<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>hackers Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/hackers/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/hackers/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Mon, 09 Jul 2018 13:00:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>hackers Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/hackers/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Stop Hidden Attacks Buried in Email Attachments</title>
		<link>https://fosterinstitute.com/stop-hidden-attacks-buried-in-email-attachments/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 09 Jul 2018 13:00:47 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Attachments]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Disabling Macros]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[bad attachments]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[disable macros]]></category>
		<category><![CDATA[email attacks]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Hidden Cyber Attacks]]></category>
		<category><![CDATA[infected attachments]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[macros]]></category>
		<category><![CDATA[malicious attachments]]></category>
		<category><![CDATA[malicious email]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2644</guid>

					<description><![CDATA[<p>When you receive an email attachment, even when you are expecting the document and know the sender, the attached file can be poisoned.  And the friend or associate who sends you the attachment probably does not know that the file is infected. A term to know is macro. It is a set of automated instructions [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/stop-hidden-attacks-buried-in-email-attachments/">Stop Hidden Attacks Buried in Email Attachments</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>When you receive an email attachment, even when you are expecting the document and know the sender, the attached file can be poisoned. <span id="more-2644"></span><br />
And the friend or associate who sends you the attachment probably does not know that the file is infected.</p>
<p>A term to know is macro. It is a set of automated instructions like a program. Emailed Attachments may contain macros.</p>
<p>Macros can contain malicious code that will infect your computer, and give an attacker full access to your computer and network.</p>
<p>If you ever see a message on your screen instructing you to enable macros, refuse.</p>
<p>Your IT department, or IT provider, can disable macros.</p>
<p>At home – you can do it yourself. Find step-by-step instructions by searching the web using the search terms: Disable Macros Office.</p>
<p>On a Windows computer, open each Office application, choose File, Options, Trust Center, Trust Settings, and choose the option to disable all macros with notification.</p>
<p>On a Mac, choose Preferences from the menu in each Office application. In Word, the preferences settings will show up when you pull down the menu labeled Word. Then select Security and Privacy settings. Choose to disable macros with notification.</p>
<p>Forward this message to users who use their computers to work from home, so they can make sure their computers are safe. That will protect your network.</p>
<p>Please forward this to your friends, so they know how dangerous macros are too.</p>
<p>The post <a href="https://fosterinstitute.com/stop-hidden-attacks-buried-in-email-attachments/">Stop Hidden Attacks Buried in Email Attachments</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ask IT Pros to Check Your Routers and Firewalls</title>
		<link>https://fosterinstitute.com/ask-it-pros-to-check-your-routers-and-firewalls/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 28 Jun 2018 21:37:02 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Firewall Security]]></category>
		<category><![CDATA[Web Content Filtering]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[filtering]]></category>
		<category><![CDATA[filtering tool]]></category>
		<category><![CDATA[firewall appliance]]></category>
		<category><![CDATA[firewalls]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[web content filter]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2640</guid>

					<description><![CDATA[<p>We audited a company last week and discovered that their web filtering tools, designed to stop users from accidentally landing on malicious websites, was not blocking dangerous sites. In these days with ransomware and bad actors tricking users into clicking on dangerous links, it is essential to have web content filtering in place. Even if [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/ask-it-pros-to-check-your-routers-and-firewalls/">Ask IT Pros to Check Your Routers and Firewalls</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>We audited a company last week and discovered that their web filtering tools, designed to stop users from accidentally landing on malicious websites, was not blocking dangerous sites. In these days with ransomware and bad actors tricking users into clicking on dangerous links, it is essential to have web content filtering in place.<span id="more-2640"></span></p>
<p>Even if a user does click a link, a good web content filter can often protect your network when user training fails.</p>
<p>We notified the company’s outsourced IT providers, and they determined that the web protection gateway failed and was permitting all traffic into the network. Were it not for the audit, it would still be allowing clicked links to take users to malicious websites.</p>
<p>This firewall appliance is a well-known brand that starts with a B, but it could be any manufacturer. Computer hardware is far from perfect. A big concern is that the firewall failed and no one knew it. As auditors, it is common to find malfunctioning security equipment. Just because all the green lights are flashing on the outside of the firewall does not mean it is working correctly.</p>
<p>Now is an excellent time to ask your IT professionals, even outsourced companies, to devote time to checking your firewalls, routers, wireless network access points, and other devices. They need to apply all critical security patches, verify the filtering rules, and be sure the devices are working fast without hindering the flow of your information. If you want to, have them reach out to us for more technical recommendations.</p>
<p>You can even update your routers and devices at home if you have some extra time. An excellent place to start is at the device manufacturer’s website. There will be instructions to download and install the most recent firmware. Look at the support site about ways you can enable supported security features in your home devices including web content filtering. Be sure to leave time to tweak the settings. Depending on how familiar you are with the settings, this process might take you ten minutes or, if things get a little crazy, it could take an hour or more at home.</p>
<p>Please forward this to everyone you know so they can ask their IT professionals to make sure the firewalls and other devices are up and running correctly. Let’s keep your networks safe.</p>
<p>The post <a href="https://fosterinstitute.com/ask-it-pros-to-check-your-routers-and-firewalls/">Ask IT Pros to Check Your Routers and Firewalls</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to E-Mail Encrypted Attachments</title>
		<link>https://fosterinstitute.com/how-to-e-mail-encrypted-attachments/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 11 May 2018 15:31:58 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Encrypted Attachments]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Secure Attachments]]></category>
		<category><![CDATA[Secure email]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2637</guid>

					<description><![CDATA[<p>E-mail messages can be intercepted or read by an unauthorized individual. When you want privacy, one way is to encrypt your documents before you attach them to your email message. Microsoft Office, for Windows and Mac, has a feature on the File menu called Protect Document. Choose that option, and enter a secret password. Use [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/how-to-e-mail-encrypted-attachments/">How to E-Mail Encrypted Attachments</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>E-mail messages can be intercepted or read by an unauthorized individual.<span id="more-2637"></span></p>
<p>When you want privacy, one way is to encrypt your documents before you attach them to your email message.</p>
<p>Microsoft Office, for Windows and Mac, has a feature on the File menu called Protect Document. Choose that option, and enter a secret password.</p>
<p>Use a phrase such as: the chairs are in a row.</p>
<p>E-mail that file to your recipient.</p>
<p>Then, phone, or text, the password to your recipient. If you email the recipient the password, even if it is in a separate email message, whoever is reading your email messages will receive both the attachment and the secret code.</p>
<p>Please forward this to any of your friends who may want to send sensitive email attachments.</p>
<p>The post <a href="https://fosterinstitute.com/how-to-e-mail-encrypted-attachments/">How to E-Mail Encrypted Attachments</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Simple Change Can Help Protect Your Family, and It Works on Apple and Windows</title>
		<link>https://fosterinstitute.com/a-simple-change-can-help-protect-your-family-and-it-works-on-apple-and-windows/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 27 Apr 2018 17:21:57 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Clean Browsing]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Norton ConnectSafe]]></category>
		<category><![CDATA[Open DNS]]></category>
		<category><![CDATA[Quad9]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Automatic Protection]]></category>
		<category><![CDATA[Bill de Blasio]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[NYC Secure]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2632</guid>

					<description><![CDATA[<p>There is a setting on your computer that can help protect your family. You don&#8217;t need to know this part: There is a service called Domain Name Service, DNS, that is a massive index for the Internet. If someone in your family, or at work, types in make a wish dot com, DNS looks up [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/a-simple-change-can-help-protect-your-family-and-it-works-on-apple-and-windows/">A Simple Change Can Help Protect Your Family, and It Works on Apple and Windows</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There is a setting on your computer that can help protect your family.<span id="more-2632"></span></p>
<p>You don&#8217;t need to know this part: There is a service called Domain Name Service, DNS, that is a massive index for the Internet. If someone in your family, or at work, types in make a wish dot com, DNS looks up those letters and finds that the Make a Wish server is at address 184.168.221.30. Since computers think in numbers, it can then take you to that website.</p>
<p>Your internet service provider provides you with DNS lookups. So, if someone clicks on terrible dot com or infected dot com, your computer will take you to those sites.</p>
<p>However, there are DNS services that will help protect you. When someone clicks on an address, those DNS servers will look up the address and, before sending you there, do its best to make sure it is a good site.</p>
<p>There is nothing to install, and there are no charges for the services. All you need to do is tell your computer to use the new DNS servers, and all the sites show you how to do that. Check out:</p>
<p>Clean Browsing</p>
<p><a href="https://connectsafe.norton.com/" target="_blank" rel="noopener">Norton ConnectSafe</a></p>
<p><a href="https://www.opendns.com/home-internet-security/" target="_blank" rel="noopener">OpenDNS</a></p>
<p><a href="https://quad9.com/" target="_blank" rel="noopener">Quad9</a></p>
<p>Additionally, you might even notice a boost in speed!</p>
<p>Please forward this to everyone you know who would like added protection when they click on a link or even type in an address while surfing the web.</p>
<p>The post <a href="https://fosterinstitute.com/a-simple-change-can-help-protect-your-family-and-it-works-on-apple-and-windows/">A Simple Change Can Help Protect Your Family, and It Works on Apple and Windows</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>New York City is Providing Automatic Protection for all iPhone Users, and So Can Your City</title>
		<link>https://fosterinstitute.com/new-york-city-is-providing-automatic-protection-for-all-iphone-users-and-so-can-your-city/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 18 Apr 2018 16:44:41 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[NYC Secure]]></category>
		<category><![CDATA[Automatic Protection]]></category>
		<category><![CDATA[Bill de Blasio]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2626</guid>

					<description><![CDATA[<p>As the City of Atlanta is still recovering from the massive ransomware attack on March 22, NYC is launching a program that provides secure Internet access for residents and visitors at no charge. NYC&#8217;s Mayor Bill de Blasio signed an executive order to establish the New York City Cyber Command. The command has developed the [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/new-york-city-is-providing-automatic-protection-for-all-iphone-users-and-so-can-your-city/">New York City is Providing Automatic Protection for all iPhone Users, and So Can Your City</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As the City of Atlanta is still recovering from the massive ransomware attack on March 22, NYC is launching a program that provides secure Internet access for residents and visitors at no charge.<span id="more-2626"></span></p>
<p>NYC&#8217;s Mayor Bill de Blasio signed an executive order to establish the New York City Cyber Command. The command has developed the initiative called NYC Secure.</p>
<p>NYC is setting the fantastic precedence of protecting citizens, and visitors, from cyber-attacks. The system protects both iPhone and Android users.</p>
<p>Yesterday, I sought out and met, one on one, with the lead developer of the security app that is one component of NYC Secure. I quickly steered the conversation to the technology behind the protection mechanisms.</p>
<p>After conversing with this security guru, a mathematical genius, for almost an hour, I&#8217;m happy to report that the level of protection is unprecedented.</p>
<p>In fact, most corporations do not provide some of the powerful features built into the NYC public system.</p>
<p>Please forward this message to your mayor, and ask them to follow this model and protect the citizens of your city too!</p>
<p>The post <a href="https://fosterinstitute.com/new-york-city-is-providing-automatic-protection-for-all-iphone-users-and-so-can-your-city/">New York City is Providing Automatic Protection for all iPhone Users, and So Can Your City</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A New Opportunity for Your IT Pros to Protect your Servers</title>
		<link>https://fosterinstitute.com/a-new-opportunity-for-your-it-pros-to-protect-your-servers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 29 Mar 2018 17:12:34 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Attack surface]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pro tips]]></category>
		<category><![CDATA[it professional tips]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[reduce attack surface]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2621</guid>

					<description><![CDATA[<p>Attackers can take advantage of a large attack surface on your servers. Your IT professionals can drastically reduce the attack surface, and potentially save you money. When your IT team logs onto a server, the server’s screen looks similar to what you would experience looking at a Windows workstation’s screen. The display on the server’s [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/a-new-opportunity-for-your-it-pros-to-protect-your-servers/">A New Opportunity for Your IT Pros to Protect your Servers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Attackers can take advantage of a large attack surface on your servers. Your IT professionals can drastically reduce the attack surface, and potentially save you money.<span id="more-2621"></span></p>
<p>When your IT team logs onto a server, the server’s screen looks similar to what you would experience looking at a Windows workstation’s screen. The display on the server’s screen would remind you of your desktop or laptop computer’s screen.</p>
<p>Your IT professionals can remove this desktop experience and produce significant benefits. Your servers need less storage space, are faster, need fewer security patches, and are more reliable. Additionally, there is a smaller attack surface for attackers to exploit. Those benefits will help you, as an executive, sleep better at night.</p>
<p>Your IT team will install the server’s core software, and omit all of the programs that produce the desktop experience.</p>
<p>For your IT team to control and configure the server, they can use a server manager program that runs on their computers. Your IT team might use Windows PowerShell or even Project Honolulu too.</p>
<p>Please forward this message to fellow executives who want to make changes that will help them sleep better at night and, in the future, save money too.</p>
<p>The post <a href="https://fosterinstitute.com/a-new-opportunity-for-your-it-pros-to-protect-your-servers/">A New Opportunity for Your IT Pros to Protect your Servers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Buying a Spare Printer can Vastly Improve Your Cyber Security</title>
		<link>https://fosterinstitute.com/how-buying-a-spare-printer-can-vastly-improve-your-cyber-security/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 16 Feb 2018 17:33:40 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pro tips]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[printer security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2616</guid>

					<description><![CDATA[<p>Imagine a scenario when an IT professional knows there is an urgent security problem in your firewall that needs to be addressed. And at the same time, your multi-function printer is broken. What problem will the IT professional address first? Most IT professionals will, and do, fix the printer first. They care about you and [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/how-buying-a-spare-printer-can-vastly-improve-your-cyber-security/">How Buying a Spare Printer can Vastly Improve Your Cyber Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine a scenario when an IT professional knows there is an urgent security problem in your firewall that needs to be addressed. And at the same time, your multi-function printer is broken. What problem will the IT professional address first?<span id="more-2616"></span></p>
<p>Most IT professionals will, and do, fix the printer first. They care about you and your organization. They want to ensure that your team can serve your customers.</p>
<p>But, postponing the repair to the firewall may significantly increase the risk of your organization experiencing a major cyber attack.</p>
<p>The printer being broken is a visible condition. It is possible that nobody, other than members of your IT team, knows that the firewall is broken.</p>
<p>Your IT team will receive approval for fixing the printer. But, if they spend time fixing the firewall first, everyone will think they are wasting time, sitting around, doing nothing.</p>
<p>What device or activity consumes your IT team&#8217;s time? What do they have to invest a lot of time fixing, when there are perhaps more critical, often invisible, cyber security issues that must be addressed?</p>
<p>If it is the printer that takes up their time, buy a spare printer. If one printer goes down, everyone can use the other printer.</p>
<p>Do what you need to do in order to ensure that your IT team will have time to take care of your IT security. You will reap the benefits if they stop an attack.</p>
<p>The post <a href="https://fosterinstitute.com/how-buying-a-spare-printer-can-vastly-improve-your-cyber-security/">How Buying a Spare Printer can Vastly Improve Your Cyber Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Patching Nightmare – Please Forward to Your IT Pros</title>
		<link>https://fosterinstitute.com/patching-nightmare-please-forward-to-your-it-pros/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 23 Jan 2018 17:55:51 +0000</pubDate>
				<category><![CDATA[Adobe]]></category>
		<category><![CDATA[Adobe Flash]]></category>
		<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Patch Updates]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[CPU Chip Flaws]]></category>
		<category><![CDATA[CPU Chips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[deploying patches]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Intel]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[Java SE patch]]></category>
		<category><![CDATA[Oracle patches]]></category>
		<category><![CDATA[patching nightmare]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2607</guid>

					<description><![CDATA[<p>Intel says, again, to stop deploying patches. Java and other new patches need handling. Intel advises that IT Professionals stop deploying the current versions of patches for the recently discovered security flaws in CPU chips. Find details, just updated, by searching: Root Cause of Reboot Issue Identified Updated Guidance for Customers and Partners site:intel.com Do [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/patching-nightmare-please-forward-to-your-it-pros/">Patching Nightmare – Please Forward to Your IT Pros</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Intel says, again, to stop deploying patches. Java and other new patches need handling.<span id="more-2607"></span></p>
<p>Intel advises that IT Professionals stop deploying the current versions of patches for the recently discovered security flaws in CPU chips. Find details, just updated, by searching:<br />
Root Cause of Reboot Issue Identified Updated Guidance for Customers and Partners site:intel.com</p>
<p>Do not insert a space after the colon.</p>
<p>For most of you, deploying Microsoft patches is easy compared to managing Flash, Java, and browser updates. Oracle is releasing multiple security patches for Java SE. Additionally, if you are upgrading Chrome to the 64 bit version, Google is releasing new patches for that browser.</p>
<p>For executives wondering what to do at home, you may find it best to download fresh versions of any non-Microsoft browsers you use, and reinstall the most recent versions of Flash and Java, if you still use either, from <a href="https://get.adobe.com/flashplayer/">https://get.adobe dot com/flashplayer/</a> or <a href="https://www.java.com/en/">java dot com</a> . Your Microsoft and/or Apple patches are likely configured to install automatically.</p>
<p>For both organizations and home office users, if you can remove Flash and/or Java from some or all of your computers, then you can forget about patching them. If you haven’t already, try it on a few computers. You may find that all of the websites essential to your business no longer require either. Worst case, you can re-install the most recent version.</p>
<p>Executives, please forward this to your IT Professionals. Be sure to, if you have not already, have a conversation with them about how aggressive you want them to be with patching. They can share the pros and cons with you. These days, an aggressive posture related to patches can increase your security dramatically, when handled properly. Provide them time to test the patches, test un-installing the patches, and then to deploy the patches in stages. They will also need to contact your cloud providers to discuss how they are handling the flaws and patches.</p>
<p>The post <a href="https://fosterinstitute.com/patching-nightmare-please-forward-to-your-it-pros/">Patching Nightmare – Please Forward to Your IT Pros</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Three Serious Trends to Watch Out for in Cyber Security</title>
		<link>https://fosterinstitute.com/three-serious-trends-to-watch-out-for-in-cyber-security/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 18 Jan 2018 20:37:23 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Backup]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[CCleaner]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Data Restoration]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[attack tools]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[C-Cleaner]]></category>
		<category><![CDATA[cloud storage]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[data storage]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[healthcare breaches]]></category>
		<category><![CDATA[healthcare security]]></category>
		<category><![CDATA[insecure programs]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[online backup]]></category>
		<category><![CDATA[restore data quickly]]></category>
		<category><![CDATA[restore process]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[server back up]]></category>
		<category><![CDATA[servers]]></category>
		<category><![CDATA[software attacks]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2604</guid>

					<description><![CDATA[<p>First, are your servers backed up to the cloud? The use of online backup will continue to grow. Organizations are finding out, sometimes the hard way, the importance of being able to restore data quickly. Downtime can be extremely expensive for some organizations, so make sure you can restore quickly enough, especially if your data is [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/three-serious-trends-to-watch-out-for-in-cyber-security/">Three Serious Trends to Watch Out for in Cyber Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>First, are your servers backed up to the cloud? The use of online backup will continue to grow. Organizations are finding out, sometimes the hard way,<span id="more-2604"></span> the importance of being able to restore data quickly. Downtime can be extremely expensive for some organizations, so make sure you can restore quickly enough, especially if your data is stored in the cloud. Test your restore process.</p>
<p>Second, attackers will target, more than ever before, organizations who store protected health information. If you are in healthcare, or even if your company name makes it sound like you are in healthcare, ramp up security to unprecedented levels and have a plan of what to do when you are breached.</p>
<p>Third, more attackers will use trusted security software as a vector to infect networks. Attackers already infected the program called C-Cleaner, used by millions of people to, among other things, speed up slow Windows computers. C-Cleaner is a very useful, and trusted, security program. Unfortunately, this tool became a powerful attack tool when attackers took over the update server. What program, one that you trust, will attackers take over to use as a vector to hack your computer?</p>
<p>Please forward this to your friends who can be on the lookout too.</p>
<p>The post <a href="https://fosterinstitute.com/three-serious-trends-to-watch-out-for-in-cyber-security/">Three Serious Trends to Watch Out for in Cyber Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Major Flaw in Computer Processors Affects Security</title>
		<link>https://fosterinstitute.com/major-flaw-in-computer-processors-affects-security/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 04 Jan 2018 22:39:33 +0000</pubDate>
				<category><![CDATA[Computer Processor]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Linux Patch]]></category>
		<category><![CDATA[Microsoft Patch]]></category>
		<category><![CDATA[computer performance degradation]]></category>
		<category><![CDATA[Computer Processor Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Linux patch]]></category>
		<category><![CDATA[Microsoft patch]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2600</guid>

					<description><![CDATA[<p>A security vulnerability, that has existed for 10 years, has only recently been discovered. A patch for Linux has been released and Microsoft plans to release a patch next Tuesday. Apple will release a patch for OSX. For understandable reasons, many organizations are significantly behind schedule in applying patches. The patch won’t help protect your [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/major-flaw-in-computer-processors-affects-security/">Major Flaw in Computer Processors Affects Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A security vulnerability, that has existed for 10 years, has only recently been discovered.<span id="more-2600"></span></p>
<p>A patch for Linux has been released and Microsoft plans to release a patch next Tuesday. Apple will release a patch for OSX.</p>
<p>For understandable reasons, many organizations are significantly behind schedule in applying patches. The patch won’t help protect your organization until the patch is applied to your computers.</p>
<p>A big concern is that the patch is predicted to have a major impact on performance. Estimates of the degradation in the performance range from 0% to 30%. If you have computers that are slow anyway, this will matter to you.</p>
<p>Additionally, this vulnerability affects computers in the cloud too. Amazon and Microsoft have announced that they are working on patching their cloud servers.</p>
<p>Ask IT what the status is of your patches for all of your operating systems, and make a plan for getting your patches up to date.</p>
<p>The post <a href="https://fosterinstitute.com/major-flaw-in-computer-processors-affects-security/">Major Flaw in Computer Processors Affects Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
