For Dave Galowich’s CE 4832 Members
A Curated List of Relevant Blog Postings
Last weekend, our family drove to southwestern Montana looking for Coolidge, a thriving mining town turned Ghost Town. After we entered a remote valley, cell service went away. I handed our road atlas to my 18-year-old son, appointed him navigator, and asked for our next turn. He had a bewildered look… Continue reading ‘Did you Fail to Plan for the Pandemic? Plan for a Microsoft Outage or a GPS Provider Attack’
Everyone is concerned about video conferencing security, and they should be. But when the hardware and software are not working right, safety seems like a distraction. Continue reading ‘Two Tips to Make Your Online Meetings Better‘
Using two-step logon is one of the best things you can do to keep unauthorized people from logging into your account. Use the checkbox to “remember this device” Continue reading ‘Two-Step Logon – You Only Need to do it Once’
Protect your Zoom account. If someone discovers your username and password for Zoom, two-step login should block them from logging in as you. Continue reading ‘Zoom Security – Set Up Two-Step Login’
Alert your workers to be on guard looking for fake, decoy websites about coronavirus, Continue reading ‘Warn Your Workers about Attacker Decoy Tactics’
The rapidly changing situation of potential school closures, self-quarantines, and public reaction to the coronavirus guarantees that at some point you will have employees who need to work from home. Continue reading ‘Recommendations for Cybersecurity for Remote Workers During Coronavirus’
The most massive data leak that’s ever happened includes neatly bundled information for more than 1 billion people. Keep in mind that the estimated population of the United States is only 330 million. If you use email, you are probably exposed. Continue reading ‘A Huge Data Leak Exposed Your Personal Information’
Fraudsters can pretend to be an executive at a company to request wire transfers or gift card purchases. To reduce the chance of a message duping someone at your company: Continue reading ‘A Quick Way to Automatically Help Users Identify Impersonation Email Messages’
Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords
Continue reading ‘773 Million Passwords Exposed – Were You Exposed?’
An experienced high-level executive shared his concern about how attackers are investing more time targeting high net worth individuals. Continue reading ‘Attackers are Targeting High Net Worth Individuals’
Esteemed Technology Expert
Mike Foster, CEH, CISA, CISSP is the founder and CEO of Foster Institute. More than 20 years ago he began training people to be more productive in their use of technology. He is a technology expert, author and professional speaker with more than 1,000 presentations under his belt. Mike is author of The Secure CEO: How to Protect Your Computer Systems, Your Company, and Your Job and is regularly sought for interviews and business publication features. He’s been interviewed by USA Today, Forbes Magazine, and The New York Times, as well as many others.
Mike Foster has an uncanny ability to transform complex computer topics into something easy and understandable for the layperson. I know—he’s done it for me!
— Jack Canfield
co-author of the #1 Best Selling Chicken Soup for the Soul
“When it comes to teaching people how to benefit from the latest technology, Mike Foster is the only choice—he’s the real deal! His genuine passion for helping people shines through in every presentation.
— Les Hewitt
International Best Selling Co-Author, The Power of Focus
Mike Foster is a rare find in this world of technology. He is an excellent teacher and speaker, with that comes a real
humanitarian. That’s rare among IT professionals.
— Bank of America