<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>computer security Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/computer-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/computer-security/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Thu, 24 Sep 2020 16:58:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>computer security Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/computer-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>A Hacker Profile &#8211; Who Are They?</title>
		<link>https://fosterinstitute.com/a-hacker-profile-who-are-they/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 24 Sep 2020 16:58:42 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3316</guid>

					<description><![CDATA[<p>I experienced a presentation by the US Secret Service last week, and they provided the common background they&#8217;ve identified in attackers: They may be married and have a family Introverted with a close group of friends Often learned to program at a young age College educated, often in electronics, IT, or physics No social media [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/a-hacker-profile-who-are-they/">A Hacker Profile &#8211; Who Are They?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I experienced a presentation by the US Secret Service last week, and they provided the common background they&#8217;ve identified in attackers: <span id="more-3316"></span></p>
<ul>
<li>They may be married and have a family</li>
<li>Introverted with a close group of friends</li>
<li>Often learned to program at a young age</li>
<li>College educated, often in electronics, IT, or physics</li>
<li>No social media accounts &#8211; to avoid drawing attention</li>
<li>Believe that soft drugs, such as marijuana, help them work</li>
</ul>
<p>Notice that the Secret Service doesn&#8217;t specify a gender.</p>
<p>Please forward this to your friends, so they know their adversaries a little bit better.</p>
<p>The post <a href="https://fosterinstitute.com/a-hacker-profile-who-are-they/">A Hacker Profile &#8211; Who Are They?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Power Down to Boost Security</title>
		<link>https://fosterinstitute.com/power-down-to-boost-security/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 05 Jun 2020 20:35:40 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3220</guid>

					<description><![CDATA[<p>One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don&#8217;t want to power it down, at least disconnect from your network. You&#8217;ll make your computer less attractive to attackers, and it limits the window during which they can attack. You have [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/power-down-to-boost-security/">Power Down to Boost Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div><span>One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don&#8217;t want to power it down, at least disconnect from your network.</span></div>
<p><span id="more-3220"></span></p>
<p>You&#8217;ll make your computer less attractive to attackers, and it limits the window during which they can attack. You have nothing to lose, and you might even reduce your power bill!</p>
<p>Please forward this to all of your friends, so they know this simple step to protect themselves.</p>
<p>The post <a href="https://fosterinstitute.com/power-down-to-boost-security/">Power Down to Boost Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zoom Security &#8211; Follow Along to Set Security Settings</title>
		<link>https://fosterinstitute.com/follow-along-to-set-zoom-security-settings/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 03 Apr 2020 15:11:58 +0000</pubDate>
				<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Zoom]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3071</guid>

					<description><![CDATA[<p>Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings. This video is [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/follow-along-to-set-zoom-security-settings/">Zoom Security &#8211; Follow Along to Set Security Settings</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings.</p>
<p>This video is for non-technical people who need to make Zoom more secure today. So, if that’s you, open up your zoom account settings on your screen, and keep this video where you can see it side-by-side. Pause the video when you need to.<span id="more-3071"></span></p>
<p>Some people say, &#8220;Mike, tell us what settings to change to increase our Zoom security.&#8221; If that&#8217;s you, then you are going to love this video. It walks you through your Zoom account settings so you can follow along.</p>
<p><iframe title="Zoom Security - Follow Along to Set Settings" src="https://player.vimeo.com/video/403594987?dnt=1&amp;app_id=122963" width="384" height="235" frameborder="0" allow="autoplay; fullscreen" allowfullscreen></iframe></p>
<p>I know that some of you will want to fine tune the settings more than this. This video is not designed to replace your IT Pro; they know more about your specific system and requirements.</p>
<p>To help protect your Zoom meetings, watch other videos that cover concerns about using Zoom:</p>
<p><a href="https://fosterinstitute.com/?p=3094&amp;preview=true" target="_blank" rel="noopener noreferrer">Zoom Security &#8211; Set Up Two-Step Login</a></p>
<p><a href="https://fosterinstitute.com/?p=3099&amp;preview=true" target="_blank" rel="noopener noreferrer">Zoom Security Settings &#8211; The Concise Details</a></p>
<p><a href="https://fosterinstitute.com/blog/zoom-security-issues-protect-yourself/" target="_blank" rel="noopener noreferrer">Zoom Security Issues &#8211; Protect Yourself</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/follow-along-to-set-zoom-security-settings/">Zoom Security &#8211; Follow Along to Set Security Settings</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Avoid These 3 Really Good Hacker Tricks</title>
		<link>https://fosterinstitute.com/avoid-these-3-really-good-hacker-tricks/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 27 May 2016 09:45:29 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[business IT security]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hacker tricks]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2320</guid>

					<description><![CDATA[<p>Attackers prey on people trusting others. Watch out for these three common tricks. 1. Refuse to permit tech support to access your computer to help you. If this is your known service provider, then maybe you will decide to trust them. However, nobody else. Last week, I connected a new well known web-cam that is [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/avoid-these-3-really-good-hacker-tricks/">Avoid These 3 Really Good Hacker Tricks</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Attackers prey on people trusting others. Watch out for these three common tricks.<span id="more-2320"></span></p>
<p>1. Refuse to permit tech support to access your computer to help you.</p>
<p>If this is your known service provider, then maybe you will decide to trust them. However, nobody else.</p>
<p>Last week, I connected a new well known web-cam that is highly rated. It didn&#8217;t work properly, so I called tech support. Their opening line, &#8220;I will send you a link to click, that will permit me access into your computer so that I can fix the problem.&#8221; I gently told him there was no way he was ever getting remote access. He was shocked, and had to go ask his manager what to do next&#8230;</p>
<p>2. Believe your anti-virus. </p>
<p>The camera company&#8217;s tech support rep, now with the manager with him, told me to download a special driver and run it on my computer. When I started to download the driver onto a &#8220;test&#8221; computer, my anti-virus program identified the driver as a virus. So I refused to install the driver. Without missing a beat, he said, &#8220;That&#8217;s ok, you can trust anything from us &#8211; it is safe.&#8221;</p>
<p>I wonder how many of their customers have been duped. Even if the tech support had no intention of infecting their customers&#8217; computers, how can they be sure that their software isn&#8217;t already compromised without their knowledge? Never let convenience override your choice to do something reckless.</p>
<p>3. Never answer online quizzes.</p>
<p>I love my wife. One day, she was so excited to tell me what her rock band would have been called in High School. She took a quiz on Facebook that told her. I asked what her rock band would have been called. The band name generated by her filling out the online quiz including the street she grew up on, followed by her favorite pet&#8217;s name, and the name of the high school she attended. Like I said earlier, I love her so much. But please don&#8217;t ever fill out any online quizzes again &#8211; ever. You can be duped into giving away too much information. Attackers can combine the answers with other information they discovered elsewhere on the web, and it makes it lots easier for them to assume someone&#8217;s identity.</p>
<p>Please forward this to everyone you care about&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/avoid-these-3-really-good-hacker-tricks/">Avoid These 3 Really Good Hacker Tricks</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why is it not Google&#8217;s fault?</title>
		<link>https://fosterinstitute.com/why-is-it-not-googles-fault/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 12 May 2016 13:00:41 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[two set logon]]></category>
		<category><![CDATA[two step login]]></category>
		<category><![CDATA[business IT security]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[dark-web]]></category>
		<category><![CDATA[gmail]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[password security]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[security blame]]></category>
		<category><![CDATA[stolen passwords]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[two factor auth]]></category>
		<category><![CDATA[two step verification]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2316</guid>

					<description><![CDATA[<p>After last week&#8217;s post about the stolen Google and Gmail passwords, one of our valued subscribers wrote back asking why it isn&#8217;t Google&#8217;s fault that the passwords were stolen. I know &#8211; it would be so easy to blame Google. Those passwords were gathered from other “stolen password repositories” posted on the dark-web. They were [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/why-is-it-not-googles-fault/">Why is it not Google&#8217;s fault?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>After last week&#8217;s post about the stolen Google and Gmail passwords, one of our valued subscribers wrote back asking why it isn&#8217;t Google&#8217;s fault that the passwords were stolen. <span id="more-2316"></span></p>
<p>I know &#8211; it would be so easy to blame Google. Those passwords were gathered from other “stolen password repositories” posted on the dark-web. They were originally acquired through key-loggers, social engineering, brute-force attacks, and a myriad of other ways. None of them, so far as anyone can tell, were stolen by bypassing any security on Google’s systems.</p>
<p>Once upon a time, imagine a situation where a company called Eulcon Inc. buys a lock from a company named Good-Lock. If an employee at Eulcon Inc. loses the key, and an attacker finds the key, and the attacker breaks into Eulcon, should they blame Good-Lock for the intrusion?</p>
<p>Here is what would be much more secure. What if, every time someone turned the key in the lock at Eulcon, the lock wouldn&#8217;t open yet. First, someone at Good-Lock would phone the person at Eulcon to whom the key is registered, in order to verify that they are the person who turned the key. The lock would only open for an authorized person. Potential intruders stay locked out. </p>
<p>This is why it is so important that all organizations set up two step login everywhere possible. Two factor auth dot org provides a list of services that support two step login. Additionally, VPNs, Windows, and other services support two step login. Configure two step login, or pay the consequences. And don&#8217;t blame Good-Lock. And don&#8217;t be like Eulcon spelled backwards.</p>
<p>Please forward this cyber-security info to everyone you care about.</p>
<p>The post <a href="https://fosterinstitute.com/why-is-it-not-googles-fault/">Why is it not Google&#8217;s fault?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Gmail Passwords Stolen, Possibly Millions of Them</title>
		<link>https://fosterinstitute.com/gmail-passwords-stolen-possibly-millions-of-them/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 06 May 2016 13:00:32 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[two step login]]></category>
		<category><![CDATA[added security password security]]></category>
		<category><![CDATA[business IT security]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[gmail security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[security breach]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[two factor auth]]></category>
		<category><![CDATA[two step verification]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2314</guid>

					<description><![CDATA[<p>This applies to everyone, not just Gmail users. A researcher at Hold Security bought 272 million stolen passwords on the dark web. Some of the credentials were for Gmail. This is not Google’s fault. Whether you use Gmail or not, everyone, if they haven’t already, needs to enable two step login. Then it is very [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/gmail-passwords-stolen-possibly-millions-of-them/">Gmail Passwords Stolen, Possibly Millions of Them</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This applies to everyone, not just Gmail users. A researcher at Hold Security bought 272 million stolen passwords on the dark web. Some of the credentials were for Gmail. This is not Google’s fault. Whether you use Gmail or not, everyone, if they haven’t already, needs to enable <span id="more-2314"></span>two step login. Then it is very unlikely that an attacker can compromise your account,  even if they discover your username and password.</p>
<p>Visit two factor auth dot org (no spaces) for a list of services that already permit you to choose two step login. Each site will walk you through the process.</p>
<p>Google calls their service 2 step verification. Google that phrase to find instructions on Google’s site.</p>
<p>Forward this to everyone who you care about so that they can be more cyber-secure too.</p>
<p>The post <a href="https://fosterinstitute.com/gmail-passwords-stolen-possibly-millions-of-them/">Gmail Passwords Stolen, Possibly Millions of Them</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security Version 2.0</title>
		<link>https://fosterinstitute.com/security-version-2-0/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 28 Apr 2016 13:00:20 +0000</pubDate>
				<category><![CDATA[Adobe Flash]]></category>
		<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Application Updates]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Application List]]></category>
		<category><![CDATA[Application Safety]]></category>
		<category><![CDATA[business IT security]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[essential programs]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[non-essential programs]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Summarized Application Inventory]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2306</guid>

					<description><![CDATA[<p>Here is another powerful way to strengthen security – upgrade to the newest versions. Just like last week, your key tool will be your application inventory. It will look something like this… The application inventory shows how many machines have a specific program installed on them, such as: Qty &#8211; Application 18 &#8211; Adobe Flash [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/security-version-2-0/">Security Version 2.0</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Here is another powerful way to strengthen security – upgrade to the newest versions. Just like last week, your key tool will be your application inventory. It will look something like this…<span id="more-2306"></span></p>
<p>The application inventory shows how many machines have a specific program installed on them, such as:</p>
<p>Qty &#8211; Application<br />
18 &#8211; Adobe Flash Player version 11<br />
22 &#8211; Adobe Flash Player version 16<br />
79 &#8211; Adobe Flash Player version 20<br />
29 &#8211; Mozilla Firefox version 38.0.1<br />
99 &#8211; Mozilla Firefox version 44.0.2</p>
<p>Your list will be longer.</p>
<p>Notice that there are three versions of Adobe Flash Player and two versions of Firefox. </p>
<p>As you can imagine, more recent versions of software are generally the most secure. Most organizations such as Adobe and Mozilla recommend that you always use the most recent versions of their tools.</p>
<p>Using the most secure versions of applications is especially important for programs that interface directly to the Internet, such as Flash, Java, and your browsers. </p>
<p>Ask your IT Professionals to update, when possible, those kind of applications. Then, they can show you an updated application inventory report, one that shows the machines being all up-to-date. And, you’ll be able to sleep better at night.</p>
<p>Please forward this email message to everyone you care about…</p>
<p>The post <a href="https://fosterinstitute.com/security-version-2-0/">Security Version 2.0</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Smooth and Slippery for IT Security</title>
		<link>https://fosterinstitute.com/smooth-and-slippery-for-it-security/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 21 Apr 2016 13:00:16 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Application List]]></category>
		<category><![CDATA[Application Safety]]></category>
		<category><![CDATA[business IT security]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[essential programs]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[non-essential programs]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Summarized Application Inventory]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2298</guid>

					<description><![CDATA[<p>When talking about security, a good example is the large polished stainless steel sculpture commonly known as The Bean. If someone wanted to climb the bean, they would quickly find that the smooth surface provides no place to get a foothold. Make your computers like The Bean. Every single program installed on your computers provides [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/smooth-and-slippery-for-it-security/">Smooth and Slippery for IT Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>When talking about security, a good example is the large polished stainless steel sculpture commonly known as The Bean. If someone wanted to climb the bean, they would quickly find that the smooth surface provides no place to get a foothold. Make your computers like The Bean. Every single program installed on your computers provides a potential toe-hold that an attacker can use to access your systems. The key<span id="more-2298"></span> is to ask your IT Professionals for a summarized application inventory. That inventory needs to provide a list showing the number of computers – then the application:</p>
<p>Qty &#8211; Application<br />
79 &#8211; Adobe Flash Player<br />
84 &#8211; Microsoft Office Standard<br />
99 &#8211; Mozilla Firefox<br />
10 &#8211; WinPcap<br />
25 &#8211; WinZip<br />
And your list will be much longer…</p>
<p>To make your systems more secure, look through the list, and identify the applications that are essential to your doing business. Then, ask your IT Pro to remove anything that is not essential. </p>
<p>As you remove the non-essential programs, you make your network more secure. The fewer toe-holds, the more like The Bean, the more secure you will be.</p>
<p>Forward this… </p>
<p>The post <a href="https://fosterinstitute.com/smooth-and-slippery-for-it-security/">Smooth and Slippery for IT Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Know About this IT Networking Strategy Change</title>
		<link>https://fosterinstitute.com/know-about-this-it-networking-strategy-change/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 18 Aug 2014 06:00:26 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Network]]></category>
		<category><![CDATA[IT Professionals]]></category>
		<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[Working with IT]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network safety]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[Managing IT Professionals]]></category>
		<category><![CDATA[security awareness training]]></category>
		<category><![CDATA[Working With IT People]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1953</guid>

					<description><![CDATA[<p>Executives – There is a new strategy to consider moving toward that can save you money, increase security, speed up your networks and help you get ahead of your competition. What should you do about your Cisco stocks? Even the WSJ is talking about… SDN: Software Defined Networking. This new technology is a sweeping change [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/know-about-this-it-networking-strategy-change/">Know About this IT Networking Strategy Change</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Executives – There is a new strategy to consider moving toward that can save you money, increase security, speed up your networks and help you get ahead of your competition. What should you do about your Cisco stocks? Even the WSJ is talking about… <span id="more-1953"></span></p>
<p>SDN: Software Defined Networking. This new technology is a sweeping change that organizations, such as yours, need to consider as a future direction. It is game changing and so simple.</p>
<p>You’ll save money, alleviate a lot of networking issues, increase security, and more.</p>
<p>At the very least, suggest that your IT professional, professionals, and/or third party firm look into this technology. </p>
<p>If you want to learn more, here is a short story intended to introduce the technology in plain English: </p>
<p>Meet the star of the story: Paul the pilot. He flies the newest passenger jets of your favorite airline.</p>
<p>Now, you become a part of the story. Imagine you paying an IT Professional to build a modern airport for your company using the latest technology. Think of Atlanta, DFW, Chicago, or the airport of your choice. The IT Pro creates a network of runways and taxiways for you.</p>
<p>When Paul lands safely at your airport, like at all airports, he uses the runways and taxiways to travel a dot-to-dot path from the runway to the terminal. </p>
<p>The way things work now: Imagine taking all the air-traffic controllers and placing them at intersections around the airport’s field. Then take away everybody’s radios and add fog so thick that nobody can see each other. There is your network! A disaster that is happening! </p>
<p>With this system, imagine this: A plane lands and then, at the end of the runway, there<br />
is an aircraft controller standing on the runway that asks, “Where are you headed?” </p>
<p>Paul steps on the brakes, rolls down the cockpit window and says, “I need to get to Gate 23.” The controller has to think for a moment, then points to one of the taxiways and says, “Drive your plane that way!” Paul does as instructed.</p>
<p>After scooting down the taxiway for a while, Paul encounters another air traffic controller who reviews a table of best routes, and then points Paul towards the next step of the journey. This goes on, through all the intersections along the route, all the way to the terminal. Paul just cannot help it; he starts humming, “Do you know the way to SJO… (San Jose in the Caribbean)</p>
<p>Now think of dozens and dozens of aircraft moving along the taxiways and runways, slamming on the brakes, honking the airplane horns, traffic jams, and the inevitable crashes. No way, San Jose. </p>
<p>In this analogy, the airplanes represent packets of data. Imagine that Paul the pilot comes from (the) cloud, into your (network of) runways and taxiways, and eventually arrives at a (computer) terminal. In a similar fashion, he can leave the terminal, travel your network, and go back into the cloud, or at least into your file server. </p>
<p>Companies such as Cisco, D-Link, HP, Juniper, NETGEAR, etc. design, build, and sell these traffic controllers. Those switches and routers are expensive because each one has to be intelligent enough to know where next to send each data packet. They have to have good memories in order to remember where to route airplanes for best results. In addition, they are usually uncoordinated with the other devices on your network.</p>
<p>When a user connects to your network with their computer, an iPhone, or some other device, their information travels through your network cables of taxiways and runways to and from your servers, other computers, and the Internet cloud.  </p>
<p>With this existing system, when someone starts listening to Internet music for peace of mind, it bogs down the whole network. Nobody notices the hacker or virus that is methodically looking for holes in your security by peeking into every computer on your network. </p>
<p>To top it all off, you pay lots of money for this archaic system! Drawbacks of this system, the one you use now, abound.</p>
<p>This is the happy conclusion: You, all the wiser after reading this story, tell your IT Pro to investigate the implementation of SDN: Software Defined Networking. </p>
<p>Then your wise IT Pro will move all the traffic controllers to a control tower, lift the fog so it is a bright sunny day, and provide radio communications so everybody can function as a team. Teamwork between your network devices is like striking oil! Synergy that is. </p>
<p>The key to all of this is the controller. The controller watches the traffic and tells the devices on the network what to do.  Every step of the way, there is a signal that tells Paul where to steer next. </p>
<p>Faster &#8211; If Paul is carrying lots of music, then because music uses a great deal of data, he is directed to a special taxiway for music.</p>
<p>Prioritize Data &#8211; If a passenger is not feeling well, Paul gets priority and is expedited to the gate to provide a high quality of service (QOS). </p>
<p>Security &#8211; If there is an unruly passenger aboard, called a hi-hacker, Paul is directed to pull over so that the local S.W.A.T. team can storm the plane. </p>
<p>Save Money – Cisco, and other vendors may not like it, but your switches and routers<br />
become inexpensive because they no longer have to be “intelligent.” They are generic, can be any brand, just as long as they listen to the controller.</p>
<p>Coordination – the seventh habit of successful people! Your devices now listen to an intelligent controller that has a clear view of all of the planes in the airport and can make things work right. </p>
<p>From an IT Pro point of view, this is perhaps oversimplified, but for an executive – I hope you found this very useful for understanding the next step in networking technology – and why you need to be planning for Software Defined Networking.</p>
<p>If you want to speak a little Geek, tell your IT Pros, who may already know all about this:  The data pathways (the runways and taxiways) make up the Data Plane. The controller communication travels on the Control Plane using a protocol such as OpenFlow to send out instructions to the Forwarding Plane that contains routing information. </p>
<p>Moreover, all of those signals travel across the regular network connections that are in place now.</p>
<p>Are your IT Pros are aware of the emerging technology called Software Defined Networking?</p>
<p>Please post your comments below&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/know-about-this-it-networking-strategy-change/">Know About this IT Networking Strategy Change</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>See the Real-Time Attack Luring iTunes Users</title>
		<link>https://fosterinstitute.com/see-the-real-time-attack-luring-itunes-users/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 11 Mar 2014 19:03:06 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[best practices]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[Internet Hackers]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[it best practices]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1855</guid>

					<description><![CDATA[<p>Google the word iTunes, and examine the search results. You’ll notice the top Google result for the word “iTunes” is a site that hackers put up in order to redirect unsuspecting users to a potentially malicious hacking site. CAUTION: Do not click on the link. If you want to, try the search yourself, and do [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/see-the-real-time-attack-luring-itunes-users/">See the Real-Time Attack Luring iTunes Users</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Google the word iTunes, and examine the search results. You’ll notice the top Google result for the word “iTunes” is a site that hackers put up in order to redirect unsuspecting users to a potentially malicious hacking site. CAUTION: Do not click on the link.<span id="more-1855"></span></p>
<p>If you want to, try the search yourself, and do it soon – it is likely to be removed very soon. Here is a what it looks like as of 11:42pm Monday night:</p>
<p><a href="https://fosterinstitute.com/blog//wp-content/uploads/2014/03/2014-03-11-Hackers-iTunes.jpg"><img loading="lazy" decoding="async" src="https://fosterinstitute.com/blog//wp-content/uploads/2014/03/2014-03-11-Hackers-iTunes-300x141.jpg" alt="2014 03 11 Hackers iTunes" width="300" height="141" class="alignnone size-medium wp-image-1856" /></a></p>
<p>Additionally, it is a paid ad!</p>
<p>The Google search itself may not expose you unduly, but be CAUTIONED about actually clicking on that link!</p>
<p>Please post your comments below&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/see-the-real-time-attack-luring-itunes-users/">See the Real-Time Attack Luring iTunes Users</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
