<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cyber security expert Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/cyber-security-expert/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/cyber-security-expert/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Tue, 05 Apr 2022 16:32:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>cyber security expert Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/cyber-security-expert/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Protect Sensitive Data on USB Drives and Memory Sticks if they are Lost or Stolen</title>
		<link>https://fosterinstitute.com/easily-lock-the-data-on-usb-drives/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 18 Feb 2022 00:00:38 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[BitLocker]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security assessment]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[encrypt USB drives]]></category>
		<category><![CDATA[it audit]]></category>
		<category><![CDATA[IT review]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[memory stick safety]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[risk management audit]]></category>
		<category><![CDATA[risk management expert]]></category>
		<category><![CDATA[risk management report]]></category>
		<category><![CDATA[USB Drives]]></category>
		<category><![CDATA[usingi bitlocker]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1970</guid>

					<description><![CDATA[<p>People sometimes lose or misplace USB memory sticks, SD Cards, External USB hard drives, and other external storage media. Help protect your data from prying eyes and cyber thieves by encrypting the drive. On Macs and Windows, encrypting an external drive can be as simple as right-clicking on the external drive’s icon and selecting the [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/easily-lock-the-data-on-usb-drives/">Protect Sensitive Data on USB Drives and Memory Sticks if they are Lost or Stolen</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>People sometimes lose or misplace USB memory sticks, SD Cards, External USB hard drives, and other external storage media. Help protect your data from prying eyes and cyber thieves by encrypting the drive.</p>
<p>On Macs and Windows, encrypting an external drive can be as simple as right-clicking on the external drive’s icon and selecting the encryption option.</p>
<p>Two golden rules:</p>
<p>1) Be sure your files are backed up elsewhere before encrypting a drive.</p>
<p>2) Be sure to save the recovery key in case you forget the password.</p>
<p>Encrypting individual files is helpful to protect your data, but attackers can still read the filenames and deduce information. One advantage to encrypting an entire external drive is bad actors cannot see the filenames when you encrypt an entire external drive or memory stick.</p>
<p>I intend to make you aware of the importance of encrypting external drives and not go into technical details. So, you’re welcome to skip the following information. If you encounter errors encrypting drives in the simple method above, there are many details. For example:</p>
<p>Windows: One way to encrypt drives is using BitLocker. If you have Windows Home edition instead of Pro, you cannot encrypt drives, but you can unlock and use encrypted drives. All editions of Windows support the “device encryption” feature.</p>
<p>Macs: You can use an encryption utility called Filevault2. Alternatively, you can encrypt drives when you format them. If you have a Mac with an Apple CPU, some users experience losing access to the data on the drive after encryption. Apple will fix that soon if they haven’t already.</p>
<p>Hopefully, you won&#8217;t encounter any issues when you encrypt your external drives and help protect the data from anyone who steals or discovers a misplaced drive.</p>


<p></p>
<p>The post <a href="https://fosterinstitute.com/easily-lock-the-data-on-usb-drives/">Protect Sensitive Data on USB Drives and Memory Sticks if they are Lost or Stolen</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protect Loved Ones from Tech Support Scams and Share this Hilarious Video</title>
		<link>https://fosterinstitute.com/protect-loved-ones-from-tech-support-scams-and-share-this-hilarious-video/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 18 Mar 2021 15:23:58 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3483</guid>

					<description><![CDATA[<p>A wonderful person who is tech-savvy sent an e-mail message yesterday explaining that she cannot trust her mom with a computer or phone anymore because scammers posing as Microsoft stole $2000 from her. Take a few moments to have the anti-scammer conversation with those you love. Their computer screen might display Microsoft’s logo stating that [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/protect-loved-ones-from-tech-support-scams-and-share-this-hilarious-video/">Protect Loved Ones from Tech Support Scams and Share this Hilarious Video</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A wonderful person who is tech-savvy sent an e-mail message yesterday explaining that she cannot trust her mom with a computer or phone anymore because scammers posing as Microsoft stole $2000 from her.<span id="more-4515"></span></p>
<p>Take a few moments to have the anti-scammer conversation with those you love. Their computer screen might display Microsoft’s logo stating that there is a virus on their computer. It is a scam, and they should not phone the tech support number on their screen.</p>
<p>Encourage your loved ones to watch the hilarious TED talk video: <a href="http://ted.com/talks/james_veitch_this_is_what_happens_when_you_reply_to_spam_email" target="_blank" rel="noopener">ted.com/talks/james_veitch_this_is_what_happens_when_you_reply_to_spam_email</a></p>
<p>Please forward this to your friends, so they alert their trusting loved ones.</p>
<p>The post <a href="https://fosterinstitute.com/protect-loved-ones-from-tech-support-scams-and-share-this-hilarious-video/">Protect Loved Ones from Tech Support Scams and Share this Hilarious Video</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated Problems</title>
		<link>https://fosterinstitute.com/your-phone-tablet-and-computer-started-hiding-you-and-how-to-overcome-the-associated-problems/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 25 Feb 2021 14:50:39 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3453</guid>

					<description><![CDATA[<p>A friend contacted me a few days ago and said, “Every few weeks, I’ll go to a site, and it will say that this appears to be a new device? For example, I’ve looked at my Twitter account this morning, and it put up my username and asked me for my password again. Is this [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/your-phone-tablet-and-computer-started-hiding-you-and-how-to-overcome-the-associated-problems/">Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated Problems</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A friend contacted me a few days ago and said, “Every few weeks, I’ll go to a site, and it will say that this appears to be a new device? For example, I’ve looked at my Twitter account this morning, and it put up my username and asked me for my password again. Is this anything to be concerned about?” <span id="more-4514"></span></p>
<p>A little background information helps explain what is going on: Every device connected to a network has a serial number, called a MAC address. That address is how the network identifies the device and differentiates it from all the other devices on a network. As you can imagine, networks need to know what devices are connected. Think of what might happen if the network thought your computer was a printer. Printer paper might not come shooting out of your keyboard, knock over your coffee or smoothie, but you get the idea.</p>
<p>Because the MAC address uniquely identifies you for everyone else, think of the MAC address as a fingerprint for your device. Potentially, an advertiser, or someone in a public place, could use your fingerprint, in this case, your device’s MAC address, to track you, your activities, and what networks you use.</p>
<p>Apple, Google, and Microsoft want to help protect your privacy, so they might periodically change the MAC address on your computer to a different address. The new behavior strives to help keep you more anonymous on public networks at hotels and coffee shops. However, randomly changing MAC addresses can break essential security features, including:</p>
<p>1) As my friend did, you might start receiving alarming alerts that another person connected a new device to one of your websites or accounts. The warnings are concerning until you realize it is your computer reconnecting with a new unique index. After a time, you might ignore the alerts. But then you won&#8217;t know if a real attacker broke into your account with some other computer, tablet, or phone.</p>
<p>2) Parental controls at home fail if the safety restrictions are unique for each family device. When a youngster disconnects and reconnects to your network, sometimes they are no longer protected.</p>
<p>3) Your company keeps an inventory of your computers, tablets, and phones. It is challenging to keep the list current when your IT team must track three times as many devices as you have.</p>
<p>How do you solve this? It is possible to disable the randomization feature, but it takes time to reconfigure. Time is a precious commodity for you and your IT team too. An example of how to disable the behavior on iPhones, iPads, and Apple Watches: <a href="http://support.apple.com/en-us/HT211227" target="_blank" rel="noopener">support.apple.com/en-us/HT211227</a></p>
<p>However, your employees or kids could change the feature back again to help them hide on your networks.</p>
<p>The answer to my friend&#8217;s question is that if the website tells you a date, time, and location of that person&#8217;s login, and you know you weren&#8217;t logging in from there at that time, yes, you need to be concerned. Otherwise, your experience may be because your device is disguising itself from the website. Disable the randomization feature, and the problem might go away.</p>
<p>Please forward this to your friends so that if they, or their IT team, cannot figure out why some of your security features are breaking, they will know to suspect their devices are rotating through MAC addresses.</p>
<p>If you want more technical details, a network identifies your device with an index number called a MAC address when you connect. There are more than 280 trillion possibilities for a MAC address; the odds are that nobody you know has the same number as your device. The first half of the number identifies the manufacturer; that makes it easier to find unidentified devices on a network.</p>
<p>Other problems you&#8217;ll notice because of rotating MAC addresses include:</p>
<p>4) Security tools at the office fail to work if the security tools rely on associating users with their computers, tablets, or phones. This problem affects both BYOD and company-issued devices.</p>
<p>5) IT Professionals can configure necessary reservations for computers, tablets, and phones. Those reservations are based on index numbers. When the index changes, the reservation stops working, and systems can fail or lose security.</p>
<p>6) Your websites will forget you. Some sites have a feature to Remember This Computer, so you do not need to go through as many steps each time you log in. The sites identify your devices by their index numbers. Your device will need to be re-remembered when your index changes.</p>
<p>MAC addresses look like FF:FF:FF:FF:FF:FF:FF:FF where each value I listed as F can be a hexadecimal digit 0,1,2,3,4,5,6,7,8,9, A, B, C, D, E, or F. If you know where to look, your phone, tablet, and computer can tell you the MAC addresses of each network interface.</p>
<p>The new behavior is causing lots of frustration in the cybersecurity world. This battle isn&#8217;t over yet.</p>
<p>The post <a href="https://fosterinstitute.com/your-phone-tablet-and-computer-started-hiding-you-and-how-to-overcome-the-associated-problems/">Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated Problems</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Prepare Now to Recover Quickly from Ransomware on Mac and Windows Computers</title>
		<link>https://fosterinstitute.com/prepare-now-to-recover-quickly-from-ransomware-on-mac-and-windows-computers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 28 Jan 2021 17:31:33 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3421</guid>

					<description><![CDATA[<p>Equip all of your Work from Home users with a cloned drive so they can help protect your network and get up and running quickly if they get ransomware or if their hard drive crashes. Protect your home family computers the same way. Cloning a hard drive creates a second drive that looks, to a [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/prepare-now-to-recover-quickly-from-ransomware-on-mac-and-windows-computers/">Prepare Now to Recover Quickly from Ransomware on Mac and Windows Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Equip all of your Work from Home users with a cloned drive so they can help protect your network and get up and running quickly if they get ransomware or if their hard drive crashes. Protect your home family computers the same way.<span id="more-3421"></span></p>
<p>Cloning a hard drive creates a second drive that looks, to a computer, identical to the source drive. If your laptop or computer gets ransomware or seems infected somehow, you can restore a cloned drive&#8217;s image to effectively reset the computer to how it was when you most recently made a clone. Additionally, if the hard drive crashes, the clone could quickly replace that drive&#8217;s functionality.</p>
<p>Create frequent clones of your computer&#8217;s hard disk to one or more external USB hard drives. Keep making your other backups too.</p>
<p>For Windows computers, Microsoft provides the System Image Creation feature. Commercial options include Shadow Protect Desktop from StorageCraft and Acronis True Image.</p>
<p>For Macs, options include Carbon Copy Cloner, Acronis True Image, and SuperDuper! Check compatibility with your version of OSX. Apple Time Machine is always compatible, and it is possible to boot into recovery mode to restore a drive from Time Machine, but it&#8217;s not a clone.</p>
<p>(We do not receive compensation for, nor do we endorse specific products. It is essential to give you examples.)</p>
<p>Please forward this to your friends to ensure they know cloned hard drives often permit speedy recovery of ransomed computers. If they have a clone image of a hard drive, work from home users can likely stay productive even when their computer malfunctions.</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/prepare-now-to-recover-quickly-from-ransomware-on-mac-and-windows-computers/">Prepare Now to Recover Quickly from Ransomware on Mac and Windows Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks</title>
		<link>https://fosterinstitute.com/tips-and-tricks-an-unconventional-way-to-protect-yourself-from-solarwinds-and-future-hacks/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 13 Jan 2021 22:53:39 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3406</guid>

					<description><![CDATA[<p>Will running one rarely used program stop future attacks? It will in the SolarWinds attack and perhaps stop future compromises too. It makes sense that malware uses strategies to infect and hide inside of networks undetected. Here is some fascinating insight into that self-preservation: The malware related to SolarWinds attack looks for specific security related [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/tips-and-tricks-an-unconventional-way-to-protect-yourself-from-solarwinds-and-future-hacks/">Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Will running one rarely used program stop future attacks? It will in the SolarWinds attack and perhaps stop future compromises too.<span id="more-3406"></span></p>
<p>It makes sense that malware uses strategies to infect and hide inside of networks undetected. Here is some fascinating insight into that self-preservation: The malware related to SolarWinds attack looks for specific security related software, including a free program named WireShark, before installing itself. If Wireshark is running in Windows, the virus installation terminates itself.</p>
<p>Should you run WireShark on your computers 24&#215;7? Ordinarily, IT Professions remove WireShark in case attackers installed it. Paradoxically, running WireShark will stop the initial activation of the SolarWinds attack. WireShark is not the only choice. Open this Microsoft article and use CTRL-F search for the word WireShark to see the other security related tools that will horrify some malware: <a href="https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/" target="_blank" rel="noopener">https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/</a></p>
<p>But, after SUNBURST installs itself, it is too late. It doesn&#8217;t look for security related tools after installation.</p>
<p>This message is not a recommendation to run these applications, nor is it intended to dissuade you. If organizations start adopting this strategy to thwart cautious attacks, it will be interesting to see how malware responds.</p>
<p>Forward this article to your friends so they receive this insight into how bad actors strive to avoid detection and discuss implementing this unconventional approach to stopping malware installations.</p>
<p>The post <a href="https://fosterinstitute.com/tips-and-tricks-an-unconventional-way-to-protect-yourself-from-solarwinds-and-future-hacks/">Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Three of the Most Useful Links About the SolarWinds Attack:</title>
		<link>https://fosterinstitute.com/three-of-the-most-useful-links-about-the-solarwinds-attack/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 07 Jan 2021 17:37:03 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3386</guid>

					<description><![CDATA[<p>Even if you don&#8217;t use SolarWinds, your suppliers and customers might. In some cases, your security is only as good as their security. There are so many webpages about the Solar Winds attack. Here are three of the most useful. Please forward this to your IT team. Do not let the title of this Microsoft [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/three-of-the-most-useful-links-about-the-solarwinds-attack/">Three of the Most Useful Links About the SolarWinds Attack:</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Even if you don&#8217;t use SolarWinds, your suppliers and customers might. In some cases, your security is only as good as their security.</p>
<p>There are so many webpages about the Solar Winds attack. Here are three of the most useful. Please forward this to your IT team.<span id="more-3386"></span></p>
<p>Do not let the title of this Microsoft article fool you. Microsoft explains how the attack starts and progresses, complete with diagrams. Not only is this page fascinating reading about this horrible attack, understanding the tactics helps your team protect you from future supply chain attacks:<br />
<a href="https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/" target="_blank" rel="noopener">https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/</a></p>
<p>Microsoft&#8217;s recommendations about how to protect Office 365: <a href="https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/ba-p/1751754" target="_blank" rel="noopener">https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/ba-p/1751754</a></p>
<p>SUPERNOVA is malware that different attackers made to impersonate the SolarWinds SUNBURST attack, and it is dangerous too. SolarWinds addresses both in their comprehensive information about determining if SolarWinds installations are affected and how to protect your organization: <a href="https://www.solarwinds.com/securityadvisory" target="_blank" rel="noopener">https://www.solarwinds.com/securityadvisory</a></p>
<p>Please forward this message to other organizations you care about, especially your suppliers, so their IT Pros have three of the most useful links amongst the dozens of others.</p>
<p>The post <a href="https://fosterinstitute.com/three-of-the-most-useful-links-about-the-solarwinds-attack/">Three of the Most Useful Links About the SolarWinds Attack:</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks</title>
		<link>https://fosterinstitute.com/emergency-update-if-your-it-team-uses-solarwinds-products-and-how-to-protect-against-supply-chain-attacks/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 15 Dec 2020 16:15:23 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[CCleaner]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[Infection Vector]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[SolarWinds]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3367</guid>

					<description><![CDATA[<p>Bad Actors compromised a product called SolarWinds Orion and then used that as a vector attack organization. Ask your IT team if they use SolarWinds products, and if so, they must visit SolarWinds dot com/security advisory immediately for more information. SolarWinds is a well-respected organization, and many organizations utilize their products. Not enough details are [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/emergency-update-if-your-it-team-uses-solarwinds-products-and-how-to-protect-against-supply-chain-attacks/">Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Bad Actors compromised a product called SolarWinds Orion and then used that as a vector attack organization. Ask your IT team if they use SolarWinds products, and if so, they must <span id="more-3367"></span>visit SolarWinds dot com/security advisory immediately for more information.</p>
<p>SolarWinds is a well-respected organization, and many organizations utilize their products. Not enough details are known to discredit their organization. Clearly, attackers see them as valuable enough to use as an infection vector.</p>
<p>This is called a supply chain attack because bad actors use a trusted product in an organization&#8217;s supply chain to attack the organization. A similar well-publicized attack happened with a popular tool, with many benefits, called CCleaner. The attackers successfully compromised 2.3 Million PCs.</p>
<p>The CCleaner supply chain attack is an illustration of dwell time. Attackers waited five months from the time they gained access to CCleaner before they launched the attack on CCleaner users. Many computers were safe, but not 2.3 Million of them.</p>
<p>Remember: Just because your organization fixes a vector through which the infection came does not eliminate damage already done. As an analogy, if you were the king or queen of a castle, and you found that attackers entered your castle walls to attack your city, raising the bridge over your moat does not eliminate the attackers who already made it inside.</p>
<p>Supply chain attacks are one of many reasons to eliminate as much software as possible at your organization. If a program is not essential, remove it asap. SolarWinds is vital for many organizations.</p>
<p>Please forward this to your friends so they can alert their IT departments to address this situation, and know to remove all non-essential software from all computers.</p>
<p>The post <a href="https://fosterinstitute.com/emergency-update-if-your-it-team-uses-solarwinds-products-and-how-to-protect-against-supply-chain-attacks/">Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Beware: Attackers Buy Top Search Engine Results to Trick You</title>
		<link>https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 16:40:14 +0000</pubDate>
				<category><![CDATA[browser security]]></category>
		<category><![CDATA[Credit Card Security]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[Malicious Advertising]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Website Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3351</guid>

					<description><![CDATA[<p>What seems to be the best way to find a company&#8217;s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site. Here is how the scam works: Suppose you want to look up a company online [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/">Beware: Attackers Buy Top Search Engine Results to Trick You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>What seems to be the best way to find a company&#8217;s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site. <span id="more-3351"></span></p>
<p>Here is how the scam works: Suppose you want to look up a company online named Super Duper, so you type the store&#8217;s name into your favorite search engine. An attacker might have purchased the top result to take you to the website superduperco.com. However, if you knew to scroll down past the paid-for-results, you would have seen that the real website is superduper.com. Attackers set up a website and named it superduperco.com.</p>
<p>Their deceptive site might contain malicious advertising, ask you to enter credit card numbers during checkout, or tempt you to download malicious programs and apps. They might ask you to login or reset a password, and they capture the password you type in.</p>
<p>If you look up a retailer in a search engine, skip past the ads and paid results. Scroll down to see real search results. Even then, be skeptical in case attackers used SEO techniques to appear at the top of the actual search results.</p>
<p>Please forward this to your friends to alert their users that top search engine results can be a trap.</p>
<p>The post <a href="https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/">Beware: Attackers Buy Top Search Engine Results to Trick You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them</title>
		<link>https://fosterinstitute.com/attackers-can-take-control-of-your-network-in-three-seconds-and-how-to-stop-them/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 23 Oct 2020 19:03:56 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Remote Worker Security]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3333</guid>

					<description><![CDATA[<p>An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network. The attacker does not need to know any passwords; they do not even need a username. They plug in a cable, and 3 seconds later, they&#8217;ve completely compromised your network. An attacker posing as [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/attackers-can-take-control-of-your-network-in-three-seconds-and-how-to-stop-them/">Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network.<span id="more-3333"></span></p>
<p>The attacker does not need to know any passwords; they do not even need a username. They plug in a cable, and 3 seconds later, they&#8217;ve completely compromised your network. An attacker posing as a visitor, a copier repair person, or a member of a cleaning crew can all compromise your organization. They can steal sensitive information, install ransomware, and can shut down operations entirely. They bypass the majority of, if not all, of your other protections because now they&#8217;re a Domain Administrator.</p>
<p>This exploit is so severe that the Department of Homeland Security directed all federal agencies to apply the patch in accordance with the Federal Emergency Directive 20-04.</p>
<p>Take these three steps ASAP:</p>
<p>First, ask your IT team if they&#8217;ve backed up your Domain Controller servers and applied Microsoft&#8217;s patches that address the Zerologon exploit CVE-2020-1472. They must do this immediately. Be compassionate if they&#8217;ve not. IMPORTANT: Realize that if an attacker already took over a network, the patch doesn&#8217;t help.</p>
<p>Second, if you have Domain Controllers using operating systems older than Windows Server 2008 R2, your IT professionals must shut them down for good. Be sure to migrate any mission-critical services to other servers.</p>
<p>Third, does your organization rely on third parties to support you? What if one of your major suppliers, a distributor, or your biggest customer falls prey to an attack? Prepare your organization now for an interruption of their operations. Be sure their executives know about this flaw and these three steps. You do not want a catastrophe at their organization to domino and cause a disaster for you, even though you&#8217;ve protected your systems.</p>
<p>Additional steps:</p>
<p>Inform your work-from-home team members that, in some cases, the attacker can take over your network using a VPN connection. Do you have an armed guard at every work-from-home user&#8217;s home to watch visitors? Of course not. But your entire organization might rely on their security. What if a teenager&#8217;s friend feels like playing around, experimenting, with this new cool exploit on a mom or dad&#8217;s computer?</p>
<p>The patches only protect you from attacks from Windows devices. If an attacker accesses a network port or cable with a non-Windows machine, the attacker can still take control of your network. Microsoft will release a second patch on February 9, 2021. Ask your IT team to configure alerts now to monitor security log events 5827 thru 5831 to see when connections are allowed or denied.</p>
<p>The average time for IT Professionals to apply critical security patches is five months, but you need to help yours be above average. Ask them what you can do to help them have time to test and install all critical security patches within 14 days or sooner. They might want to have a patch management tool. They might need more time to devote to applying updates.</p>
<p>Confirm that your IT Team disconnects or disables all unused Ethernet ports, including those in conference rooms. Lock doors to any offices and conference rooms that contain active Ethernet ports. Train everyone to be proactive and remove opportunities for anyone, including guests and repair people, to plug a device into a network port.</p>
<p>Keep in mind that 911 systems, airlines, governments, and every organization that you depend on are at risk for Zerologon exploit CVE-2020-1472 until they take action too.</p>
<p>Please forward this to fellow executives you care about so they can support their IT Professionals successfully backing up servers and applying the emergency patch.</p>
<p>The post <a href="https://fosterinstitute.com/attackers-can-take-control-of-your-network-in-three-seconds-and-how-to-stop-them/">Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself</title>
		<link>https://fosterinstitute.com/one-nine-year-old-checking-her-email-can-breach-your-entire-organization-and-how-to-protect-yourself/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 07 Oct 2020 08:00:34 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[Remote Worker Security]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3324</guid>

					<description><![CDATA[<p>Workers who use their personal home computers for business put you at significant risk. When another family member shares a work-from-home computer, it magnifies your risk exponentially. If users already work from home using personal home computers, there are potentially cost-free steps to help protect your organization. Consider allowing them to take their work computer [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/one-nine-year-old-checking-her-email-can-breach-your-entire-organization-and-how-to-protect-yourself/">One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Workers who use their personal home computers for business put you at significant risk.<span id="more-3324"></span></p>
<p>When another family member shares a work-from-home computer, it magnifies your risk exponentially. If users already work from home using personal home computers, there are potentially cost-free steps to help protect your organization. Consider allowing them to take their work computer home. If their work computer doesn&#8217;t have wireless access, you can provide an inexpensive USB wireless adapter.</p>
<p>Allow your IT professionals, or IT consultants, to monitor and maintain the security of those computers. Many protection tools support remote users, so you might already have what you need.</p>
<p>Dedicated work computers must remain off-limits to other family members. Set a firm boundary that your workers are not authorized to use the computers for any purpose other than working.</p>
<p>Please forward this to your friends, so they know this cost-free way to help protect work-from-home users.</p>
<p>The post <a href="https://fosterinstitute.com/one-nine-year-old-checking-her-email-can-breach-your-entire-organization-and-how-to-protect-yourself/">One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
