<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>danger Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/danger/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/danger/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Thu, 02 Sep 2010 04:00:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>danger Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/danger/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>A virus possibly contributed to a fatal passenger jet crash</title>
		<link>https://fosterinstitute.com/jet-crash/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 02 Sep 2010 04:00:42 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[danger]]></category>
		<category><![CDATA[Keep viruses out of your network]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=685</guid>

					<description><![CDATA[<p>On August 20, 2008, 154 people died when Spanair Flight 5022 crashed right after takeoff in Spain. A preliminary report, discussed in an article in the Spanish daily newspaper El Pais indicates that a diagnostic computer should have detected problems with multiple systems on the aircraft. Had the problems been detected, the takeoff would have [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/jet-crash/">A virus possibly contributed to a fatal passenger jet crash</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On August 20, 2008, 154 people died when Spanair Flight 5022 crashed right after takeoff in Spain. A preliminary report, discussed in an article in the Spanish daily newspaper <em>El Pais</em> indicates that a diagnostic computer should have detected problems with multiple systems on the aircraft. Had the problems been detected, the takeoff would have never been attempted. The computer was infected with a virus or other malware.﻿<br />
<span id="more-685"></span><br />
In theory, if the malware had not infected the diagnostic computer, the problem with the aircraft system would have been discovered, and those 154 people would still be alive.</p>
<p>Will viruses and other malware contribute to injuries and deaths? Imagine diagnostic imaging machines, like X-rays and CAT Scanners, exposing patients to too much radiation due to a virus. Traffic lights not functioning properly, especially on a highway with high speed limits, could lead to a horrible crash.  Emergency services may already be delayed in their response due to computer malfunctions. The airline industry has plenty to worry about. What if trains fail to stop and crash into another train or the end of the line?</p>
<p>Apparently the Spanair diagnostic computer does not connect to the Internet so the infection likely came from an infected USB device, CD-ROM, or some other form of removable media.</p>
<p>Just last month, control systems manufacturer Siemens, who manufactures control systems, warned that malware called Stuxnet is spreading through infected USB devices to penetrate industrial control systems. I wonder if there are any control systems at nuclear power plants infected yet.</p>
<p>More and more regulations and laws are forcing organizations to wake up to the fact that IT security is very important.</p>
<p>Business executives and IT professionals alike must realize:Viruses and other malware do not necessarily make themselves obvious for the simple reason that, if you know a computer is infected, you are likely to have a qualified IT professional fix the problem.</p>
<ul>
<li>Anti-virus programs do not always catch all viruses</li>
<li>Firewalls are not perfect either</li>
<li>End users can, accidentally or on purpose, bypass some of the best security you set up</li>
</ul>
<p>How many more people will need to die, how much more money will be lost, before people become aware of the importance of IT security?</p>
<p>Please post your comments on this blog.</p>
<p>The post <a href="https://fosterinstitute.com/jet-crash/">A virus possibly contributed to a fatal passenger jet crash</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Two crucial pieces of advice for executives</title>
		<link>https://fosterinstitute.com/crucial-advice/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 25 Feb 2010 04:00:04 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[danger]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[recommendations]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=426</guid>

					<description><![CDATA[<p>My wife and I were traveling a little over a week ago when we got a phone call that one of our immediate relatives dropped dead from a heart attack. He was standing in line at the pharmacy to get medicine his doctor just prescribed for “heart burn” and collapsed, unconscious, and his heart was [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/crucial-advice/">Two crucial pieces of advice for executives</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>My wife and I were traveling a little over a week ago when we got a phone call that one of our immediate relatives dropped dead from a heart attack. He was standing in line at the pharmacy to get medicine his doctor just prescribed for “heart burn” and collapsed, unconscious, and his heart was no longer pumping blood. Simply put: he died.</p>
<p><span id="more-426"></span>We rushed home and drove all night long after being told that his chance of survival was small. Thankfully, he will make a full recovery. That’s after pharmacy personnel defibrillated him, started CPR, rushed him to the ER and then the OR where they cracked open his chest and performed a triple bypass.</p>
<p>You know what? He is the right weight for his 6’1” height. He quit smoking years ago, and cut back on drinking. He exercises and is strong as a horse. He eats well. And his doctor told him it was heartburn.</p>
<p>I bet after surviving this event he gives up red meat and drinking all together and doubles his exercise routine. I see the same things with CEO’s, Presidents, CFO’s, and other executives if their company survives an IT security breach. Sometimes it is too late, and the recovery is no fun.</p>
<p>Why does it take a life changing event to get us to pay attention to do the things we know we should be doing?</p>
<p>For me, PLEASE tell your friends—and the person you see in the mirror two pieces of advice:</p>
<ol>
<li>If you feel chest pain, demand an EKG and don’t leave the doctor until you get one (or call 911—gets you right past the waiting lines at the ER!)</li>
<li>If your last IT security audit was more than 12 months ago—it is time for another!</li>
</ol>
<p>Before it is too late.</p>
<p>The post <a href="https://fosterinstitute.com/crucial-advice/">Two crucial pieces of advice for executives</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Twitter was hacked</title>
		<link>https://fosterinstitute.com/twitter-hacked/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 13 Aug 2009 04:00:35 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[danger]]></category>
		<category><![CDATA[IT network safety]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<category><![CDATA[recommendations]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=255</guid>

					<description><![CDATA[<p>What happened to Twitter can happen at any company.  The attacker exploited common problems in many corporate networks. First, there was the problem that Twitter&#8217;s server had a password set to &#8220;password.&#8221;   Executives would find news of their own server passwords being so weak as inexcusable!  Then, there was another breach that was caused [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/twitter-hacked/">How Twitter was hacked</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>What happened to Twitter can happen at any company.  The attacker exploited common problems in many corporate networks.</p>
<p><span id="more-2711"></span>First, there was the problem that Twitter&#8217;s server had a password set to &#8220;password.&#8221;   Executives would find news of their own server passwords being so weak as inexcusable!  Then, there was another breach that was caused by several user blunders including using the same password at both gmail and hotmail.</p>
<p>Do any of your users, or you, use the same password at more than one site?  Change them. Get a password manager such as RoboForm or MyPasswordManager. A password manager remembers all your passwords for you – all you need to remember is your password to the password manager. Not perfect security, but a whole lot more secure than using the same password at more than one site! Protect yourself.</p>
<p>The post <a href="https://fosterinstitute.com/twitter-hacked/">How Twitter was hacked</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Easily steal the information from a computer</title>
		<link>https://fosterinstitute.com/steal-information/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 06 Aug 2009 04:00:45 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[danger]]></category>
		<category><![CDATA[IT network safety]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<category><![CDATA[Preventing IT network theft]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=245</guid>

					<description><![CDATA[<p>I am in the business of helping you keep your computers safe. You need to know how easy it is for someone to take your data from you. Here is a video. There is a wonderful product on the market that will make backups of your computer quickly and easily. The problem is, a criminal [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/steal-information/">Easily steal the information from a computer</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I am in the business of helping you keep your computers safe. You need to know how easy it is for someone to take your data from you. Here is a video.</p>
<p><span id="more-2710"></span>There is a wonderful product on the market that will make backups of your computer quickly and easily. The problem is, a criminal can use this product to steal your information. This is supposed to be a short sales video, and I want you to consider how you would feel about the video if a criminal used this to steal your computer’s information: <a href="http://www.youtube.com/watch?v=S-aHtWOYGvg" target="_blank" rel="noopener">http://www.youtube.com/watch?v=S-aHtWOYGvg</a></p>
<p>And, in their support, I see this as a very useful tool for home users who never back up their computers – and risk losing years of precious photos of their family. I bought one for myself to show to executives and recommend for people who do not make backups because they feel backups are too much trouble. This is a great tool in your hands for use on your own computer.</p>
<p>There are other ways cyber criminals can steal your data, but you can slow them down if you never leave your computer unattended and logged in if you store any private information such as credit card numbers, banking information, social security numbers, etc.  In Windows, you can use the key combination “windows-L” to lock your screen. You need a secure password.  That makes it more difficult, though not impossible, to steal your data.</p>
<p>Summary: Great tool in your hands; horrible tool for hackers to use against you.</p>
<p>The post <a href="https://fosterinstitute.com/steal-information/">Easily steal the information from a computer</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What dangerous behaviors do users regularly engage in using company owned computer equipment?</title>
		<link>https://fosterinstitute.com/dangerous-behaviors/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 27 Nov 2008 04:00:57 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[danger]]></category>
		<category><![CDATA[IT Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=86</guid>

					<description><![CDATA[<p>A graduate student asked me to help him in his research regarding technical issues in Industrial-Organizational Psychology. Here are some of the observations I see on a regular basis. Perhaps you can add even more through your blog responses about computer user behavior that will help him in his quest: Installing a program, toolbar, browser [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/dangerous-behaviors/">What dangerous behaviors do users regularly engage in using company owned computer equipment?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A graduate student asked me to help him in his research regarding technical issues in Industrial-Organizational Psychology. Here are some of the observations I see on a regular basis. Perhaps you can add even more through your blog responses about computer user behavior that will help him in his quest:</p>
<ul>
<li>Installing a program, toolbar, browser plug-in, or any other tool without the IT manager&#8217;s permission on your computer</li>
<li>Writing your password down where someone could find it</li>
<li>Using a password that would be easy for someone to figure out</li>
<li>Experimenting in windows with screen savers, screen colors, desktop settings, and other non-work-related activities</li>
<li>Putting a family photo on  your computer as a background</li>
</ul>
<p><span id="more-2688"></span></p>
<ul>
<li>Calling the IT department to &#8220;hold your hand&#8221; over the phone while you restart your computer to solve the same problem they have helped you fix 20 times</li>
<li>Calling the IT department to ask them to support your personal software that isn&#8217;t approved by the company</li>
<li>Not taking time to learn to use your applications correctly, and taking 3 times longer to perform a task through &#8220;this is the way my coworker showed me&#8221; instead of learning the fast proper way to accomplish a task</li>
<li>Use your laptop on the road to connect to insecure wireless networks at airports, hotels, coffee shops, etc.</li>
<li>Plugging in a USB device or inserting a CD/DVD that IT hasn&#8217;t checked for viruses, spyware, and other dangers</li>
<li>Copying company data to removable media that might be lost &#8211; exposing the company to liabilities and damages</li>
<li>Acting as if you are stupid just to prove &#8220;this computer/software is too hard to use&#8221; when, in reality, you are perfectly capable of using the computer/software if you wanted to</li>
<li>Eating food near your computer and gumming up the keyboard with spills, crumbs, etc.</li>
<li>Connecting to the Internet using a personal device (phone, laptop modem, etc) at work to bypass the company monitoring and blocking tools</li>
<li>Forwarding an e-mail you received that has a political or other message from your company account. When an e-mail leaves from your company account, someone might think your company holds that position or opinion</li>
<li>Interfering with the corporate security steps by aborting anti-virus scans, interrupting installations of patches and updates, or answering &#8220;yes&#8221; if prompted with any message similar to, &#8220;Is it ok if this program performs a risky behavior?&#8221;</li>
<li>Giving out your password to anyone, including your boss, manager, or IT professional for any reason</li>
<li>Sending confidential information in text or attachments via an unencrypted e-mail message. Even if the recipient is authorized to see the content, e-mail is insecure and can be easily intercepted along the way</li>
<li>Seeing a security risk and not reporting it immediately to your supervisor</li>
<li>Bringing a computer from home and connecting it to the network at work</li>
<li>Using your home computer to connect to the office network without a trained professional making sure your home computer is secure</li>
<li>Connecting to your office from a hotel or internet café computer &#8211; since those computers are often infected with viruses and spyware</li>
<li>Allowing a guest to use your computer or your phone/PDA</li>
<li>Allowing a guest to connect to your wired or wireless network</li>
<li>Storing company data on your laptop &#8211; even if it is a company laptop &#8211; unless you have full disk encryption and are using a strong secure secret key</li>
<li>Using a proxy site to bypass the organization&#8217;s Internet filtering software and view an unauthorized site</li>
<li>Letting a stranger, visitor, or even another employee into the server room without permission from IT and/or the president of the company</li>
<li>Employers not taking the proper steps to protect the data of their employees, vendors, and customers</li>
<li>Employers not providing adequate training and testing to ensure computer users are competent in security and productivity</li>
<li>Calling the IT department to whine about how terrible the new secure password policy is instead of accepting the reality that fighting cyber-crime is everyone&#8217;s job</li>
<li>Feeling it is your right to be able to use organizational resources for any task you choose</li>
<li>Not having an organizational Acceptable Usage Policy that everyone is aware of</li>
<li>Not following an organizational Acceptable Usage Policy</li>
<li>Answer people&#8217;s IT related questions when you don&#8217;t know what you are talking about</li>
<li>Ask IT advice from someone who isn&#8217;t qualified to answer</li>
<li>Thinking &#8220;it is ok as long as I don&#8217;t get caught&#8221; when using a computer to do something wrong</li>
<li>Seeing an indication on your computer that it may be infected, such as the computer slowing down, and not reporting it to IT</li>
<li>Opening attachments in e-mail messages even if you weren&#8217;t expecting the attachments</li>
<li>Ever sending a message you&#8217;d be embarrassed for someone else at the company to read</li>
</ul>
<p>If you want to, please add your comments to the blog posting below. This will help the graduate student who is working on this study.</p>
<p>The post <a href="https://fosterinstitute.com/dangerous-behaviors/">What dangerous behaviors do users regularly engage in using company owned computer equipment?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
