve had similar situations for sure. What would your travel experience be like if the airlines could immediately reset a plane to be brand new if it breaks?<span id="more-2518"></span></p>
<p>With computers, you can be up and running ASAP. Unless there is something broken with the computer’s hardware, a broken computer can be revived in just a few minutes.</p>
<p>In order for this to happen, ask your IT department (if they haven’t already) to create a golden image.</p>
<p>First they will set up a computer and configure it exactly the way it needs to be for your business – and you could do this for home computers too. Second, make an image backup of the computer. Recommended tools are below.</p>
<p>Now, you have a golden image, configured in the way you like with all the right software installed, etc., that can be restored to a computer to reset the computer to be like new again.</p>
<p>From now on, whenever you suspect that a computer is infected with a virus, has been hacked, or is just malfunctioning in general, do not troubleshoot it. Dump a golden image back onto the computer and refresh it to be like new.</p>
<p>Note: All the data will be overwritten when you restore the image. So, for personal computers, be sure to back up the data prior to restoring an image. At the office, all users store their data files on servers, not on workstations, right?</p>
<p>You may find that your IT team can create a single golden image that can be used on different models of computers, or they may need to make separate images for each model. If you use a technology called VDI, this is even easier. VDI is a different topic though.</p>
<p>Image backup tools include Shadow Protect Desktop from Storage Craft, and Acronis True Image. For Macs, use Carbon Copy Cloner.</p>
<p>Please forward this to everyone you know who troubleshoots a computer if it is acting up. There is another way, and troubleshooting may not be able to completely remove a virus if the computer is infected anyway.</p>
<p>The post <a href="https://fosterinstitute.com/fix-a-computer-in-minutes-and-it-works-almost-every-time/">Fix A Computer in Minutes and It Works Almost Every Time</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Straw, Sticks, or Brick: How to Tell Which Your Network Is, and How to Improve It</title>
		<link>https://fosterinstitute.com/straw-sticks-or-brick-how-to-tell-which-your-network-is-and-how-to-improve-it/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 19 May 2017 14:57:11 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Strong Network]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2498</guid>

					<description><![CDATA[<p>Just yesterday, someone told me they think they are secure because they have anti-virus, strong passwords and a firewall. Last weekend, I asked my daughter to tell me a fairy tale. She chose The Three Little Pigs and the Big Bad Wolf. As she told the story, it became so clear that organizations use straw, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/straw-sticks-or-brick-how-to-tell-which-your-network-is-and-how-to-improve-it/">Straw, Sticks, or Brick: How to Tell Which Your Network Is, and How to Improve It</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Just yesterday, someone told me they think they are secure because they have anti-virus, strong passwords and a firewall.</p>
<p>Last weekend, I asked my daughter to tell me a fairy tale. She chose The Three Little Pigs and the Big Bad Wolf. As she told the story, it became so clear that organizations use straw, sticks, or brick to build their cyber-security protection. See which you are, and how to improve:<span id="more-2498"></span></p>
<p>Security built with straw, is weak, and too common. It is when executives say:<br />
1. “We moved everything to the cloud so we no longer need to be concerned with security.”<br />
2. “Everybody is getting ransomware, so it is no big deal if we do too.”<br />
3. “We encrypt our data, so it is safe.”</p>
<p>Security built with sticks is common too, and better, but will not stand up against attackers. They think they need only three things and can stop there:<br />
1. Anti-virus<br />
2. Firewalls<br />
3. Strong passwords</p>
<p>Security built with bricks is very rare. You still need the “sticks” combination, and the rest of making a home out of brick is achieved by doing the hard things that attackers are counting on organizations not doing:<br />
1. Ensure no programs or scripts can run unless approved<br />
2. Keep patches current without crashing systems<br />
3. Constantly measure to make sure the right things get done. Support your IT Professionals generously by truly listening to them and supporting them as they accomplish these difficult tasks</p>
<p>Past, and future, blog entries explain how to implement the brick solutions above.</p>
<p>Please forward this to everyone you know who may have built their cyber security out of straw or sticks. Encourage them to get out the bricks ASAP.</p>
<p>The post <a href="https://fosterinstitute.com/straw-sticks-or-brick-how-to-tell-which-your-network-is-and-how-to-improve-it/">Straw, Sticks, or Brick: How to Tell Which Your Network Is, and How to Improve It</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
