<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Internet Safety Tips Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/internet-safety-tips/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/internet-safety-tips/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Wed, 18 Nov 2020 16:40:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Internet Safety Tips Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/internet-safety-tips/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Beware: Attackers Buy Top Search Engine Results to Trick You</title>
		<link>https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 16:40:14 +0000</pubDate>
				<category><![CDATA[browser security]]></category>
		<category><![CDATA[Credit Card Security]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[Malicious Advertising]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Website Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3351</guid>

					<description><![CDATA[<p>What seems to be the best way to find a company&#8217;s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site. Here is how the scam works: Suppose you want to look up a company online [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/">Beware: Attackers Buy Top Search Engine Results to Trick You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>What seems to be the best way to find a company&#8217;s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site. <span id="more-3351"></span></p>
<p>Here is how the scam works: Suppose you want to look up a company online named Super Duper, so you type the store&#8217;s name into your favorite search engine. An attacker might have purchased the top result to take you to the website superduperco.com. However, if you knew to scroll down past the paid-for-results, you would have seen that the real website is superduper.com. Attackers set up a website and named it superduperco.com.</p>
<p>Their deceptive site might contain malicious advertising, ask you to enter credit card numbers during checkout, or tempt you to download malicious programs and apps. They might ask you to login or reset a password, and they capture the password you type in.</p>
<p>If you look up a retailer in a search engine, skip past the ads and paid results. Scroll down to see real search results. Even then, be skeptical in case attackers used SEO techniques to appear at the top of the actual search results.</p>
<p>Please forward this to your friends to alert their users that top search engine results can be a trap.</p>
<p>The post <a href="https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/">Beware: Attackers Buy Top Search Engine Results to Trick You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Alert Your Team &#8211; USB Devices, Login Prompts, and Apps</title>
		<link>https://fosterinstitute.com/alert-your-team-usb-devices-login-prompts-and-apps/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 27 Mar 2020 20:56:16 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[recommendations]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3065</guid>

					<description><![CDATA[<p>Warn your users about three ways attackers continue to exploit the COVID-19 crisis: USB: A new ploy is bad actors mailing USB devices, appearing to be from your company to your users. Once plugged in, they can open up a channel that permits unauthorized remote control and capturing keystrokes, including passwords. Fake Login Prompts: Remind [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/alert-your-team-usb-devices-login-prompts-and-apps/">Alert Your Team &#8211; USB Devices, Login Prompts, and Apps</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Warn your users about three ways attackers continue to exploit the COVID-19 crisis:<span id="more-3065"></span></p>
<p>USB: A new ploy is bad actors mailing USB devices, appearing to be from your company to your users. Once plugged in, they can open up a channel that permits unauthorized remote control and capturing keystrokes, including passwords.</p>
<p>Fake Login Prompts: Remind your users to beware of login screens when they don&#8217;t expect them. Attackers create persuasive prompts that ask your users passwords for their logon, VPN, or Microsoft Office 365 login, and more. Sometimes the windows tell the user that their connection dropped, and to provide credentials to reestablish their link. Your Users must ignore those prompts and notify your IT team immediately.</p>
<p>Fraudulent websites and apps: Sites may have useful coronavirus information, but they also contain malicious attack software that strives to infect computers. Attackers create bad apps offering online statistics, tracking of the virus spread, and more.</p>
<p>Please forward this to your friends so they can alert their users too.</p>
<p>The post <a href="https://fosterinstitute.com/alert-your-team-usb-devices-login-prompts-and-apps/">Alert Your Team &#8211; USB Devices, Login Prompts, and Apps</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Plan Now for Slow Internet and Dropped Phone Calls</title>
		<link>https://fosterinstitute.com/plan-now-for-slow-internet-and-dropped-phone-calls/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 20 Mar 2020 20:01:55 +0000</pubDate>
				<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Remote Worker]]></category>
		<category><![CDATA[Slow Internet]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3061</guid>

					<description><![CDATA[<p>Prepare now for slow Internet speeds and dropped mobile phone calls. Some customers report that their remote workers experience slow Internet speeds. The sheer number of people working from home, and others watching videos at home, is causing the Internet to experience slowdowns similar to traffic during rush hour. You may have heard that Netflix [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/plan-now-for-slow-internet-and-dropped-phone-calls/">Plan Now for Slow Internet and Dropped Phone Calls</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Prepare now for slow Internet speeds and dropped mobile phone calls. Some customers report that their remote workers experience slow Internet speeds. The sheer number of people working from home, and others watching videos at home, is causing the Internet to experience slowdowns similar to traffic during rush hour.<span id="more-3061"></span></p>
<p>You may have heard that Netflix agreed to reduce the picture quality of movies in the UK to reduce the load on the Internet. What&#8217;s that have to do with your company? Prepare a contingency plan now. Something easy to change is to instruct your workers to ask their family members to please download their movies at night rather than streaming the videos during work hours. That way, their family can watch their downloaded movies during the daytime without using up your workers&#8217; remote network speed.</p>
<p>If your remote workers use VPN connections, and they experience slow speeds, your IT team can enable something called split tunneling. Then, if they aren&#8217;t already, your workers&#8217; computers take a shortcut directly to the Internet without going a long way around through your primary office location&#8217;s firewall first. That trades speed for security, so executives have to make the decision, but the change might be worth it if your workers cannot work otherwise. There are other strategies too. Know that recorded video and audio conference calls will make it through even when a real-time conference is so slow it fails.</p>
<p>Other customers explain that the cellular towers in their area are so overloaded that phone calls get dropped, and voices are sometimes garbled beyond understandability. That&#8217;s when text messages, though less convenient, will be your plan B. At least text messages will usually go through even with weak or slow connections.</p>
<p>Please forward this message to your friends so they can have a plan in place at their company in case an Internet or cell phone traffic jam interferes with their business.</p>
<p>The post <a href="https://fosterinstitute.com/plan-now-for-slow-internet-and-dropped-phone-calls/">Plan Now for Slow Internet and Dropped Phone Calls</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Warn Your Workers about Attacker Decoy Tactics</title>
		<link>https://fosterinstitute.com/warn-your-workers-about-attacker-decoy-tactics/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 18 Mar 2020 20:43:39 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Decoy Website]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3057</guid>

					<description><![CDATA[<p>Alert your workers to be on guard looking for fake, decoy websites about coronavirus, even closings, and related alerts. Attackers design the content to be frightening or otherwise enticing so users click without thinking. Warn them that there are hundreds of new websites that hackers created to lure unsuspecting victims. Decoy websites look legitimate but [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/warn-your-workers-about-attacker-decoy-tactics/">Warn Your Workers about Attacker Decoy Tactics</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Alert your workers to be on guard looking for fake, decoy websites about coronavirus, <span id="more-3057"></span>even closings, and related alerts. Attackers design the content to be frightening or otherwise enticing so users click without thinking.  Warn them that there are hundreds of new websites that hackers created to lure unsuspecting victims. Decoy websites look legitimate but are loaded with malicious content. Attackers can access one unsuspecting user’s computer session and then use it to gain full access to your organization’s network. Official websites include <a href="http://cdc.gov" rel="noopener noreferrer" target="_blank">cdc.gov</a>, <a href="http://nih.gov" rel="noopener noreferrer" target="_blank">nih.gov</a> and <a href="http://who.int" rel="noopener noreferrer" target="_blank">who.int</a>. It is better for users to manually type those addresses into their browser instead of clicking links.</p>
<p>The post <a href="https://fosterinstitute.com/warn-your-workers-about-attacker-decoy-tactics/">Warn Your Workers about Attacker Decoy Tactics</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protect Your Network Even when Attackers Trick Your Users</title>
		<link>https://fosterinstitute.com/protect-your-network-even-when-attackers-trick-your-users/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 05 Nov 2019 15:11:53 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2997</guid>

					<description><![CDATA[<p>A business contacted our office last week because a bad actor tricked an employee to give them full access to their computer. The bad actor immediately took over the network and started performing highly illegal activities that appeared to come from the victim&#8217;s systems.  User training is not enough. It is essential to take additional [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/protect-your-network-even-when-attackers-trick-your-users/">Protect Your Network Even when Attackers Trick Your Users</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A business contacted our office last week because a bad actor tricked an employee to give them full access to their computer.</p>
<p>The bad actor immediately took over the network and started performing highly illegal activities that appeared to come from the victim&#8217;s systems.  User training is not enough. It is essential to take additional steps to help protect your network when an attacker is crafty enough to trick a user.</p>
<p><span id="more-2997"></span></p>
<p>Firewalls, almost universally, have a feature called web content filtering. There is a possibility that your IT professional configured the firewall to block known gambling, gaming, and sites with people with no clothes.</p>
<p>Unless you do business with every country in the world, tell your IT team to block the firewall from permitting traffic from all countries except those where you do business.</p>
<p>It is possible that some of your third parties use sites in other countries to handle your sensitive data, and this is a great time to find out by blocking other countries to see what happens. Your security is only as good as the security of your third party providers, and they need to disclose to you any risks they take with you, and your customers&#8217; confidential data.</p>
<p>If you want to be super cautious, rather than block everything at once, you can ask your IT professional to dump the contents of your web filter&#8217;s log into a spreadsheet, or some other database, that will identify traffic trends, sources, and destinations.</p>
<p>Now is an excellent time to ask your IT professionals, even if you outsource IT, to devote time to tuning your web content filtering to be restrictive.</p>
<p>You can even update your routers at home if they support web content filtering, and they might. An excellent place to start is at the device manufacturer&#8217;s website. There will be instructions to download and install the most recent firmware. Look at the support site about ways you can enable supported security features in your home devices, including web content filtering.</p>
<p>Please forward this to everyone you know so they can ask their IT professionals to turn up your web content filtering to help protect against social engineering attacks.</p>
<p>The post <a href="https://fosterinstitute.com/protect-your-network-even-when-attackers-trick-your-users/">Protect Your Network Even when Attackers Trick Your Users</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>773 Million Passwords Exposed &#8211; Were You Exposed?</title>
		<link>https://fosterinstitute.com/773-million-passwords-exposed-were-you-exposed/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 17 Jan 2019 23:22:23 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Password Manager]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Hardware Key]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Modlishka]]></category>
		<category><![CDATA[password code]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[two step verification]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2699</guid>

					<description><![CDATA[<p>Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords that have shown up on the dark web over the past two or three years. Think of Collection #1 as being a value pack of bundled old password lists. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/773-million-passwords-exposed-were-you-exposed/">773 Million Passwords Exposed &#8211; Were You Exposed?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords<br />
<span id="more-2897"></span><br />
that have shown up on the dark web over the past two or three years. Think of Collection #1 as being a value pack of bundled old password lists.</p>
<p>If you want to find out if your passwords were released, visit his site called <a href="https://haveibeenpwned.com">https://haveibeenpwned.com</a>. If you elect to enter your email address, he will tell you if it is in the collection and give you more details.</p>
<p>What do you do if you are on the list? Reset your passwords. Use a password manager that will remember your passwords for you to make your life easier when you use a different password at each website from now on.</p>
<p>Now is a great time to enable two-step verification. A basic form of two-step verification is when you enter a username and password, and you receive a text message code to type in. Enable two-step verification on PayPal, LinkedIn, Dropbox, Facebook and every other web service you use. On each website, look for Settings &gt; Security. You may need to dig down, but more reputable sites now support two-step verification, but you must enable the feature.</p>
<p>Some bad news is that, about a week ago, a tool called Modlishka shows how to break two-step verification so it isn&#8217;t that secure, but two-step verification is still more secure than a simple username password combination. If it allows, have a website use some other method than texting you a password. Using an app on your phone or calling you via a voice call are options that are often more secure than the text message. Microsoft, Google, and a service called Duo offer these options and more. Having a hardware key is even better unless your laptop users leave the key stored in the laptop case, and their password written on the bottom of the laptop.</p>
<p>The post <a href="https://fosterinstitute.com/773-million-passwords-exposed-were-you-exposed/">773 Million Passwords Exposed &#8211; Were You Exposed?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Happy Computer Security Day!</title>
		<link>https://fosterinstitute.com/happy-computer-security-day/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 30 Nov 2018 19:11:36 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Computer Security Day]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2689</guid>

					<description><![CDATA[<p>November 30th is Computer Security Day. Today is a great day to remind your team members to continue to be extra vigilant as they watch for spam email messages.  Encourage and provide time to your team to keep your systems up to date with all critical security patches for operating systems, Office, browsers, Flash, Java, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/happy-computer-security-day/">Happy Computer Security Day!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>November 30th is Computer Security Day. Today is a great day to remind your team members to continue to be extra vigilant as they watch for spam email messages. <span id="more-2895"></span></p>
<p>Encourage and provide time to your team to keep your systems up to date with all critical security patches for operating systems, Office, browsers, Flash, Java, and Reader. Ask them to show you a list, not a pie chart, of missing critical security patches. If they haven’t checked lately, this is an excellent time for them to be sure the firmware is up-to-date in the firewall and other infrastructure devices.</p>
<p>Thank you for all you are doing to protect against ransomware and all types of cyber threats. You are helping make the world a safer place to live and work!</p>
<p>The post <a href="https://fosterinstitute.com/happy-computer-security-day/">Happy Computer Security Day!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>You Might Stop Receiving Essential Email Messages, and What to Do About It</title>
		<link>https://fosterinstitute.com/you-might-stop-receiving-essential-email-messages-and-what-to-do-about-it/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 09 Nov 2018 17:16:56 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Email Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[online impersonators]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2684</guid>

					<description><![CDATA[<p>If someone ever impersonates you via email, you may stop receiving legitimate email messages too. Computers belonging to people who received a fake email message may automatically send all new messages to the phony address instead of yours. Senders don’t realize what is happening, and you stop receiving essential email messages. Consider Nick. One day, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/you-might-stop-receiving-essential-email-messages-and-what-to-do-about-it/">You Might Stop Receiving Essential Email Messages, and What to Do About It</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If someone ever impersonates you via email, you may stop receiving legitimate email messages too. Computers belonging to people who received a fake email message may automatically send all new messages to the phony address instead of yours. Senders don’t realize what is happening, and you stop receiving essential email messages.<span id="more-2894"></span><br />
Consider Nick. One day, one of his friends notified him that they received an email message that appeared to be from Nick saying he was in a predicament and wants them to send money. Of course, Nick did not send the message. Someone is impersonating him! The recipient was aware enough to realize the request for payment was counterfeit.</p>
<p>Then, the unexpected happened. Some of Nick’s business associates, customers, and friends complained, “Hey Nick – Why haven’t you replied to that email message I sent you last week?” His associate named Tony felt snubbed because Nick stopped replying to his messages. Nick had no idea Tony was sending messages because Nick never received any of them.</p>
<p>The cause of this problem is that, unbeknownst to most people, when a bad actor sent the fake email with a made up email address, the recipient’s computer stores the phony email address to be used in the future to auto-fill the &#8220;To:&#8221; address field.</p>
<p>Check your computer. When you start to compose an email message and begin typing the name of the person to whom you are sending the message, does their name show up automatically on a list before you finish typing?</p>
<p>A bad actor might have impersonated you by spoofing your email address with a fake one: Nick Stark &lt;Nich0las @yahoo.com&gt;. But your real email address may be Nick Stark &lt;NStark @yourcompany.com&gt;. While your name is the same, the addresses are different.</p>
<p>From now on, when someone sends an email to you, their address book will auto-fill “Nick Stark” as they type your name into the “To” box in the email message. Unless they pay special attention, their email program may send the email message to the fraudulent email address. You will not receive the email, and the sender expects that you will.</p>
<p>One way you can solve this is to alert people that, when they send you an email message, to verify that, as they fill in your name as the recipient, the email address that shows up is Nstark @yourcompany.com. If they see your name with the wrong email address in their auto-fill list, they should click the option to delete the record with the fake address.</p>
<p>If you have ever been the victim of spoofed email messages sent in your name, you should notify your contacts. If people complain that you do not receive email messages they send you, you should advise your contacts as well.</p>
<p>The auto-fill feature is helpful when sending email messages, but it can come back to bite you if an attacker ever impersonates you in an email message.</p>
<p>Send this message to your friends, especially if anyone ever fakes their email address, so they can help ensure that they receive legitimate email messages.</p>
<p>The post <a href="https://fosterinstitute.com/you-might-stop-receiving-essential-email-messages-and-what-to-do-about-it/">You Might Stop Receiving Essential Email Messages, and What to Do About It</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Stealing Tesla Cars, and Stealing Your Network with Agent Tesla</title>
		<link>https://fosterinstitute.com/stealing-tesla-cars-and-stealing-your-network-with-agent-tesla/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 25 Oct 2018 20:16:24 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Agent Tesla]]></category>
		<category><![CDATA[Breaking Passwords]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Disgruntled Employee Security]]></category>
		<category><![CDATA[GoToMyPC]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[LogMeIn]]></category>
		<category><![CDATA[Stealing Keystroks]]></category>
		<category><![CDATA[Tesla Hackers]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2678</guid>

					<description><![CDATA[<p>The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization&#8217;s security too.First the theft. Wired magazine published an article you can find by searching the title: Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob. Then, you can watch a security cam [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/stealing-tesla-cars-and-stealing-your-network-with-agent-tesla/">Stealing Tesla Cars, and Stealing Your Network with Agent Tesla</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization&#8217;s security too.<span id="more-2893"></span>First the theft. Wired magazine published an article you can find by searching the title: Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob. Then, you can watch a security cam video of two men stealing a Model S in real life on YouTube. The thieves had to use Google to find out how to unplug the car. To see the short video, search: Tesla Model S Being Stolen Antony Kennedy or click <a href="https://www.youtube.com/watch?v=odG2GX4_cUQ&amp;feature=youtu.be" target="_blank" rel="noopener noreferrer">here</a>.</p>
<p>Now, what affects you directly whether you own a Tesla or not. Many IT Professionals, consultants, and outsourced IT firms access your network remotely using tools designed to help them help your users solve technical issues. Example programs include GoToMyPC, TeamViewer, LogMeIn, VNC, and Splashtop. Some outsourced companies use a product called Agent Tesla to support their customers. If you visit the website agent tesla dot com, you will see that the product has additional features including stealing keystrokes, breaking passwords, and spreading itself like a virus through a network. It appears that some bad actors have been using this tool to infect computers at companies without the company&#8217;s permission. And the tech support representatives at Agent Tesla were more than willing to assist the bad actors.</p>
<p>A key takeaway is that user-friendly tools can permit non-technical people to hack your network without needing any technical know-how.</p>
<p>What if a disgruntled or unscrupulous worker in your company installs GoToMyPC, LogMeIn, or similar easy-to-use software on computers in your private offices? They could overhear private conversations without anyone knowing. One of our clients experienced millions of dollars of embezzlement because a trusted worker used one of those programs on the computer that was in the conference room. The embezzler was not technically savvy at all, and he heard enough confidential information to embezzle millions and wreak all kinds of havoc. He did not need to use the additional user-friendly features that Agent Tesla provides including password cracking and automatic infection of other computers, but he could have.</p>
<p>Visit with your IT professionals. What are you, as an organization, doing to protect yourself from someone intentionally utilizing a readily available program, such as Agent Tesla, to infect your network, spy on your workers, steal information, and break your passwords?</p>
<p>The CEO, Owner, President, and other chief executives suffer the most when an attack devastates an organization. Most of them wish they&#8217;d have taken more of an active role in security. Learn from their mistakes, before it is too late.</p>
<p>The post <a href="https://fosterinstitute.com/stealing-tesla-cars-and-stealing-your-network-with-agent-tesla/">Stealing Tesla Cars, and Stealing Your Network with Agent Tesla</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Can you Trust the Kindness of Tech Support Strangers?</title>
		<link>https://fosterinstitute.com/can-you-trust-the-kindness-of-tech-support-strangers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 19 Oct 2018 18:56:51 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Tech Support]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[program safety]]></category>
		<category><![CDATA[remote access]]></category>
		<category><![CDATA[remote access safety]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[tech support imposters]]></category>
		<category><![CDATA[tech support safety]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2673</guid>

					<description><![CDATA[<p>If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your computer, think twice. Their program already installed on your computer should be able to give them all the information that [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/can-you-trust-the-kindness-of-tech-support-strangers/">Can you Trust the Kindness of Tech Support Strangers?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your computer, think twice.<br />
<span id="more-2892"></span></p>
<p>Their program already installed on your computer should be able to give them all the information that they need. Even if the tech support person does require you to install another program, there is a possibility that the diagnostic program has an undiscovered security vulnerability.</p>
<p>If you do decide to install the program, at least make sure that the file location they offer you is on their main website, not a misspelled version such as qickbooks.com or abode.com.</p>
<p>Additionally, refuse to permit tech support to log in to your computer, even if you were the one who called them. Do you want to trust the security of your computer to a stranger?</p>
<p>Ask if there is some other way to provide them with the information they need.</p>
<p>Beware of imposters asking you to provide remote access or asking you to download diagnostic software.</p>
<p>The post <a href="https://fosterinstitute.com/can-you-trust-the-kindness-of-tech-support-strangers/">Can you Trust the Kindness of Tech Support Strangers?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
