<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Threats Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/cyber-threats/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/cyber-threats/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Sun, 23 Jul 2023 01:59:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Cyber Threats Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/cyber-threats/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What to Do if Someone Hacks Your Email Account</title>
		<link>https://fosterinstitute.com/what-to-do-if-someone-hacks-your-email-account/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 21 Jul 2023 16:10:06 +0000</pubDate>
				<category><![CDATA[Email]]></category>
		<category><![CDATA[Hacked Email]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Email Hacking]]></category>
		<category><![CDATA[Email Password]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[Security Patches]]></category>
		<category><![CDATA[two-step authentication]]></category>
		<category><![CDATA[Unauthorized Spammer]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2914</guid>

					<description><![CDATA[<p>How to protect yourself if, or even before, an unauthorized spammer uses one of your email accounts to send out spam: If you have cybersecurity insurance or feel this incident could cause significant damage, consider having a forensic analysis to track down what happened. Contact your email provider, explain what happened, and ask for help. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/what-to-do-if-someone-hacks-your-email-account/">What to Do if Someone Hacks Your Email Account</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>How to protect yourself if, or even before, an unauthorized spammer uses one of your email accounts to send out spam:<span id="more-2914"></span></p>
<p>If you have cybersecurity insurance or feel this incident could cause significant damage, consider having a forensic analysis to track down what happened.</p>
<p>Contact your email provider, explain what happened, and ask for help. Continue down this list while you wait for their response.</p>
<p>Reset your email account password immediately. If you can&#8217;t log in because someone unauthorized reset your password, try resetting it yourself. If that doesn&#8217;t work, contact your email company&#8217;s tech support.</p>
<p>Check if your username and old passwords have appeared on the dark web. Visit <a href="https://haveibeenpwned.com/" target="_blank" rel="noopener">https://haveibeenpwned.com/</a> and similar sites to find out. Never enter your password.</p>
<p>Change passwords for all your accounts including social media, banking, and other sensitive accounts, especially if you&#8217;ve used the same password for multiple accounts. Someone may have access to more than just your email.</p>
<p>Consider using a password manager like 1Password, Dashlane, LastPass, NordPass or another to help ease the pain of having different passwords on every website from now on.</p>
<p>When setting up security questions, avoid real answers that are easy for a bad actor to research. When asked, &#8220;Where were you born,&#8221; you could answer something like, &#8220;The fourth crater on the moon.&#8221; Save your secret answers in a file in a random place with a random name like &#8220;socks.docx&#8221; for when you need the answers. You can encrypt the file for added safety.</p>
<p>Enable two-step verification for your email account. While you are at it, set up two-step verification everywhere you can, primarily on sensitive websites and services. Here is how to add MFA to your LinkedIn account for added security <a href="https://www.linkedin.com/help/linkedin/answer/544/turning-two-step-verification-on-and-off?lang=en" target="_blank" rel="noopener">https://www.linkedin.com/help/linkedin/answer/544/turning-two-step-verification-on-and-off?lang=en</a></p>
<p>If you set up two step authentication so that the site or service sends you an email message for the second part of logging in, and the hacker has access your email, it defeats the purpose of MFA. Therefore, if you set up the two-step login with email as the second step, use a different secure email address.</p>
<p>Review your email&#8217;s &#8220;sent&#8221; folder to spot any unrecognized messages.</p>
<p>Look at all your email accounts in your organization to ensure there are no email forwarding or filtering rules you did not configure.</p>
<p>Check your websites, especially LinkedIn, for any unauthorized changes.</p>
<p>Set up SPF and DKIM. More information here: <a href="https://fosterinstitute.com/block-inbound-and-outbound-fraudulent-email-messages/" target="_blank" rel="noopener">https://fosterinstitute.com/block-inbound-and-outbound-fraudulent-email-messages/</a></p>
<p>Watch out for remote control applications that might allow a bad actor to compromise your computer and send email messages as you.</p>
<p>Be aware that your computer or another computer in your organization might be hacked, enabling attackers to send messages on your behalf. Stay vigilant and take measures to protect against such incidents.</p>
<p>Regularly apply critical security patches to your computer. You can check for updates manually, even if automatic updates are enabled.</p>
<p>Ensure your anti-virus program is current and run a manual scan regularly. Using EDR or XDR services add more security.</p>
<p>If you use a browser to send and receive email, this is a drastic step, but consider uninstalling the browser. When you reinstall the browser, add only the plugins you need.</p>
<p>If you use your phone or tablet for email, they could be hacked. Apply security patches, keep them in your possession, examine the privacy settings, and lock devices when not in use.</p>
<p>Watch out for apps on your computer, tablet, or phone that may be harvesting your address book without your knowledge. A drastic move would be to factory reset and erase them, but be sure your important data is stored in the cloud or backed up.</p>
<p>Notify financial institutions that if they receive messages from you, the messages could be fraudulent.</p>
<p>You might want to set up a new email address to use until you feel confident your old address is safe.</p>
<p>If you haven&#8217;t already, freeze your credit.</p>
<p>Monitor your financial accounts.</p>
<p>Before you send out notifications, you will want to talk to an advisor who can help you know what to say.</p>
<p>Please forward this to your friends so that, if someone appears to hack their email account, they will know what to do to.</p>
<p>Subscribe to maximize your executive potential with Foster Institute&#8217;s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>The post <a href="https://fosterinstitute.com/what-to-do-if-someone-hacks-your-email-account/">What to Do if Someone Hacks Your Email Account</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>You Do Not Need to Understand Computers to Make Ransomware</title>
		<link>https://fosterinstitute.com/you-do-not-need-to-understand-computers-to-make-ransomware/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 23 Apr 2019 17:00:45 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Inpivx]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Email Hacking]]></category>
		<category><![CDATA[Email Password]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[patch updates]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2944</guid>

					<description><![CDATA[<p>There is a new program that is designed to help even non-technical people to create ransomware. The tool is called Inpivx, and it is designed to provide easy point-and-click functionality. Do you know someone who doesn&#8217;t like your organization and would like to cause harm? Can you think of anyone who may want to exploit [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/you-do-not-need-to-understand-computers-to-make-ransomware/">You Do Not Need to Understand Computers to Make Ransomware</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There is a new program that is designed to help even non-technical people to create ransomware. The tool is called Inpivx, and it is designed to provide easy point-and-click functionality. <span id="more-2944"></span></p>
<p>Do you know someone who doesn&#8217;t like your organization and would like to cause harm? Can you think of anyone who may want to exploit you for money, other than a vast population of bad actors already in the world?</p>
<p>Even more worrisome than Inpivx is the realization that there will be more user-friendly tools to come from sources around the globe. Some attacks are already relatively easy to launch for a non-technical person, and such technologies are in an upward trend.</p>
<p>Remember typewriters? To move a paragraph, you had to re-type the page. Over time, typing documents became incredibly easy even for non-technical people. Creating ransomware is on the same path to easiness.<br />
Anti-virus, firewalls, and passwords are crucial to cybersecurity. All of them are. However, if you feel that those are enough, you might be shocked if you get hacked.</p>
<p>How do you protect yourself? Keep patches up to date, remove all non-essential programs from computers, grant users only bare minimum privileges they need to do their jobs, use excellent spam protection, never allow users to check webmail at your organization, to name just a few. And, of course, keep those security IT Vital Systems Reviews current.</p>
<p>Please forward this to your friends, so they know that ransomware programs are more accessible to create than ever, even for non-technical people, so the danger is growing too.</p>
<p>The post <a href="https://fosterinstitute.com/you-do-not-need-to-understand-computers-to-make-ransomware/">You Do Not Need to Understand Computers to Make Ransomware</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Stop the Annoying Phone Calls</title>
		<link>https://fosterinstitute.com/how-to-stop-the-annoying-phone-calls/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 19 Mar 2019 15:21:24 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Robo calls]]></category>
		<category><![CDATA[RoboKiller]]></category>
		<category><![CDATA[stop annoying calls]]></category>
		<category><![CDATA[YouMail]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2722</guid>

					<description><![CDATA[<p>Everyone is tired of getting those annoying phone calls. Sometimes the callers are people trying to steal your credit card numbers. Tools are available to help stop the problem. YouMail and RoboKiller are two of the apps that do the job. We do not get compensated for mentioning, nor do we endorse, those apps. We’ve [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/how-to-stop-the-annoying-phone-calls/">How to Stop the Annoying Phone Calls</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>				Everyone is tired of getting those annoying phone calls. Sometimes the callers are people trying to steal your credit card numbers.</p>
<p>Tools are available to help stop the problem.<span id="more-2901"></span> <a href="https://www.youmail.com/" target="_blank" rel="noopener noreferrer">YouMail</a> and <a href="https://robokiller.com/" target="_blank" rel="noopener noreferrer">RoboKiller</a> are two of the apps that do the job.</p>
<p>We do not get compensated for mentioning, nor do we endorse, those apps. We’ve just got clients who are having great luck with those tools.</p>
<p>Wishing you more peace and quiet!</p>
<p>&nbsp;		</p>
<p>The post <a href="https://fosterinstitute.com/how-to-stop-the-annoying-phone-calls/">How to Stop the Annoying Phone Calls</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Best Protect Your Mobile Devices</title>
		<link>https://fosterinstitute.com/how-to-best-protect-your-mobile-devices/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 11 Mar 2019 16:47:44 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Protection Tools]]></category>
		<category><![CDATA[RSA Security Conference]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cell Phone Security]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[mobile security]]></category>
		<category><![CDATA[Protecting Mobile Devices]]></category>
		<category><![CDATA[RSA]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2718</guid>

					<description><![CDATA[<p>The RSA Security Conference is wrapping up today. I&#8217;ve been here all week, and almost all of the best security companies demonstrated their security protection tools. Guess what was missing? Mobile device protection. If more than 70% of all Internet traffic is now from iPhones, iPads, and Android devices, why aren’t they more protected? The [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/how-to-best-protect-your-mobile-devices/">How to Best Protect Your Mobile Devices</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>				The RSA Security Conference is wrapping up today. I&#8217;ve been here all week, and almost all of the best security companies demonstrated their security protection tools. Guess what was missing? <span id="more-2779"></span>Mobile device protection. If more than 70% of all Internet traffic is now from iPhones, iPads, and Android devices, why aren’t they more protected? The companies who make tools that protect mobile devices fell into two categories:</p>
<p>-Nay-sayers said: Although we can remotely track and remotely erase them, our programs do not protect mobile devices since manufacturers, especially Apple, block protection tools.<br />
-Two of the companies said and even demonstrated how their tools protect mobile devices against everything from malware, such as the infamous Flexi-Spy spyware, to people attempting to break in and steal private information. Additionally, the tools can even protect devices if a user connects at a coffee shop or other public network.</p>
<p>The latter offerings are best. The protection software is available for people in companies, but not for families. If you want to protect your family, you will need to pretend you are a small company and buy a minimum number of licenses to purchase the tools.</p>
<p>Expect more details soon. For now, be excited to know that finally some security tools effectively protect mobile devices.</p>
<p>&nbsp;		</p>
<p>The post <a href="https://fosterinstitute.com/how-to-best-protect-your-mobile-devices/">How to Best Protect Your Mobile Devices</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Tesla Will Give a Car to a Hacker if they can Break In</title>
		<link>https://fosterinstitute.com/tesla-will-give-a-car-to-a-hacker-if-they-can-break-in/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 25 Jan 2019 20:02:10 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Hacking Competition]]></category>
		<category><![CDATA[CanSecWest]]></category>
		<category><![CDATA[Car Hacking]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Hacking Competively]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Microsfot]]></category>
		<category><![CDATA[Tesla Hacking Competition]]></category>
		<category><![CDATA[VMware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2706</guid>

					<description><![CDATA[<p>Hackers will compete for prizes from Tesla. In addition to the first winner who gets the car, Tesla also pays… $250,000 if they can hack the autopilot$100,000 if they can hack the modem or tuner$100,000 if they can hack the key fob or phone-as-a-key Microsoft, VMWare, and other companies are offering big prizes to someone [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/tesla-will-give-a-car-to-a-hacker-if-they-can-break-in/">Tesla Will Give a Car to a Hacker if they can Break In</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hackers will compete for prizes from Tesla. In addition to the first winner who gets the car, Tesla also pays…</p>



<p>$250,000 if they can hack the autopilot<br />$100,000 if they can hack the modem or tuner<br />$100,000 if they can hack the key fob or phone-as-a-key</p>



<p>Microsoft, VMWare, and other companies are offering big prizes to someone for breaking their security.</p>



<p>Challenges like this are an excellent way for companies to find security holes in their hardware, software, and services. Most companies offer a bounty system to pay successful attackers every day of the year.</p>



<p>If you want to go, or even compete, the event is March 20-22 in Vancouver. Visit <a href="http://CanSecWest.com">CanSecWest.com</a>.</p>
<p>The post <a href="https://fosterinstitute.com/tesla-will-give-a-car-to-a-hacker-if-they-can-break-in/">Tesla Will Give a Car to a Hacker if they can Break In</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>773 Million Passwords Exposed &#8211; Were You Exposed?</title>
		<link>https://fosterinstitute.com/773-million-passwords-exposed-were-you-exposed/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 17 Jan 2019 23:22:23 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Password Manager]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Hardware Key]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Modlishka]]></category>
		<category><![CDATA[password code]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[two step verification]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2699</guid>

					<description><![CDATA[<p>Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords that have shown up on the dark web over the past two or three years. Think of Collection #1 as being a value pack of bundled old password lists. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/773-million-passwords-exposed-were-you-exposed/">773 Million Passwords Exposed &#8211; Were You Exposed?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords<br />
<span id="more-2897"></span><br />
that have shown up on the dark web over the past two or three years. Think of Collection #1 as being a value pack of bundled old password lists.</p>
<p>If you want to find out if your passwords were released, visit his site called <a href="https://haveibeenpwned.com">https://haveibeenpwned.com</a>. If you elect to enter your email address, he will tell you if it is in the collection and give you more details.</p>
<p>What do you do if you are on the list? Reset your passwords. Use a password manager that will remember your passwords for you to make your life easier when you use a different password at each website from now on.</p>
<p>Now is a great time to enable two-step verification. A basic form of two-step verification is when you enter a username and password, and you receive a text message code to type in. Enable two-step verification on PayPal, LinkedIn, Dropbox, Facebook and every other web service you use. On each website, look for Settings &gt; Security. You may need to dig down, but more reputable sites now support two-step verification, but you must enable the feature.</p>
<p>Some bad news is that, about a week ago, a tool called Modlishka shows how to break two-step verification so it isn&#8217;t that secure, but two-step verification is still more secure than a simple username password combination. If it allows, have a website use some other method than texting you a password. Using an app on your phone or calling you via a voice call are options that are often more secure than the text message. Microsoft, Google, and a service called Duo offer these options and more. Having a hardware key is even better unless your laptop users leave the key stored in the laptop case, and their password written on the bottom of the laptop.</p>
<p>The post <a href="https://fosterinstitute.com/773-million-passwords-exposed-were-you-exposed/">773 Million Passwords Exposed &#8211; Were You Exposed?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Happy Computer Security Day!</title>
		<link>https://fosterinstitute.com/happy-computer-security-day/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 30 Nov 2018 19:11:36 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Computer Security Day]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2689</guid>

					<description><![CDATA[<p>November 30th is Computer Security Day. Today is a great day to remind your team members to continue to be extra vigilant as they watch for spam email messages.  Encourage and provide time to your team to keep your systems up to date with all critical security patches for operating systems, Office, browsers, Flash, Java, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/happy-computer-security-day/">Happy Computer Security Day!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>November 30th is Computer Security Day. Today is a great day to remind your team members to continue to be extra vigilant as they watch for spam email messages. <span id="more-2895"></span></p>
<p>Encourage and provide time to your team to keep your systems up to date with all critical security patches for operating systems, Office, browsers, Flash, Java, and Reader. Ask them to show you a list, not a pie chart, of missing critical security patches. If they haven’t checked lately, this is an excellent time for them to be sure the firmware is up-to-date in the firewall and other infrastructure devices.</p>
<p>Thank you for all you are doing to protect against ransomware and all types of cyber threats. You are helping make the world a safer place to live and work!</p>
<p>The post <a href="https://fosterinstitute.com/happy-computer-security-day/">Happy Computer Security Day!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
