<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cyber security Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/cyber-security/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Tue, 05 Apr 2022 16:32:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>cyber security Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/cyber-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Protect Sensitive Data on USB Drives and Memory Sticks if they are Lost or Stolen</title>
		<link>https://fosterinstitute.com/easily-lock-the-data-on-usb-drives/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 18 Feb 2022 00:00:38 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[BitLocker]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security assessment]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[encrypt USB drives]]></category>
		<category><![CDATA[it audit]]></category>
		<category><![CDATA[IT review]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[memory stick safety]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[risk management audit]]></category>
		<category><![CDATA[risk management expert]]></category>
		<category><![CDATA[risk management report]]></category>
		<category><![CDATA[USB Drives]]></category>
		<category><![CDATA[usingi bitlocker]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1970</guid>

					<description><![CDATA[<p>People sometimes lose or misplace USB memory sticks, SD Cards, External USB hard drives, and other external storage media. Help protect your data from prying eyes and cyber thieves by encrypting the drive. On Macs and Windows, encrypting an external drive can be as simple as right-clicking on the external drive’s icon and selecting the [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/easily-lock-the-data-on-usb-drives/">Protect Sensitive Data on USB Drives and Memory Sticks if they are Lost or Stolen</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>People sometimes lose or misplace USB memory sticks, SD Cards, External USB hard drives, and other external storage media. Help protect your data from prying eyes and cyber thieves by encrypting the drive.</p>
<p>On Macs and Windows, encrypting an external drive can be as simple as right-clicking on the external drive’s icon and selecting the encryption option.</p>
<p>Two golden rules:</p>
<p>1) Be sure your files are backed up elsewhere before encrypting a drive.</p>
<p>2) Be sure to save the recovery key in case you forget the password.</p>
<p>Encrypting individual files is helpful to protect your data, but attackers can still read the filenames and deduce information. One advantage to encrypting an entire external drive is bad actors cannot see the filenames when you encrypt an entire external drive or memory stick.</p>
<p>I intend to make you aware of the importance of encrypting external drives and not go into technical details. So, you’re welcome to skip the following information. If you encounter errors encrypting drives in the simple method above, there are many details. For example:</p>
<p>Windows: One way to encrypt drives is using BitLocker. If you have Windows Home edition instead of Pro, you cannot encrypt drives, but you can unlock and use encrypted drives. All editions of Windows support the “device encryption” feature.</p>
<p>Macs: You can use an encryption utility called Filevault2. Alternatively, you can encrypt drives when you format them. If you have a Mac with an Apple CPU, some users experience losing access to the data on the drive after encryption. Apple will fix that soon if they haven’t already.</p>
<p>Hopefully, you won&#8217;t encounter any issues when you encrypt your external drives and help protect the data from anyone who steals or discovers a misplaced drive.</p>


<p></p>
<p>The post <a href="https://fosterinstitute.com/easily-lock-the-data-on-usb-drives/">Protect Sensitive Data on USB Drives and Memory Sticks if they are Lost or Stolen</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zoom Security Settings &#8211; The Concise Details</title>
		<link>https://fosterinstitute.com/zoom-security-settings-the-concise-details/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 08 Apr 2020 16:50:02 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Video Meeting Security]]></category>
		<category><![CDATA[Zoom]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Safe Network]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3099</guid>

					<description><![CDATA[<p>Zoom has many security settings. This is a detailed but concise guide to the settings and how they work. Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/zoom-security-settings-the-concise-details/">Zoom Security Settings &#8211; The Concise Details</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Zoom has many security settings. This is a detailed but concise guide to the settings and how they work.<br />
<span id="more-3099"></span><br />
Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings.</p>
<p><iframe src="https://player.vimeo.com/video/405323511?dnt=1&amp;app_id=122963" width="384" height="216" frameborder="0" allow="autoplay; fullscreen" allowfullscreen></iframe></p>
<div>
<div>
<p>Fasten your seatbelt. There are lots of security settings in Zoom. You must change default settings to help close the doors to hackers.</p>
<p>To access the account settings, sign into the Zoom website, click on your account on the far right of the top bar. You can also select a link to Account Management, under which you can reach the Account Settings.</p>
<p>The free version of Zoom lacks some essential security controls. In the paid version, the best place to start is, in the left-hand column, under ADMIN, select Account Management &gt; Account Settings. By default, you&#8217;re already on the meeting tab.</p>
</div>
<div></div>
<div>
<p>One of the first things you&#8217;ll notice is that some settings have a lock symbol next to them. Zoom allows you to configure settings at an account level, group level, and user level. Here, at the account level, if you click the lock icon, that setting will override the group and user settings.</p>
<p>HOST VIDEO: Disable this setting so the host will start meetings with their video off. The host will be able to show their video when they choose.</p>
</div>
<div></div>
<div>
<p>JOIN BEFORE HOST: Disable and lock the setting that would allow others to join the meeting before the host arrives. Never let anyone start communicating until you join to moderate the conversation.</p>
<p>USE PERSONAL MEETING ID (PMI) WHEN SCHEDULING A MEETING: You may not know it yet, but Zoom sets up a private meeting room for you that runs all the time. Your Personal Meeting ID, abbreviated PMI, is the Zoom address to your room. You want your PMI address to be confidential. Disable this setting.</p>
<p>USE PERSONAL MEETING ID (PMI) WHEN STARTING AN INSTANT MEETING: Disable this too for the same reason.</p>
<p>ONLY AUTHENTICATED USERS CAN JOIN MEETINGS: Enable this to add more protection if you meet with coworkers and other people you know who have Zoom accounts. However, you might choose to disable the setting if you will meet with clients, prospects, or anyone else who might not have Zoom accounts.</p>
<p>REQUIRE A PASSWORD WHEN SCHEDULING MEETINGS. Enable this option for all meeting types. Jot down your PMI password.</p>
<p>Here&#8217;s a tip. In case you are ever in a meeting and need to know the password quickly, click on the icon to invite someone, then Zoom displays the meeting ID at the top and the meeting&#8217;s password on the lower right corner of your window.</p>
<p>EMBED PASSWORDS IN MEETING LINK FOR ONE-CLICK JOIN: Leaving the setting enabled means the invitation&#8217;s link to the meeting includes a built-in password. Invitees are not prompted for and do not need to know the password. That means you can require passwords, and your clientele doesn&#8217;t even need to know.</p>
<p>However, embedding the passphrase inside the invitation exposes you to risk. If an unauthorized person obtains the email message, then they, too, can authenticate to your meeting without needing to know the password. If you disable this setting, tell everyone in the meeting the password through some method other than email.</p>
</div>
<div></div>
<div>
<p>REQUIRE PASSWORD FOR PARTICIPANTS JOINING BY PHONE: Enable this if you want to protect against unauthorized callers.</p>
<p>MUTE PARTICIPANTS ON ENTRY: Enable this, not only for security but to protect the meeting from background noise near a participant.</p>
<p>CHAT: Disable this setting here.  If an unauthorized person joins the meeting, you don&#8217;t want them to send disturbing chat messages for all to see. If some sessions require chat, do not click the lock.</p>
</div>
<div></div>
<div>
<p>PRIVATE CHAT: Disable private chat. Protect your participants from unwelcome interruptions from others, perhaps uninvited participants.</p>
<p>PLAY SOUND WHEN PARTICIPANTS JOIN OR LEAVE: Enable this setting to avoid being surprised to find out someone joined, and you didn&#8217;t notice. Check the box if you want to require telephone participants to record their names for an announcement when they join.</p>
<p>FILE TRANSFER: Disable and lock this setting. Blocking file transfers helps stop the spread of malware and potentially offensive content.</p>
<p>FEEDBACK TO ZOOM: Disable this feature.</p>
</div>
<div></div>
<div>
<p>ALLOW HOST TO PUT ATTENDEE ON HOLD: Enable and lock this setting for when you need to have a conversation without everyone listening.</p>
<p>ALWAYS SHOW MEETING CONTROL TOOLBAR: Enable this setting to make your life easier.</p>
<p>SHOW ZOOM WINDOWS DURING SCREEN SHARE: Disable this setting. Unless you are training people to host Zoom, no one needs to see what the host sees.</p>
<p>SCREEN SHARING: Unless you need people to show what&#8217;s on their screens to everyone during the meeting, set sharing to host only. If participants can share, there is a risk that someone, perhaps an uninvited participant, could show unwelcome content.</p>
<p>DISABLE DESKTOP/SCREENSHARE FOR USERS: Zoom allows the sharing of an entire monitor or sharing just one program&#8217;s window. Enable this setting if you want Zoom only to show the program window. This setting helps protect your participants, and the host, from accidentally sharing sensitive information somewhere on their desktop.</p>
<p>If, however, someone plans to use PowerPoint in presenter mode, disable this feature so that the host can share the whole monitor for displaying the slides.</p>
<p>ANNOTATION: Unless annotation is essential for your meeting, disable it. Turning off annotation prevents an uninvited participant from interrupting the flow of the meeting by placing images all over the screen.</p>
</div>
<div></div>
<div>
<p>WHITEBOARD: Unless you need the Whiteboard, disable it for the same reason you disable annotation.</p>
<p>REMOTE CONTROL: Unless you need participants to let others remotely control the shared content, disable this feature.</p>
<p>ALLOW REMOVED PARTICIPANTS TO REJOIN: Unless you think you might accidentally remove someone from a meeting, disable this feature to tell Zoom to keep them out.</p>
<p>FAR END CAMERA CONTROL: Disable this setting unless you want someone else to take control of your camera during your meeting.</p>
</div>
<div></div>
<div>
<p>VIRTUAL BACKGROUND: For security and privacy, tell workers to hide what is in their home office. Your workers can use a green screen backdrop, some attach to the back of chairs, but Zoom can usually differentiate between them and their background either way.</p>
<p>ENABLE IDENTIFYING GUEST PARTICIPANTS: This setting makes it easier for people who belong to your account to identify a potential intruder.</p>
<p>ALLOW USERS TO SELECT ORIGINAL SOUND IN THEIR CLIENT SETTINGS: Enable this feature. It isn&#8217;t so much for security as for sanity. If a participant&#8217;s voice is garbled, they can select original sound. Then you may be able to hear them.</p>
</div>
<div></div>
<div>
<div>
<p>WAITING ROOM: This is one of the most important and useful security settings in Zoom. Enable and lock this setting so that when participants try to join the meeting, they are held in a waiting room until the host permits them to enter.</p>
<p>Go back up to the top of that very long page. You&#8217;ll notice three headings: Meeting, Recording, and Telephone. Click the word Recording to move to the recording tab.</p>
<p>LOCAL RECORDING: Local recording means a participant can save the meeting to their computer. Disable the setting for confidential meetings. Otherwise, an unauthorized person could access that recorded file. A security risk is that the user could store the data in the cloud without a password.</p>
<p>CLOUD RECORDING: Unless you need to have a recording of the meeting, disable cloud recording too. In theory, cloud recordings are more secure since the users don&#8217;t have a file they must protect.</p>
<p>You&#8217;ll find many additional options. You might want to involve your IT Professional to help you choose the settings.</p>
<p>Scroll back up. Look in the left-hand column under PERSONAL and click on the Profile settings:</p>
<p>PERSONAL MEETING ID: Leave the random number alone. Zoom sets up a private meeting room for you to use anytime, and that PMI is the address to your room. Don&#8217;t make it easy for someone to find your PMI address. It is tempting to make your PMI match your phone number, but don&#8217;t.</p>
<p>In the left-hand column on the screen, skip down to Personal &gt; Settings. On the Meeting tab, confirm that the host video is off and that Join before the host is disabled too.</p>
<p>Now go back up in the left-hand column to your Personal &gt; Meetings settings, click on the Personal Meeting Room tab at the top. Confirm the settings match what you configured already. Essential settings include a green checkmark for Mute participants upon entry and a green checkmark in front of the Enable waiting room setting.</p>
<p>If you have other users and groups, Zoom suggests you review their account to verify the settings took hold.</p>
<p>When you schedule a meeting: Meeting ID: Generate Automatically. By now, you know to keep your Personal Meeting ID private except for a few people you trust.</p>
<p>Last, you can check for Zoom updates. Open your account settings by clicking on your account icon. Then select the option to check for updates. Zoom makes updates that improve Zoom&#8217;s security, but the updates do not help you until you install them.</p>
<p>To help protect your Zoom meetings, watch other videos that cover concerns about using Zoom, configuring the two-step login feature, and a video run-through of settings for paid accounts so you can simply follow along.</p>
<p><a href="https://fosterinstitute.com/?p=3094&amp;preview=true" target="_blank" rel="noopener noreferrer">Zoom Security &#8211; Set Up Two-Step Login</a></p>
<p><a href="https://fosterinstitute.com/blog/zoom-security-issues-protect-yourself/" target="_blank" rel="noopener noreferrer">Zoom Security Issues &#8211; Protect Yourself</a></p>
<p><a href="https://fosterinstitute.com/blog/follow-along-to-set-zoom-security-settings/" target="_blank" rel="noopener noreferrer">Zoom Security &#8211; Follow Along to Set Settings</a></p>
</div>
</div>
</div>
<p>The post <a href="https://fosterinstitute.com/zoom-security-settings-the-concise-details/">Zoom Security Settings &#8211; The Concise Details</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Make your Zoom Secure</title>
		<link>https://fosterinstitute.com/make-your-zoom-secure/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 02 Apr 2020 20:55:51 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Remote Workers]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Zoom]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[cyber security speaker]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[remote worker security]]></category>
		<category><![CDATA[Zoom Safety]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3067</guid>

					<description><![CDATA[<p>Tomorrow (Friday) morning, expect a completed guide that is quick for you to implement to lock down your Zoom security. Get started now on a few settings: To help prevent an attacker logging into your Zoom account, enable two-step login. Once activated, then when you log in, you&#8217;ll enter your password along with a separate [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/make-your-zoom-secure/">Make your Zoom Secure</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Tomorrow (Friday) morning, expect a completed guide that is quick for you to implement to lock down your Zoom security. Get started now on a few settings:<span id="more-3067"></span></p>
<p>To help prevent an attacker logging into your Zoom account, enable two-step login. Once activated, then when you log in, you&#8217;ll enter your password along with a separate numerical code. Rather than sending the code as a text message, Zoom uses a more secure approach and requires you to use a passcode generator app. To configure two-step login, go into your account settings. Scroll down until you see the word Admin in the left-hand column, click on Advanced and then click the security option. Scroll down the main window until you see Sign in with Two-Factor Authentication. Enable the option. Sign out of Zoom and sign back in to complete the installation. Follow the prompts to associate your authentication app with Zoom.</p>
<p>When you schedule a meeting, for Meeting ID setting, select Generate Automatically. I&#8217;ll explain why soon, know that you need to keep your Personal Meeting ID private except for a few people you trust.</p>
<p>Zoom permits you to choose whether or not to require passwords for your meetings. In most cases, you should require a password. As long as someone gets the meeting notice you send them, they won&#8217;t even need the password because the password gets imbedded into the meeting invitation. However, embedding the passphrase inside the invitation exposes you to a risk. If an unauthorized person obtains the invitation, they too can authenticate to your meeting without needing to know the password.</p>
<p>One of the best security features is a tool called Waiting Room. Tomorrow’s tool will show how to set it up quickly. Be sure to sign up for our newsletter to receive the links for a powerful experience tomorrow and a concise video on Monday morning.</p>
<p>The post <a href="https://fosterinstitute.com/make-your-zoom-secure/">Make your Zoom Secure</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Prepare Your Organization for a Reaction to Coronavirus</title>
		<link>https://fosterinstitute.com/prepare-your-organization-for-a-reaction-to-coronavirus/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 26 Feb 2020 21:41:24 +0000</pubDate>
				<category><![CDATA[Disaster Plans]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[Threat Protection]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT Plan]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3039</guid>

					<description><![CDATA[<p>The city of San Francisco just declared a state of emergency over the Coronavirus. Other cities will follow suit &#8211; maybe yours. I&#8217;m in San Francisco right now at the RSA cybersecurity conference. Hand sanitizer is everywhere, and people are using it. Italy shut down some towns. There is a possibility, however remote, and perhaps [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/prepare-your-organization-for-a-reaction-to-coronavirus/">Prepare Your Organization for a Reaction to Coronavirus</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The city of San Francisco just declared a state of emergency over the Coronavirus. Other cities will follow suit &#8211; maybe yours.<span id="more-3039"></span></p>
<p>I&#8217;m in San Francisco right now at the RSA cybersecurity conference.  Hand sanitizer is everywhere, and people are using it.</p>
<p>Italy shut down some towns. There is a possibility, however remote, and perhaps not for months, that US cities might shut down too. Prepare for the potential impact on your organization. For example, if schools shut down, will some of your workers, including IT team members, be unable to come into work because they need to stay at home to watch their youngsters?</p>
<p>Make sure all of your network users can work from home concurrently. Your IT team might need to increase the capacity of your servers to handle the additional workload. Can your workers use their phones to conduct business remotely? Does your IT team need to set up remote VoIP phone clients? Are IT team members cross-trained to be able to cover other workers&#8217; duties? Does everyone know who to contact at your company for the most current information?</p>
<p>Even if your workers can work, they will put the safety of their families first. When Italy shut down some towns, the grocery stores ran out of food and supplies quickly. Encourage workers to stock up on food and products they usually buy, including non-perishables. They need to have enough medications. Once their family is taken care of first, then your workers can devote attention to work.</p>
<p>Prepare for loss of, or delays in, sales and income. Develop contingency plans. Would the loss of one of your primary suppliers devastate your business? Are you prepared if some essential piece of machinery, or network server, needs repair and you cannot get spare parts? Assign someone or develop a team at your company to focus on the risks and develop contingency plans. Remember IT.</p>
<p>Warn your workers that there will be an increase in spam and phishing as bad actors prey on their worries of the virus. They must be vigilant to spam and fake news.</p>
<p>For more information, Homeland Security offers suggestions at <a href="http://ready.gov/business/implementation/IT" rel="noopener noreferrer" target="_blank">ready.gov/business/implementation/IT</a> CDC provides a useful document at <a href="http://CDC.gov/flu/pandemic-resources/pdf/businesschecklist.pdf" rel="noopener noreferrer" target="_blank">CDC.gov/flu/pandemic-resources/pdf/businesschecklist.pdf</a> </p>
<p>Notice signs of things to come including a potential reaction to the virus. The falling stock market is a sign, Italy closing cities is a sign, and San Francisco declaring a state of emergency is a sign. Prepare now in case things start happening rapidly.</p>
<p>Please forward this to your friends so they can prepare their organizations for possible public panic and quarantines over Coronavirus.</p>
<p>The post <a href="https://fosterinstitute.com/prepare-your-organization-for-a-reaction-to-coronavirus/">Prepare Your Organization for a Reaction to Coronavirus</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Executives Appreciate it when IT Professionals Communicate Effectively</title>
		<link>https://fosterinstitute.com/executives-appreciate-it-when-it-professionals-communicate-effectively/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 24 Feb 2020 17:31:16 +0000</pubDate>
				<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[IT Discussions]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3029</guid>

					<description><![CDATA[<p>Today, an IT Guru called to gather more information as he prepared to meet with his executives. His methodology was impressive, and executives might want to forward this to your IT professionals. IT professionals want to do a great job of communicating with executives and they welcome guidance for communication. A while ago, the executives [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/executives-appreciate-it-when-it-professionals-communicate-effectively/">Executives Appreciate it when IT Professionals Communicate Effectively</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div>Today, an IT Guru called to gather more information as he prepared to meet with his executives. His methodology was impressive, and executives might want to forward this to your IT professionals. IT professionals want to do a great job of communicating with executives and they welcome guidance for communication.</div>
<div>A while ago, the executives approved IT configuring the firewall to block gambling, job search, and some other website categories from workers. As usual, the workers pushed back.</div>
<p><span id="more-3029"></span></p>
<div>The executives asked the IT team to meet with them. What stands out is how the VP of IT prepared before the meeting. First, he organized a list of pros and cons for the executives before the meeting. He listed substantial risks from unauthorized websites, including security risks, ransomware, credential harvesting from fake login screens, and more. He examined mobile phone records and was able to demonstrate that since they had 1000 mobile devices, and using a total of 25 Gigs of data, they could save 50 per year per device. That adds up to save fifty thousand dollars each year. He wasn&#8217;t advocating blocking, or not to block, the content. He provided the executives with accurate numbers so they can decide.</div>
<div></div>
<p></p>
<div>He pulled service tickets and showed the time expense of blocking, and converted that to a numerical figure of how much money they could save by continuing blocking. He also pulled specific websites that users submitted to have unlocked. That way, the executives could choose what to open up. He printed sixty category choices to review with the decision-makers if they want. Rather than merely stating that blocking unauthorized music and media websites will speed up Internet connectivity, the executives benefit more when IT pulls logging information and provide specific numbers such as 80% of the traffic is unapproved. He offered alternatives to add safety even without blocking, including virtual browsers, to host the user&#8217;s browsing experience in the cloud and keep the traffic entirely off of their computers.</div>
<div></div>
<p></p>
<div>The way he finished the conversation with me was beautiful. He said that he wanted to give the executives the right information so they can make an informed decision. Please forward this to your friends in case they want to share the example with their IT professionals too.</div>
<p></p>
<p>The post <a href="https://fosterinstitute.com/executives-appreciate-it-when-it-professionals-communicate-effectively/">Executives Appreciate it when IT Professionals Communicate Effectively</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Adobe Flash Stops on December 31, 2020. Are You Ready?</title>
		<link>https://fosterinstitute.com/adobe-flash-stops-on-december-31-2020-are-you-ready/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 03 Jan 2020 17:09:55 +0000</pubDate>
				<category><![CDATA[Adobe Flash]]></category>
		<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3022</guid>

					<description><![CDATA[<p>For more than 20 years, Adobe Flash helped websites deliver video content to your screen. However, attackers use Flash to inject ransomware and other malicious code into computers. The bad actors are usually one step ahead of security patches. To end this security nightmare, Adobe set Flash&#8217;s official termination date to December 31, 2020. Expect [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/adobe-flash-stops-on-december-31-2020-are-you-ready/">Adobe Flash Stops on December 31, 2020. Are You Ready?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>For more than 20 years, Adobe Flash helped websites deliver video content to your screen. However, attackers use Flash to inject ransomware and other malicious code into computers. The bad actors are usually one step ahead of security patches.<span id="more-3022"></span></p>
<p>To end this security nightmare, Adobe set Flash&#8217;s official termination date to December 31, 2020. Expect your browsers, Firefox, Chrome, Edge, etc. to disable and remove Flash on or before that date.</p>
<p>That helps security, but Flash&#8217;s demise could negatively impact your organization. If one of your websites requires your customers to use Flash, it is time to convert the content asap. Unless you are sure, meet with your web development team and confirm your visitors and customers do not need Flash to use your sites. If so, your developers can convert your content to use supported technologies.</p>
<p>Additionally, ask your IT professionals if your team members rely on sites that require Flash. If so, now is the time to work with those providers to spur them to transition away from Flash. If they refuse to move, you need to find other options. </p>
<p>While frustrating to many, especially frustrating to attackers, the ultimate demise of Flash helps make the world a safer place!</p>
<p>Please forward this to your friends in case they aren&#8217;t aware that Flash&#8217;s termination date is December 31, 2020.</p>
<p>The post <a href="https://fosterinstitute.com/adobe-flash-stops-on-december-31-2020-are-you-ready/">Adobe Flash Stops on December 31, 2020. Are You Ready?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Remember to Give Your IT Pros a Holiday Gift</title>
		<link>https://fosterinstitute.com/remember-to-give-your-it-pros-a-holiday-gift/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 17 Dec 2019 08:00:30 +0000</pubDate>
				<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[Working with IT]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3019</guid>

					<description><![CDATA[<p>Your IT Team pours out so much time and energy. If you aren’t already, you can brighten their holidays by giving them a gift. The work they do is often so complicated, yet they make it look easy. Unless you are a high-tech executive, it can be difficult to appreciate how sometimes your team accomplishes [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/remember-to-give-your-it-pros-a-holiday-gift/">Remember to Give Your IT Pros a Holiday Gift</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Your IT Team pours out so much time and energy. If you aren’t already, you can brighten their holidays by giving them a gift.</p>
<p>The work they do is often so complicated, yet they make it look easy. Unless you are a high-tech executive, it can be difficult to appreciate how sometimes your team accomplishes a miracle. </p>
<p>In some organizations, the only time the IT team gets noticed is when something technology-related stops functioning correctly.</p>
<p>IT pros, by nature, need to invest more than 40 hours a week to keep up with rapidly changing technology. That doesn’t include responses to the helpdesk crises and completing the projects assigned to them.</p>
<p>Executives reading this newsletter already feel compassion for and support their IT teams. But just in case you know an executive who doesn’t, or the gift slipped their mind, please forward this message to them.  And why not add an IT Appreciation Day to company calendars?</p>
<p>Happy Holidays – and you deserve a bunch of credit too!</p>
<p>The post <a href="https://fosterinstitute.com/remember-to-give-your-it-pros-a-holiday-gift/">Remember to Give Your IT Pros a Holiday Gift</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protect Your Network Even when Attackers Trick Your Users</title>
		<link>https://fosterinstitute.com/protect-your-network-even-when-attackers-trick-your-users/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 05 Nov 2019 15:11:53 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2997</guid>

					<description><![CDATA[<p>A business contacted our office last week because a bad actor tricked an employee to give them full access to their computer. The bad actor immediately took over the network and started performing highly illegal activities that appeared to come from the victim&#8217;s systems.  User training is not enough. It is essential to take additional [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/protect-your-network-even-when-attackers-trick-your-users/">Protect Your Network Even when Attackers Trick Your Users</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A business contacted our office last week because a bad actor tricked an employee to give them full access to their computer.</p>
<p>The bad actor immediately took over the network and started performing highly illegal activities that appeared to come from the victim&#8217;s systems.  User training is not enough. It is essential to take additional steps to help protect your network when an attacker is crafty enough to trick a user.</p>
<p><span id="more-2997"></span></p>
<p>Firewalls, almost universally, have a feature called web content filtering. There is a possibility that your IT professional configured the firewall to block known gambling, gaming, and sites with people with no clothes.</p>
<p>Unless you do business with every country in the world, tell your IT team to block the firewall from permitting traffic from all countries except those where you do business.</p>
<p>It is possible that some of your third parties use sites in other countries to handle your sensitive data, and this is a great time to find out by blocking other countries to see what happens. Your security is only as good as the security of your third party providers, and they need to disclose to you any risks they take with you, and your customers&#8217; confidential data.</p>
<p>If you want to be super cautious, rather than block everything at once, you can ask your IT professional to dump the contents of your web filter&#8217;s log into a spreadsheet, or some other database, that will identify traffic trends, sources, and destinations.</p>
<p>Now is an excellent time to ask your IT professionals, even if you outsource IT, to devote time to tuning your web content filtering to be restrictive.</p>
<p>You can even update your routers at home if they support web content filtering, and they might. An excellent place to start is at the device manufacturer&#8217;s website. There will be instructions to download and install the most recent firmware. Look at the support site about ways you can enable supported security features in your home devices, including web content filtering.</p>
<p>Please forward this to everyone you know so they can ask their IT professionals to turn up your web content filtering to help protect against social engineering attacks.</p>
<p>The post <a href="https://fosterinstitute.com/protect-your-network-even-when-attackers-trick-your-users/">Protect Your Network Even when Attackers Trick Your Users</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Microsoft Will Stop Protecting Windows 7 on January 14, 2020</title>
		<link>https://fosterinstitute.com/microsoft-will-stop-protecting-windows-7-on-january-14-2020/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 05 Sep 2019 18:27:54 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Preventative IT Mainenance]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows 7]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2989</guid>

					<description><![CDATA[<p>Windows 7 computers will still run, your anti-virus will still work, as will your other programs. But you are taking a significant risk because Microsoft will no longer provide security updates that help keep attackers out of your network. Security patches are one of the best ways to protect your systems from attacks. Any of [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/microsoft-will-stop-protecting-windows-7-on-january-14-2020/">Microsoft Will Stop Protecting Windows 7 on January 14, 2020</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Windows 7 computers will still run, your anti-virus will still work, as will your other programs. But you are taking a significant risk because Microsoft will no longer provide security updates that help keep attackers out of your network.<br />
<span id="more-2989"></span><br />
Security patches are one of the best ways to protect your systems from attacks.</p>
<p>Any of your computers that you purchased six years ago came with Windows 7 installed. Unless you paid for new licenses and gave your team time to upgrade them, those computers run Windows 7 today.</p>
<p>Some of your options include:<br />
&#8211; Buy new computers<br />
&#8211; If the computer is strong enough, upgrade Windows 7 to Windows 8.1 or Windows 10<br />
&#8211; You can ask your IT team if you use a technology called VDI. If so, they can uninstall Windows 7 completely. They can install Linux, or make a bootable thumb drive, or use a No Touch Desktop program. The computer can function as a screen and keyboard to a server where Windows runs</p>
<p>If, for any reason, you need to keep Windows 7 on some workstations, be sure to give your IT team time to implement compensating controls. For example, they can isolate the computers from the rest. Ask them to install Microsoft&#8217;s downloadable EMET security tool that works in Windows 7.</p>
<p>Support for Windows 8.0 ended in 2016.<br />
Support for Windows 8.1 ends on January 10, 2023.</p>
<p>Please forward this to your friends and business associates, so they know January 14 is the when Windows 7 becomes a severe security risk to their networks.</p>
<p>The post <a href="https://fosterinstitute.com/microsoft-will-stop-protecting-windows-7-on-january-14-2020/">Microsoft Will Stop Protecting Windows 7 on January 14, 2020</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Never Permit Tech Support to Access your Computer</title>
		<link>https://fosterinstitute.com/never-permit-tech-support-to-access-your-computer/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 03 Jul 2019 14:53:45 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Tech Support]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity awareness training]]></category>
		<category><![CDATA[cybersecurity expert]]></category>
		<category><![CDATA[it audit]]></category>
		<category><![CDATA[IT review]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2977</guid>

					<description><![CDATA[<p>A company had a problem with their bank’s remote deposit software. They called technical support, and the bank’s software support person announced, “First, I need to connect to your computer to see what is going on.” Fortunately, the company’s team member told the bank’s technical support person, “It is against company policy to permit any [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/never-permit-tech-support-to-access-your-computer/">Never Permit Tech Support to Access your Computer</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A company had a problem with their bank’s remote deposit software. They called technical support, and the bank’s software support person announced, “First, I need to connect to your computer to see what is going on.” Fortunately, the company’s team member told the bank’s technical support person, <span id="more-2977"></span>“It is against company policy to permit any third parties to connect to our computers.”</p>
<p>The tech support representative at the bank pressed, “I cannot help you if you do not let me into your computer.”</p>
<p>The team member said, “Yes, you can. I can read you anything displayed on the screen, and I can type or click where you say. But we cannot permit anyone to connect remotely. What do you need me to read to you?”</p>
<p>The technician said, “Uh… Ok. What does the error message say?”</p>
<p>The team member replied, “The routing number field is not long enough.”</p>
<p>The technician said, “Ok, that is easy to fix.” And continued to help resolve the problem and all was fine.</p>
<p>Never, ever, permit anyone to remote into your computer.</p>
<p>Once you permit any third party to access your computer, your company’s security is only as good as their security. And you have no idea how good their security is.</p>
<p>Your internal IT team, or outsourced managed service provider, can already take control of your systems without asking you. They will not need to ask your permission. So, if you ever receive a call saying, “This is tech support, you don’t recognize me because I’m the new guy. I need your help to fix your computer. Please go to this website so I can take control of your system to resolve a technical glitch before it crashes your system,” then blow a whistle into the phone as loud as you can. That’s a bad guy using a social engineering ploy in an attempt to trick you into allowing them access into your system.</p>
<p>When in doubt, go back to the only reasonable answer: “No. You will not get access to this computer or any other computer at our organization.” Report this immediately and warn everyone else.</p>
<p>Please forward this to everyone you know or care about, so they know: Never permit anyone, even third party technical support, to access your computer remotely.</p>
<p>The post <a href="https://fosterinstitute.com/never-permit-tech-support-to-access-your-computer/">Never Permit Tech Support to Access your Computer</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
