<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>it audit Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/it-audit/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/it-audit/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Tue, 05 Apr 2022 16:32:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>it audit Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/it-audit/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Protect Sensitive Data on USB Drives and Memory Sticks if they are Lost or Stolen</title>
		<link>https://fosterinstitute.com/easily-lock-the-data-on-usb-drives/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 18 Feb 2022 00:00:38 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[BitLocker]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security assessment]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[encrypt USB drives]]></category>
		<category><![CDATA[it audit]]></category>
		<category><![CDATA[IT review]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[memory stick safety]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[risk management audit]]></category>
		<category><![CDATA[risk management expert]]></category>
		<category><![CDATA[risk management report]]></category>
		<category><![CDATA[USB Drives]]></category>
		<category><![CDATA[usingi bitlocker]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1970</guid>

					<description><![CDATA[<p>People sometimes lose or misplace USB memory sticks, SD Cards, External USB hard drives, and other external storage media. Help protect your data from prying eyes and cyber thieves by encrypting the drive. On Macs and Windows, encrypting an external drive can be as simple as right-clicking on the external drive’s icon and selecting the [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/easily-lock-the-data-on-usb-drives/">Protect Sensitive Data on USB Drives and Memory Sticks if they are Lost or Stolen</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>People sometimes lose or misplace USB memory sticks, SD Cards, External USB hard drives, and other external storage media. Help protect your data from prying eyes and cyber thieves by encrypting the drive.</p>
<p>On Macs and Windows, encrypting an external drive can be as simple as right-clicking on the external drive’s icon and selecting the encryption option.</p>
<p>Two golden rules:</p>
<p>1) Be sure your files are backed up elsewhere before encrypting a drive.</p>
<p>2) Be sure to save the recovery key in case you forget the password.</p>
<p>Encrypting individual files is helpful to protect your data, but attackers can still read the filenames and deduce information. One advantage to encrypting an entire external drive is bad actors cannot see the filenames when you encrypt an entire external drive or memory stick.</p>
<p>I intend to make you aware of the importance of encrypting external drives and not go into technical details. So, you’re welcome to skip the following information. If you encounter errors encrypting drives in the simple method above, there are many details. For example:</p>
<p>Windows: One way to encrypt drives is using BitLocker. If you have Windows Home edition instead of Pro, you cannot encrypt drives, but you can unlock and use encrypted drives. All editions of Windows support the “device encryption” feature.</p>
<p>Macs: You can use an encryption utility called Filevault2. Alternatively, you can encrypt drives when you format them. If you have a Mac with an Apple CPU, some users experience losing access to the data on the drive after encryption. Apple will fix that soon if they haven’t already.</p>
<p>Hopefully, you won&#8217;t encounter any issues when you encrypt your external drives and help protect the data from anyone who steals or discovers a misplaced drive.</p>


<p></p>
<p>The post <a href="https://fosterinstitute.com/easily-lock-the-data-on-usb-drives/">Protect Sensitive Data on USB Drives and Memory Sticks if they are Lost or Stolen</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Never Permit Tech Support to Access your Computer</title>
		<link>https://fosterinstitute.com/never-permit-tech-support-to-access-your-computer/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 03 Jul 2019 14:53:45 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Tech Support]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity awareness training]]></category>
		<category><![CDATA[cybersecurity expert]]></category>
		<category><![CDATA[it audit]]></category>
		<category><![CDATA[IT review]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2977</guid>

					<description><![CDATA[<p>A company had a problem with their bank’s remote deposit software. They called technical support, and the bank’s software support person announced, “First, I need to connect to your computer to see what is going on.” Fortunately, the company’s team member told the bank’s technical support person, “It is against company policy to permit any [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/never-permit-tech-support-to-access-your-computer/">Never Permit Tech Support to Access your Computer</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A company had a problem with their bank’s remote deposit software. They called technical support, and the bank’s software support person announced, “First, I need to connect to your computer to see what is going on.” Fortunately, the company’s team member told the bank’s technical support person, <span id="more-2977"></span>“It is against company policy to permit any third parties to connect to our computers.”</p>
<p>The tech support representative at the bank pressed, “I cannot help you if you do not let me into your computer.”</p>
<p>The team member said, “Yes, you can. I can read you anything displayed on the screen, and I can type or click where you say. But we cannot permit anyone to connect remotely. What do you need me to read to you?”</p>
<p>The technician said, “Uh… Ok. What does the error message say?”</p>
<p>The team member replied, “The routing number field is not long enough.”</p>
<p>The technician said, “Ok, that is easy to fix.” And continued to help resolve the problem and all was fine.</p>
<p>Never, ever, permit anyone to remote into your computer.</p>
<p>Once you permit any third party to access your computer, your company’s security is only as good as their security. And you have no idea how good their security is.</p>
<p>Your internal IT team, or outsourced managed service provider, can already take control of your systems without asking you. They will not need to ask your permission. So, if you ever receive a call saying, “This is tech support, you don’t recognize me because I’m the new guy. I need your help to fix your computer. Please go to this website so I can take control of your system to resolve a technical glitch before it crashes your system,” then blow a whistle into the phone as loud as you can. That’s a bad guy using a social engineering ploy in an attempt to trick you into allowing them access into your system.</p>
<p>When in doubt, go back to the only reasonable answer: “No. You will not get access to this computer or any other computer at our organization.” Report this immediately and warn everyone else.</p>
<p>Please forward this to everyone you know or care about, so they know: Never permit anyone, even third party technical support, to access your computer remotely.</p>
<p>The post <a href="https://fosterinstitute.com/never-permit-tech-support-to-access-your-computer/">Never Permit Tech Support to Access your Computer</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6</title>
		<link>https://fosterinstitute.com/when-you-buy-new-wi-fi-devices-be-sure-they-support-wi-fi-version-6/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 18 Jun 2019 15:39:45 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[wi-fi best practices]]></category>
		<category><![CDATA[wi-fi safety]]></category>
		<category><![CDATA[wi-fi security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security assessment]]></category>
		<category><![CDATA[cybersecuirty awareness training]]></category>
		<category><![CDATA[cybersecurity consultant]]></category>
		<category><![CDATA[it audit]]></category>
		<category><![CDATA[IT review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2973</guid>

					<description><![CDATA[<p>Wi-Fi technology is always changing. When you buy new Wi-Fi equipment, be sure to ask if there is a Wi-Fi version 6 option available. You will increase speed, security, and help futureproof your investment. Wi-Fi version 6 will become the new standard for several reasons: Faster: Wi-Fi version 6 won’t necessarily speed up your network [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/when-you-buy-new-wi-fi-devices-be-sure-they-support-wi-fi-version-6/">When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Wi-Fi technology is always changing. When you buy new Wi-Fi equipment, be sure to ask if there is a Wi-Fi version 6 option available. You will increase speed, security, and help futureproof your investment. Wi-Fi version 6 will become the new standard for several reasons:<span id="more-2973"></span></p>
<p>Faster: Wi-Fi version 6 won’t necessarily speed up your network if you have few wireless devices because it only offers faster speeds when multiple wireless phones, computers, appliances, and other devices connect to the access point. Up to 8 devices can communicate simultaneously with the access points, twice as many as before. The new technology even makes mobile device batteries last longer because Wi-Fi v6 can permit devices to draw less power.</p>
<p>More Secure: The primary security-related feature is mandating a security technology called WPA3. The prior version, WPA2, is more than ten years old and vulnerable to remote password guessing attacks. WPA3 requires an attacker to stay physically close to a network when guessing passwords, and your devices can detect frequent guesses. WPA3 encryption is optional in Wi-Fi v5 but required with Wi-Fi version 6.</p>
<p>Futureproofing and Interoperability: When you buy new devices, they may be so expensive that you don’t replace them for years. The good news is that your old Wi-Fi version 5 devices can work with your new access points, and vice versa, so you don’t need to replace everything immediately. However, over time, replace both to experience all of the benefits of version 6.</p>
<p>Nomenclature: You may have noticed that the Wi-Fi Alliance is ditching the old way of naming wireless technology like 802.11b, 802.11a, etc. Now, they are moving to increase version numbers, starting with Wi-Fi v6. The next version will be v7, then v8, and so on.</p>
<p>Please forward this message to people you know who are buying new Wi-Fi devices so they can seek Wi-Fi v6 certified devices when available. They’ll help futureproof their investment, increase security, and enjoy faster connections in busy environments.</p>
<p>The post <a href="https://fosterinstitute.com/when-you-buy-new-wi-fi-devices-be-sure-they-support-wi-fi-version-6/">When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Reduce Your Risk of a Workplace Shooter</title>
		<link>https://fosterinstitute.com/reduce-your-risk-of-a-workplace-shooter/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 25 Sep 2014 15:31:26 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Workplace Safety]]></category>
		<category><![CDATA[Workplace Shooter]]></category>
		<category><![CDATA[Active Shooter Specialist]]></category>
		<category><![CDATA[Gunman]]></category>
		<category><![CDATA[it audit]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Safety]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1963</guid>

					<description><![CDATA[<p>It happens too often: An employer terminates an employee, and then the employee comes back to shoot their supervisors. There is a simple way to reduce the likelihood… If you are going to terminate someone, then if possible, do so on the afternoon before his or her day off. If you terminate an employee on [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/reduce-your-risk-of-a-workplace-shooter/">Reduce Your Risk of a Workplace Shooter</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It happens too often: An employer terminates an employee, and then the employee comes back to shoot their supervisors. There is a simple way to reduce the likelihood…<span id="more-1963"></span></p>
<p>If you are going to terminate someone, then if possible, do so on the afternoon before his or her day off. </p>
<p>If you terminate an employee on a day before a normal workday, then that firing changes the ex-worker’s daily routine the next day. He may spend time, when he would normally have been working, seething over what he may consider an unfair termination. His temper may boil over when he adopts the idea that his manager is attacking his family by preventing him from being able to support his loved ones. His rage may grow out of control. There is a slight chance he will dress up for work, go to the workplace, and perform some violent act that everyone will regret.</p>
<p>You have seen it on the news.</p>
<p>If you choose to terminate a person at closing time on the day before their scheduled day off, such as on a Friday afternoon for many office workers, then you might reduce the likelihood of the employee acting out on their rage. The ex-worker was going to be staying home the next day anyway; that is their routine schedule. Their anger could possibly diminish during those normal days off. </p>
<p>There is no guarantee that this will protect your life and the lives of the other workers at your workplace, but you may feel a responsibility to do everything in your power that might help safeguard your workplace.</p>
<p>This tip is provided by our specialist for the, “What to Do if a Gunman Enters Your Office” program. He specializes in Hostage Rescue by S.W.A.T. teams. The program shows attendees exactly why the odds of survival in these dangerous situations are actually in their favor. Participants gain a sense of security, not panic. Please say if you would like more information about bringing the training experience to your workplace so that you and your team members can sleep better at night.</p>
<p><a href="https://fosterinstitute.com/protecting-your-network/gunman-in-the-office/">What to Do if a Gunman Enters Your Office</a> </p>
<p>Please post your comments below&#8230; </p>
<p>The post <a href="https://fosterinstitute.com/reduce-your-risk-of-a-workplace-shooter/">Reduce Your Risk of a Workplace Shooter</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Use Windows 7 with Windows 8’s Benefits</title>
		<link>https://fosterinstitute.com/use-windows-7-with-windows-8s-benefits/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 16 Apr 2014 15:43:59 +0000</pubDate>
				<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[it audit]]></category>
		<category><![CDATA[it help]]></category>
		<category><![CDATA[IT productivity]]></category>
		<category><![CDATA[it professional tips]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it upgrade]]></category>
		<category><![CDATA[windows 7]]></category>
		<category><![CDATA[windows 8]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1884</guid>

					<description><![CDATA[<p>As businesses transition to Windows 8, they don&#8217;t want to train their user in Windows 8. Here is a short 90 second video that shows the secret about how you can give Windows 7 all the great new stability, security, and speed that Windows 8 has to offer. The secret is to use Windows 8 [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/use-windows-7-with-windows-8s-benefits/">Use Windows 7 with Windows 8’s Benefits</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As businesses transition to Windows 8, they don&#8217;t want to train their user in Windows 8. Here is a short 90 second video that shows the secret about how you can give Windows 7 all the great new stability, security, and speed that Windows 8 has to offer.<span id="more-1884"></span></p>
<p>The secret is to use Windows 8 but make it look like you are using Windows 7. Everybody’s happy, you have the huge power, speed, and security of Windows 8. Maybe nobody will ever know you upgraded.</p>
<p><iframe width="560" height="315" src="//www.youtube.com/embed/yqHNV2Dsing" frameborder="0" allowfullscreen></iframe></p>
<p>Be sure to have your IT pro go into that “tiled interface” one time, right-click the programs you want to use, and choose “pin to taskbar.”</p>
<p>Remember to ask your IT Pro to start by upgrading one computer to Windows 8, iron out any bugs – and there may be no bugs, and then your IT Pro can upgrade the rest of your machines.</p>
<p>Use this tip to reduce the resistance your users may have about moving from Windows 7 to Windows 8.</p>
<p>Please post your comments below&#8230;</p>
<p style="text-align: left;">
<p>The post <a href="https://fosterinstitute.com/use-windows-7-with-windows-8s-benefits/">Use Windows 7 with Windows 8’s Benefits</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
