<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>it best practices Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/it-best-practices/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/it-best-practices/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Fri, 06 Sep 2024 05:25:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>it best practices Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/it-best-practices/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>An Executive&#8217;s Handbook to Securing Modern Manufacturing Networks and Robots, AI or Not</title>
		<link>https://fosterinstitute.com/ai-advancements-meet-security-ceos-handbook-to-securing-robotics-and-manufacturing-networks/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 02 Sep 2024 17:05:18 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[recommendations]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5643</guid>

					<description><![CDATA[<p>Sadly, as reckless as it seems, some companies that create applications to control machinery will no longer provide technical support to your IT team if the operating system on the workstations is upgraded or has security patches.</p>
<p>The post <a href="https://fosterinstitute.com/ai-advancements-meet-security-ceos-handbook-to-securing-robotics-and-manufacturing-networks/">An Executive&#8217;s Handbook to Securing Modern Manufacturing Networks and Robots, AI or Not</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>While we&#8217;ll discuss AI, the security principles outlined here are equally crucial for all computer-controlled manufacturing systems, whether they incorporate AI or not.</p>
<p><strong>AI&#8217;s Growing Role in Controlling Devices:</strong></p>
<p>As AI starts entering more workplaces, it is crucial to recognize that AI will become more interconnected with hardware devices in your organization. You might want AI to control room lighting and air conditioning to make it voice-controlled or adapt to the changing activities in the room. AI can also control massive machinery, including robots and high-powered lasers for cutting steel. We&#8217;ll all be surprised at how many real-world tangible controls AI can assist. For AI to control devices, computers must drive the machines. Threat actors could exploit weaknesses to disrupt companies, damage equipment, cause expensive delays, and worse.</p>
<p><strong>Machines Driven by Computers, Including Those Running AI and Traditional Computer Control Systems, Introduce a Security Threat:</strong></p>
<p>As AI becomes integral to your operations, remember: Everything from climate control and identity detection to robots and laser cutters hinges on computer systems. AI&#8217;s potential is vast, and its growing adoption means more devices linked to our networks.</p>
<p>However, this surge in AI adoption produces an often-overlooked danger that all organizations with industrial controls must consider. The computer systems hosting your AI and traditional solutions can become obsolete faster than the devices they control. Neglecting to update operating systems and using other security controls exposes your organization to cybersecurity threats. While devices might seem to run smoothly, the escalating sophistication of cyber attackers can&#8217;t be underestimated.</p>
<p><strong>Executives: Unchain Your IT Pros from the Security Limitations:</strong></p>
<p>Is your IT Team prohibited from applying critical cybersecurity updates to operating systems or upgrading to supported operating systems on workstations that control instruments, lasers, robots, and other machinery? If they are, those workstations <strong>pose a security threat to your organization.</strong></p>
<p>Executives must understand that using workstations with old operating systems or without the most recent critical security updates is a significant security risk. <strong>In some cases, executives must ask the IT Team if they have encountered this situation.</strong> Sometimes, executives are inclined to delegate decision-making to the IT Pros. Instead, the IT team must alert the executives of the pros, cons, and expenses. The executives need to decide if it makes sense to pay to upgrade the applications that control robotics, manufacturing, or other equipment on a network.</p>
<p><strong>Three Definitions:</strong></p>
<p>In case nobody&#8217;s explained these terms, it is essential to differentiate between upgrades and updates:</p>
<ol>
<li><strong>Operating System <em>Upgrades</em>:</strong> An example is upgrading from Windows 10 to Windows 11. Newer operating systems often have more security features. Microsoft and Apple will naturally be tempted to assign their best and brightest people to develop and update the newest operating systems, so they eventually drop support for old operating systems. Unsupported operating systems are designated EOL (End of Life.) Using an operating system after it is no longer supported is a significant security risk.</li>
<li><strong>Operating System <em>Updates</em>, a.k.a. Patches:</strong> Security updates are rated by the severity of the security risk and how likely an attacker will exploit the weakness. Critical security updates are the most important to apply. Staying up to date with patches can be a significant struggle in many situations.</li>
<li><strong><em>Application</em> Upgrades:</strong> Upgrades to new versions of the software that controls devices such as CNC machines, robotics, lasers, laboratory equipment, instruments, or any other hardware that connects to a computer.</li>
</ol>
<p><strong>The Shocking Reality:</strong></p>
<p>Some applications that control devices may prohibit operating system upgrades and security patches. The applications might break if the IT team deploys the patches or upgrades the operating systems. Sadly, as reckless as it seems, some companies that create applications to control machinery will no longer provide technical support to your IT team if the operating system on the workstations is upgraded or has security patches. Their software developers may be too busy to create flexible, secure applications and are forced to focus strictly on functionality.</p>
<p>Depending on the application vendor, paying for an upgraded version of a controller application can be very expensive. Fortunately, sometimes, the upgrade charge is reasonable or free. Sometimes, no upgrade is available to permit operating system upgrades or critical security updates.</p>
<p>Another consideration is the risk that upgrading might interrupt manufacturing flow if the upgrading process requires extensive troubleshooting or potentially interrupt production. When equipment operates 24/7, the IT Team is under more pressure since there is no downtime for maintenance.</p>
<p>If the new application&#8217;s user interface significantly differs, shop floor personnel might require additional training. Inadequate training can lead to costly mistakes and safety issues. Scheduling training will affect the timing of deploying the new applications.</p>
<p>So, as you can see, when robotics, scientific instruments, lasers, manufacturing, or other equipment works just fine, upgrading the application offers no valuable benefits, and the IT team is busy, we find during audits and security assessments that many manufacturing organizations have outdated operating systems or need critical cybersecurity updates.</p>
<p>The organization&#8217;s executives might accept the risk, especially if compensating controls are in place.</p>
<p><strong>Alternative Tactics Increase Security:</strong></p>
<p>Using compensating controls in networks is essential because systems sometimes have significant vulnerabilities before updates are released or installed. Compensating controls are even more essential to help protect workstations if patches are missing.</p>
<p>Compensating controls include, and are not limited to, isolating the machines that control robotics, manufacturing equipment and scientific instruments on a separate network away from your network. That separate network must have limited connectivity to only allow traffic to and from the specific devices necessary and limit the kind of data and how it traverses the network to reduce the attack surface and make it more difficult for a malicious program or third party to access that instance or device. I sometimes refer to this tactic in keynote presentations as creating filtered subnets.</p>
<p>Another compensating control is to harden the unpatched or EOL machines by removing all applications except those essential for the equipment&#8217;s operation. Examples of applications that must be removed include browsers and email clients since they are common vectors for successful attacks. If the employees operating those devices require internet and email access, consider adding a separate workstation that is patchable for email and web access.</p>
<p>EDR/XDR (Endpoint Detection and Response / Extended Detection and Response) technology is another helpful control. It involves installing a small program called an agent on each computer. The EDR/XDR agent monitors the system&#8217;s software, services, and behavior for any signs that threat actors might have already compromised the computer. If the EDR/XDR tool detects an IoC (Indicator of Compromise), it can respond by interrupting the process. When tuned to avoid false alarms, the best response is to allow the agent to effectively quarantine the workstation from the rest of the network until the IT team can investigate. This helps prevent attackers from spreading to more hosts.</p>
<p>However, it is common for IT teams to succumb to the danger of relying too heavily on EDR/XDR to protect their organization and, therefore, neglect implementing other industry best practices to protect systems. Threat actors often set up EDR/XDR tools on their test networks to find ways to circumvent the protections. So, even if your EDR/XDR tool says everything is safe, it doesn&#8217;t necessarily mean threat actors aren&#8217;t active in your network.</p>
<p>To combat this, companies commonly conduct yearly red-team exercises, performed by exceptionally skilled IT teams that regularly perform these exercises and know the tricks and practices real-world threat actors use. These exercises are designed to test the effectiveness of the detection and response process. These exercises look for weaknesses in EDR/XDR and help keep the IT team in practice, ensuring they&#8217;re better prepared in the case of an attack.</p>
<p>Depending on your budget, if $20/user/month for EDR/XDR is not feasible, know that the other cybersecurity controls in this article, such as careful hardening and segmentation with very restrictive filtering, are much less expensive than EDR/XDR and have little if any ongoing expense. I don’t want to diminish the usefulness of EDR/XDR tools. If you are on a tight budget, unless your cybersecurity policy requires EDR/XDR, you might choose to focus on other compensating controls.</p>
<p>The IT Team must alert the executives about the expense of upgrading applications, isolating the shop floor instances on a separate network, deploying an additional network for web and email access, training users and operators, implementing EDR/XDR tools, and other expenses. Include time estimates along with financial estimates. Then, the executives can make an informed decision, and IT can follow their instructions and ask for support as necessary.</p>
<p><strong>Step-by-Step Guidance for IT Teams:</strong></p>
<p>Acknowledge that it can be a significant challenge and sometimes practically impossible to ensure that all workstations run with a current OS and that all critical security updates are applied. But keep applying updates if possible.</p>
<p>Inform your executives whether your team has time to make these changes. IT teams must alert executives of the time and expense involved. The executives will have options such as adding more IT professionals to augment the team, postponing other projects, or accepting the risk of continuing with unpatched systems or EOL OSs with the compensating controls listed below.</p>
<p>Explore all technical, training, and expense changes before upgrading applications.</p>
<p>Ask your supervisor to delegate the price checking to someone outside the IT department if feasible. Your IT team is very busy, so checking the prices might cause the upgrade to be delayed. It can be time-consuming to check with the robotic, manufacturing, and scientific equipment vendors to find the pricing for upgrades to their applications that control machinery.</p>
<p>Investigate more than the pricing. Ask about changes in the upgraded applications affecting the user interface and user experience. Ideally, the upgraded application software operates similarly and has the same interface. Unfortunately, some manufacturers significantly change the user experience when they upgrade their applications.</p>
<p>If users will need training, identify a trainer.</p>
<p>Determine how scheduling the training will affect the deployment timing.</p>
<p>Involve executives in decision-making and send them regular reports about the project&#8217;s progress.</p>
<p>Implement compensating controls on the workstations because of the high cybersecurity risk of missing critical patches or using EOL OSs. Compensating controls aren&#8217;t a replacement for missing patches, but the controls can help tremendously.</p>
<p>Remember that attackers can exploit security risks long before they are discovered. Only when the vulnerability is discovered will the operating system and application developers know to create or release patches to seal that security hole. Refrain from relying on patches as your sole security control for application software and operating systems.</p>
<p>Strongly consider isolating shop floor machines on a separate subnet, especially those you are prohibited from patching and those using EOL OSs. Isolate that subnet completely with an air gap or utilize aggressive filtering at the switch or router to limit traffic to only the required source, destination, ports, and protocols.</p>
<p>Additionally, hardening the workstations against attacks is strongly recommended.</p>
<p>Remove or restrict web and email access. This is one of the most effective ways to harden workstations, as web and email are two of the most common vectors for malware.</p>
<p>If the workers at those devices need access to the web and email, consider deploying a separate workstation to their station they can use for web and email. If feasible, that workstation should not be on the shop floor network. If you put those workstations on the equipment network, you would need to allow email and web traffic, and modifying access control lists to allow more sources, destinations, ports, and protocols can significantly reduce the security you would otherwise introduce to the equipment control network. Strive to exclude TCP ports 80 and 443 on the AI device network while allowing full functionality of the AI and other computer-controlled devices.</p>
<p>Be sure you limit the sources of inbound and destinations of outbound network traffic to the absolute minimum. If you need to run new cables to facilitate the additional workstations for web and email at the workers&#8217; stations, then running new cables might be a significant investment. Deploying a WiFi network for email and web access might be more economical. Keep the key secret. If you share the WiFi password, workers might connect other devices to the equipment network and compromise security. Completely blocking email and web access and access to external IP addresses will hamper the workers on the manufacturing network from exposing the hosts to many threats.</p>
<p>Strongly consider using EDR/XDR tools, along with the Red Team Exercises, to help ensure the configurations&#8217; effectiveness and allow your IT team to prepare for actual emergencies.</p>
<p><strong>Summary:</strong></p>
<p>Protect workstations that control hardware such as robotics, pharmaceuticals, lasers, and scientific instruments, regardless of whether they utilize AI. This helps ensure the safety and operability of your systems, protecting your organization and workers.</p>
<p>Subscribe to maximize your executive potential with Foster Institute&#8217;s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>(Image source: Bing. Learn more at [Bing.com].)</p>
<p>The post <a href="https://fosterinstitute.com/ai-advancements-meet-security-ceos-handbook-to-securing-robotics-and-manufacturing-networks/">An Executive&#8217;s Handbook to Securing Modern Manufacturing Networks and Robots, AI or Not</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Battery Backup for Your Work from Home Users’ Internet and Computers for Power Outages</title>
		<link>https://fosterinstitute.com/essential-equipment-for-work-from-home-users-during-power-outages/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 07 Jul 2022 08:34:02 +0000</pubDate>
				<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3449</guid>

					<description><![CDATA[<p>Assuming your remote workers’ temperature is ok, they can continue to work at home during short power outages. You can encourage them to buy, or even issue them, a small uninterruptable power supply UPS for their Internet router. Laptops have built-in battery power. If a worker has a desktop computer or other networking equipment, those [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/essential-equipment-for-work-from-home-users-during-power-outages/">Battery Backup for Your Work from Home Users’ Internet and Computers for Power Outages</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Assuming your remote workers’ temperature is ok, they can continue to work at home during short power outages.</p>
<p>You can encourage them to buy, or even issue them, a small uninterruptable power supply UPS for their Internet router. Laptops have built-in battery power. If a worker has a desktop computer or other networking equipment, those devices must be on a more powerful battery backup.</p>
<p>If you are comparing unit run times, watts are usually a better comparison than VA. A 500W UPS, around one hundred dollars, will probably run an Internet router for between one and two hours. You can ask your IT Pro if you want more details and find out their favorite brand name. APC, Tripp Lite, and CyberPower are popular brands. (The Foster Institute does not receive any compensation for mentioning brands, nor is this an endorsement of the brands. You might find it helpful to know what products our clients find useful).</p>
<p>Please forward this to your friends who might benefit if their workers stay connected during a power outage.</p>
<p>The post <a href="https://fosterinstitute.com/essential-equipment-for-work-from-home-users-during-power-outages/">Battery Backup for Your Work from Home Users’ Internet and Computers for Power Outages</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>If You Get Hacked, Do Not Email Anyone About It</title>
		<link>https://fosterinstitute.com/if-you-get-hacked-do-not-email-anyone-about-it/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 15 Oct 2020 21:17:38 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3329</guid>

					<description><![CDATA[<p>You&#8217;ve trained your users to be vigilant for symptoms of cybersecurity issues. Now teach them to share their concerns confidentially. Alert your users today: Tell them to, if they suspect something, avoid opening a support ticket or emailing your IT professionals about the concern. More often than ever before, bad actors infiltrate organizations in a [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/if-you-get-hacked-do-not-email-anyone-about-it/">If You Get Hacked, Do Not Email Anyone About It</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You&#8217;ve trained your users to be vigilant for symptoms of cybersecurity issues. Now teach them to share their concerns confidentially.<span id="more-3329"></span><br />
Alert your users today: Tell them to, if they suspect something, avoid opening a support ticket or emailing your IT professionals about the concern.</p>
<p>More often than ever before, bad actors infiltrate organizations in a slow, methodical way. They can remain undetected for weeks, months, even years. The FBI uses the term dwell time to designate the period from when attackers infiltrate systems until you discover them. The FBI warns businesses that attackers can cause significant damage during dwell time. Bad actors quickly establish backdoors to ensure access, even if you block their first point of entry. They deploy keyloggers on systems to record keystrokes. If your cyber assets are compromised, the bad actors can potentially monitor your messages to find out when you discover their presence in your network, computers, applications, cloud resources, websites, or anywhere else.</p>
<p>Once attackers know you&#8217;ve discovered their infiltration, that triggers them to move forward with their next phase, often contacting you to demand a ransom. Sometimes they threaten severe consequences if you attempt to recover your system in any other way than paying them. Since they are in your systems, you must take the threats seriously.</p>
<p>Establish a protocol for workers to communicate suspicions in some method other than email.</p>
<p>Even your IT department must avoid emailing each other questions such as, &#8220;I received an alert that someone is resetting an administrator password. That&#8217;s odd. Is that you?&#8221; Instead, they must communicate by mobile phone or radio.</p>
<p>If you suspect a breach and contact us, consider phoning. If you must email, use a personal account outside of your company account, and use a phone or some device other than a company computer&#8217;s keyboard to send the message.</p>
<p>I’m not talking about when users receive a phishing message. I’m talking about if they receive a phishing message that includes customer account information, if an important file is missing or won’t open, or if they receive an unexpected login request on a website or to open a file. IT needs to investigate these early-warning signs.</p>
<p>Please forward this to other executives who you care about to establish a mobile hotline number for users to reach the IT team to report suspicious activity. Help avoid triggering attackers’ responses before your IT team has time to react and, hopefully, mitigate a potential cybersecurity disaster.</p>
<p>The post <a href="https://fosterinstitute.com/if-you-get-hacked-do-not-email-anyone-about-it/">If You Get Hacked, Do Not Email Anyone About It</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Your Work From Home Users are Like a Box of Chocolates</title>
		<link>https://fosterinstitute.com/your-work-from-home-users-are-like-a-box-of-chocolates/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 11 Sep 2020 16:37:51 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Remote Worker Security]]></category>
		<category><![CDATA[Remote Workers]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3293</guid>

					<description><![CDATA[<p>Because of so many work from home users, the Internet is like a box of chocolates for attackers. Step 1: Attackers compromise work-from-home users. Step 2: They gain access to their company. Step 3: They bite into the company to discover what&#8217;s inside. There are so many work from home users; this is a target-rich [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/your-work-from-home-users-are-like-a-box-of-chocolates/">Your Work From Home Users are Like a Box of Chocolates</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Because of so many work from home users, the Internet is like a box of chocolates for attackers.<span id="more-3293"></span></p>
<p>Step 1: Attackers compromise work-from-home users.<br />
Step 2: They gain access to their company.<br />
Step 3: They bite into the company to discover what&#8217;s inside.</p>
<p>There are so many work from home users; this is a target-rich environment.</p>
<p>1. You must harden remote users&#8217; systems against attacks. Secure their connections.<br />
2. When possible, issue laptops, so your IT team has more control over your remote users&#8217; security.<br />
3. Implement user training and phish testing. Please say if you&#8217;d like us to provide phish testing and online training for your users. We do all the work so your IT teams can focus on their other tasks.</p>
<p>Please forward this to your friends so they realize their remote users must be more secure than ever, and attackers target them indiscriminately.</p>
<p>The post <a href="https://fosterinstitute.com/your-work-from-home-users-are-like-a-box-of-chocolates/">Your Work From Home Users are Like a Box of Chocolates</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zoom Security Settings &#8211; The Concise Details</title>
		<link>https://fosterinstitute.com/zoom-security-settings-the-concise-details/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 08 Apr 2020 16:50:02 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Video Meeting Security]]></category>
		<category><![CDATA[Zoom]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Safe Network]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3099</guid>

					<description><![CDATA[<p>Zoom has many security settings. This is a detailed but concise guide to the settings and how they work. Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/zoom-security-settings-the-concise-details/">Zoom Security Settings &#8211; The Concise Details</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Zoom has many security settings. This is a detailed but concise guide to the settings and how they work.<br />
<span id="more-3099"></span><br />
Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings.</p>
<p><iframe src="https://player.vimeo.com/video/405323511?dnt=1&amp;app_id=122963" width="384" height="216" frameborder="0" allow="autoplay; fullscreen" allowfullscreen></iframe></p>
<div>
<div>
<p>Fasten your seatbelt. There are lots of security settings in Zoom. You must change default settings to help close the doors to hackers.</p>
<p>To access the account settings, sign into the Zoom website, click on your account on the far right of the top bar. You can also select a link to Account Management, under which you can reach the Account Settings.</p>
<p>The free version of Zoom lacks some essential security controls. In the paid version, the best place to start is, in the left-hand column, under ADMIN, select Account Management &gt; Account Settings. By default, you&#8217;re already on the meeting tab.</p>
</div>
<div></div>
<div>
<p>One of the first things you&#8217;ll notice is that some settings have a lock symbol next to them. Zoom allows you to configure settings at an account level, group level, and user level. Here, at the account level, if you click the lock icon, that setting will override the group and user settings.</p>
<p>HOST VIDEO: Disable this setting so the host will start meetings with their video off. The host will be able to show their video when they choose.</p>
</div>
<div></div>
<div>
<p>JOIN BEFORE HOST: Disable and lock the setting that would allow others to join the meeting before the host arrives. Never let anyone start communicating until you join to moderate the conversation.</p>
<p>USE PERSONAL MEETING ID (PMI) WHEN SCHEDULING A MEETING: You may not know it yet, but Zoom sets up a private meeting room for you that runs all the time. Your Personal Meeting ID, abbreviated PMI, is the Zoom address to your room. You want your PMI address to be confidential. Disable this setting.</p>
<p>USE PERSONAL MEETING ID (PMI) WHEN STARTING AN INSTANT MEETING: Disable this too for the same reason.</p>
<p>ONLY AUTHENTICATED USERS CAN JOIN MEETINGS: Enable this to add more protection if you meet with coworkers and other people you know who have Zoom accounts. However, you might choose to disable the setting if you will meet with clients, prospects, or anyone else who might not have Zoom accounts.</p>
<p>REQUIRE A PASSWORD WHEN SCHEDULING MEETINGS. Enable this option for all meeting types. Jot down your PMI password.</p>
<p>Here&#8217;s a tip. In case you are ever in a meeting and need to know the password quickly, click on the icon to invite someone, then Zoom displays the meeting ID at the top and the meeting&#8217;s password on the lower right corner of your window.</p>
<p>EMBED PASSWORDS IN MEETING LINK FOR ONE-CLICK JOIN: Leaving the setting enabled means the invitation&#8217;s link to the meeting includes a built-in password. Invitees are not prompted for and do not need to know the password. That means you can require passwords, and your clientele doesn&#8217;t even need to know.</p>
<p>However, embedding the passphrase inside the invitation exposes you to risk. If an unauthorized person obtains the email message, then they, too, can authenticate to your meeting without needing to know the password. If you disable this setting, tell everyone in the meeting the password through some method other than email.</p>
</div>
<div></div>
<div>
<p>REQUIRE PASSWORD FOR PARTICIPANTS JOINING BY PHONE: Enable this if you want to protect against unauthorized callers.</p>
<p>MUTE PARTICIPANTS ON ENTRY: Enable this, not only for security but to protect the meeting from background noise near a participant.</p>
<p>CHAT: Disable this setting here.  If an unauthorized person joins the meeting, you don&#8217;t want them to send disturbing chat messages for all to see. If some sessions require chat, do not click the lock.</p>
</div>
<div></div>
<div>
<p>PRIVATE CHAT: Disable private chat. Protect your participants from unwelcome interruptions from others, perhaps uninvited participants.</p>
<p>PLAY SOUND WHEN PARTICIPANTS JOIN OR LEAVE: Enable this setting to avoid being surprised to find out someone joined, and you didn&#8217;t notice. Check the box if you want to require telephone participants to record their names for an announcement when they join.</p>
<p>FILE TRANSFER: Disable and lock this setting. Blocking file transfers helps stop the spread of malware and potentially offensive content.</p>
<p>FEEDBACK TO ZOOM: Disable this feature.</p>
</div>
<div></div>
<div>
<p>ALLOW HOST TO PUT ATTENDEE ON HOLD: Enable and lock this setting for when you need to have a conversation without everyone listening.</p>
<p>ALWAYS SHOW MEETING CONTROL TOOLBAR: Enable this setting to make your life easier.</p>
<p>SHOW ZOOM WINDOWS DURING SCREEN SHARE: Disable this setting. Unless you are training people to host Zoom, no one needs to see what the host sees.</p>
<p>SCREEN SHARING: Unless you need people to show what&#8217;s on their screens to everyone during the meeting, set sharing to host only. If participants can share, there is a risk that someone, perhaps an uninvited participant, could show unwelcome content.</p>
<p>DISABLE DESKTOP/SCREENSHARE FOR USERS: Zoom allows the sharing of an entire monitor or sharing just one program&#8217;s window. Enable this setting if you want Zoom only to show the program window. This setting helps protect your participants, and the host, from accidentally sharing sensitive information somewhere on their desktop.</p>
<p>If, however, someone plans to use PowerPoint in presenter mode, disable this feature so that the host can share the whole monitor for displaying the slides.</p>
<p>ANNOTATION: Unless annotation is essential for your meeting, disable it. Turning off annotation prevents an uninvited participant from interrupting the flow of the meeting by placing images all over the screen.</p>
</div>
<div></div>
<div>
<p>WHITEBOARD: Unless you need the Whiteboard, disable it for the same reason you disable annotation.</p>
<p>REMOTE CONTROL: Unless you need participants to let others remotely control the shared content, disable this feature.</p>
<p>ALLOW REMOVED PARTICIPANTS TO REJOIN: Unless you think you might accidentally remove someone from a meeting, disable this feature to tell Zoom to keep them out.</p>
<p>FAR END CAMERA CONTROL: Disable this setting unless you want someone else to take control of your camera during your meeting.</p>
</div>
<div></div>
<div>
<p>VIRTUAL BACKGROUND: For security and privacy, tell workers to hide what is in their home office. Your workers can use a green screen backdrop, some attach to the back of chairs, but Zoom can usually differentiate between them and their background either way.</p>
<p>ENABLE IDENTIFYING GUEST PARTICIPANTS: This setting makes it easier for people who belong to your account to identify a potential intruder.</p>
<p>ALLOW USERS TO SELECT ORIGINAL SOUND IN THEIR CLIENT SETTINGS: Enable this feature. It isn&#8217;t so much for security as for sanity. If a participant&#8217;s voice is garbled, they can select original sound. Then you may be able to hear them.</p>
</div>
<div></div>
<div>
<div>
<p>WAITING ROOM: This is one of the most important and useful security settings in Zoom. Enable and lock this setting so that when participants try to join the meeting, they are held in a waiting room until the host permits them to enter.</p>
<p>Go back up to the top of that very long page. You&#8217;ll notice three headings: Meeting, Recording, and Telephone. Click the word Recording to move to the recording tab.</p>
<p>LOCAL RECORDING: Local recording means a participant can save the meeting to their computer. Disable the setting for confidential meetings. Otherwise, an unauthorized person could access that recorded file. A security risk is that the user could store the data in the cloud without a password.</p>
<p>CLOUD RECORDING: Unless you need to have a recording of the meeting, disable cloud recording too. In theory, cloud recordings are more secure since the users don&#8217;t have a file they must protect.</p>
<p>You&#8217;ll find many additional options. You might want to involve your IT Professional to help you choose the settings.</p>
<p>Scroll back up. Look in the left-hand column under PERSONAL and click on the Profile settings:</p>
<p>PERSONAL MEETING ID: Leave the random number alone. Zoom sets up a private meeting room for you to use anytime, and that PMI is the address to your room. Don&#8217;t make it easy for someone to find your PMI address. It is tempting to make your PMI match your phone number, but don&#8217;t.</p>
<p>In the left-hand column on the screen, skip down to Personal &gt; Settings. On the Meeting tab, confirm that the host video is off and that Join before the host is disabled too.</p>
<p>Now go back up in the left-hand column to your Personal &gt; Meetings settings, click on the Personal Meeting Room tab at the top. Confirm the settings match what you configured already. Essential settings include a green checkmark for Mute participants upon entry and a green checkmark in front of the Enable waiting room setting.</p>
<p>If you have other users and groups, Zoom suggests you review their account to verify the settings took hold.</p>
<p>When you schedule a meeting: Meeting ID: Generate Automatically. By now, you know to keep your Personal Meeting ID private except for a few people you trust.</p>
<p>Last, you can check for Zoom updates. Open your account settings by clicking on your account icon. Then select the option to check for updates. Zoom makes updates that improve Zoom&#8217;s security, but the updates do not help you until you install them.</p>
<p>To help protect your Zoom meetings, watch other videos that cover concerns about using Zoom, configuring the two-step login feature, and a video run-through of settings for paid accounts so you can simply follow along.</p>
<p><a href="https://fosterinstitute.com/?p=3094&amp;preview=true" target="_blank" rel="noopener noreferrer">Zoom Security &#8211; Set Up Two-Step Login</a></p>
<p><a href="https://fosterinstitute.com/blog/zoom-security-issues-protect-yourself/" target="_blank" rel="noopener noreferrer">Zoom Security Issues &#8211; Protect Yourself</a></p>
<p><a href="https://fosterinstitute.com/blog/follow-along-to-set-zoom-security-settings/" target="_blank" rel="noopener noreferrer">Zoom Security &#8211; Follow Along to Set Settings</a></p>
</div>
</div>
</div>
<p>The post <a href="https://fosterinstitute.com/zoom-security-settings-the-concise-details/">Zoom Security Settings &#8211; The Concise Details</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Prepare Your Organization for a Reaction to Coronavirus</title>
		<link>https://fosterinstitute.com/prepare-your-organization-for-a-reaction-to-coronavirus/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 26 Feb 2020 21:41:24 +0000</pubDate>
				<category><![CDATA[Disaster Plans]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[Threat Protection]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT Plan]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3039</guid>

					<description><![CDATA[<p>The city of San Francisco just declared a state of emergency over the Coronavirus. Other cities will follow suit &#8211; maybe yours. I&#8217;m in San Francisco right now at the RSA cybersecurity conference. Hand sanitizer is everywhere, and people are using it. Italy shut down some towns. There is a possibility, however remote, and perhaps [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/prepare-your-organization-for-a-reaction-to-coronavirus/">Prepare Your Organization for a Reaction to Coronavirus</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The city of San Francisco just declared a state of emergency over the Coronavirus. Other cities will follow suit &#8211; maybe yours.<span id="more-3039"></span></p>
<p>I&#8217;m in San Francisco right now at the RSA cybersecurity conference.  Hand sanitizer is everywhere, and people are using it.</p>
<p>Italy shut down some towns. There is a possibility, however remote, and perhaps not for months, that US cities might shut down too. Prepare for the potential impact on your organization. For example, if schools shut down, will some of your workers, including IT team members, be unable to come into work because they need to stay at home to watch their youngsters?</p>
<p>Make sure all of your network users can work from home concurrently. Your IT team might need to increase the capacity of your servers to handle the additional workload. Can your workers use their phones to conduct business remotely? Does your IT team need to set up remote VoIP phone clients? Are IT team members cross-trained to be able to cover other workers&#8217; duties? Does everyone know who to contact at your company for the most current information?</p>
<p>Even if your workers can work, they will put the safety of their families first. When Italy shut down some towns, the grocery stores ran out of food and supplies quickly. Encourage workers to stock up on food and products they usually buy, including non-perishables. They need to have enough medications. Once their family is taken care of first, then your workers can devote attention to work.</p>
<p>Prepare for loss of, or delays in, sales and income. Develop contingency plans. Would the loss of one of your primary suppliers devastate your business? Are you prepared if some essential piece of machinery, or network server, needs repair and you cannot get spare parts? Assign someone or develop a team at your company to focus on the risks and develop contingency plans. Remember IT.</p>
<p>Warn your workers that there will be an increase in spam and phishing as bad actors prey on their worries of the virus. They must be vigilant to spam and fake news.</p>
<p>For more information, Homeland Security offers suggestions at <a href="http://ready.gov/business/implementation/IT" rel="noopener noreferrer" target="_blank">ready.gov/business/implementation/IT</a> CDC provides a useful document at <a href="http://CDC.gov/flu/pandemic-resources/pdf/businesschecklist.pdf" rel="noopener noreferrer" target="_blank">CDC.gov/flu/pandemic-resources/pdf/businesschecklist.pdf</a> </p>
<p>Notice signs of things to come including a potential reaction to the virus. The falling stock market is a sign, Italy closing cities is a sign, and San Francisco declaring a state of emergency is a sign. Prepare now in case things start happening rapidly.</p>
<p>Please forward this to your friends so they can prepare their organizations for possible public panic and quarantines over Coronavirus.</p>
<p>The post <a href="https://fosterinstitute.com/prepare-your-organization-for-a-reaction-to-coronavirus/">Prepare Your Organization for a Reaction to Coronavirus</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Information that You Need to Know About the California Consumer Privacy Act</title>
		<link>https://fosterinstitute.com/information-that-you-need-to-know-about-the-california-consumer-privacy-act/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 21 Jan 2020 15:48:32 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[CCPA]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3025</guid>

					<description><![CDATA[<p>California&#8217;s CCPA act went into effect on January 1, but you have until July 1, 2020 when it is enforced. Get started now. First, you need to Add a footer to all of your web pages to the effect of &#8220;The CCPA requires us to notify you that we could sell your data unless you [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/information-that-you-need-to-know-about-the-california-consumer-privacy-act/">Information that You Need to Know About the California Consumer Privacy Act</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>California&#8217;s CCPA act went into effect on January 1, but you have until July 1, 2020 when it is enforced. Get started now. First, you need to<span id="more-3025"></span></p>
<p>Add a footer to all of your web pages to the effect of &#8220;The CCPA requires us to notify you that we could sell your data unless you opt-out here&#8221; and provide them a link. Do it even if you don&#8217;t sell data.</p>
<p>CCPA applies to you if:</p>
<ul>
<li>At least half of your organization&#8217;s revenue is from the sale of personal data, or</li>
<li>Your organization stores personal data of fifty thousand people or more, or</li>
<li>Your organization has at least twenty-five million dollars annual revenue</li>
</ul>
<p>If one of those applies, then:</p>
<ul>
<li>If a consumer in California asks, you must be able to give them copies of all of the data you collected about them.</li>
<li>You must be able to tell them if you sold their data and to whom.</li>
<li>Consumers can demand that you delete their data. Scouring their information from all of your applications and tools can be difficult because you have to remove them from your contact list, accounts receivable, order history, and everywhere else you store any information about them or their activities.</li>
</ul>
<p>Protected data includes contact information and anything that can identify a household, including GPS locations.</p>
<p>Confusion abounds in the CCPA. For example, if consumers choose to opt-out, an organization cannot discriminate against them by blocking or offering a lower level of service. But some companies provide services based on their consumers&#8217; data, so how can they give the same level of service to consumers who do not provide data? Another example is that employers need to keep some data on employees. What if an employee asks to have all their data, including their social security number, erased everywhere, but want to continue their employment? There are extensive attempts to address these issues, but the rules are confusing.</p>
<p>You’ll need to involve your lawyer to help wade through the issues, and that leads to the obligatory disclaimer: Do not misconstrue this to be legal advice. Check with your lawyer.</p>
<p>The CCPA is only the beginning. Expect to see similar laws in other states and at a national level too. Please forward this to your friends and associates, so they know they only have until July 1, 2020, to prepare.</p>
<p>The post <a href="https://fosterinstitute.com/information-that-you-need-to-know-about-the-california-consumer-privacy-act/">Information that You Need to Know About the California Consumer Privacy Act</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Good News for Windows 7 Users</title>
		<link>https://fosterinstitute.com/good-news-for-windows-7-users/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 13 Dec 2019 22:50:14 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[Windows 7]]></category>
		<category><![CDATA[Windows Update]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3012</guid>

					<description><![CDATA[<p>Microsoft stops supporting Windows 7 on January 14, 2020. If you are not going to upgrade, there are options. Of course, in most circumstances, it is best to upgrade. Windows 7 is dated and missing the security features of Windows 10. For businesses, Microsoft offers extended support via critical security patches for Windows 7. You [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/good-news-for-windows-7-users/">Good News for Windows 7 Users</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Microsoft stops supporting Windows 7 on January 14, 2020. If you are not going to upgrade, there are options.<span id="more-3012"></span></p>
<div>Of course, in most circumstances, it is best to upgrade. Windows 7 is dated and missing the security features of Windows 10.</div>
<p></p>
<div>For businesses, Microsoft offers extended support via critical security patches for Windows 7. You need to contact them to find out pricing, but you&#8217;ll likely find out the pricing is $50 per Windows 7 instance for an added year. The next year will be $100 and a third for $150 each. More information: <a href="https://support.microsoft.com/en-us/help/4497181/lifecycle-faq-extended-security-updates" target="_blank" rel="noopener noreferrer">https://support.microsoft.com/en-us/help/4497181/lifecycle-faq-extended-security-updates</a></div>
<p></p>
<div>Home users are not supported. However, many people find that Microsoft allows them to use their Windows 7 license key to activate Windows 10. The path isn&#8217;t super easy, but possible. Here is more information: <a href="https://www.howtogeek.com/266072/you-can-still-get-windows-10-for-free-with-a-windows-7-8-or-8.1-key/" target="_blank" rel="noopener noreferrer">https://www.howtogeek.com/266072/you-can-still-get-windows-10-for-free-with-a-windows-7-8-or-8.1-key/</a></div>
<p></p>
<p>The post <a href="https://fosterinstitute.com/good-news-for-windows-7-users/">Good News for Windows 7 Users</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Avoid Opening Word Attachments &#8211; Check with IT First</title>
		<link>https://fosterinstitute.com/avoid-opening-word-attachments-check-with-it-first/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 23 Oct 2019 15:54:56 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cyber Security Audit]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cybersecuirty awareness training]]></category>
		<category><![CDATA[cybersecurity expert]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT vital systems review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2993</guid>

					<description><![CDATA[<p>When you receive an email message with a PDF attached, it is always best to confirm that you are expecting the attachment before opening it.  However, if you receive a Word, Excel, or another file type other than a pdf, beware. In the past several days, two of our customers suffered a potential breach when [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/avoid-opening-word-attachments-check-with-it-first/">Avoid Opening Word Attachments &#8211; Check with IT First</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>When you receive an email message with a PDF attached, it is always best to confirm that you are expecting the attachment before opening it.  However, if you receive a Word, Excel, or another file type other than a pdf, beware.<br />
<span id="more-2993"></span></p>
<p>In the past several days, two of our customers suffered a potential breach when their users opened Word documents sent as attachments. The infected files slipped right past sophisticated email protection systems.</p>
<p>Fortunately, at both companies, the IT teams got involved early on and averted disaster.</p>
<p>In one case, the attachment came from a trusted third party that was unaware their systems were compromised. Remember, your security is only as good as the security of your third party providers.</p>
<p>If you unexpectedly receive an email message with any attachments other than pdf files, be very skeptical and notify IT immediately. You may save the security of your organization.</p>
<p>The post <a href="https://fosterinstitute.com/avoid-opening-word-attachments-check-with-it-first/">Avoid Opening Word Attachments &#8211; Check with IT First</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Microsoft Will Stop Protecting Windows 7 on January 14, 2020</title>
		<link>https://fosterinstitute.com/microsoft-will-stop-protecting-windows-7-on-january-14-2020/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 05 Sep 2019 18:27:54 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Preventative IT Mainenance]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows 7]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2989</guid>

					<description><![CDATA[<p>Windows 7 computers will still run, your anti-virus will still work, as will your other programs. But you are taking a significant risk because Microsoft will no longer provide security updates that help keep attackers out of your network. Security patches are one of the best ways to protect your systems from attacks. Any of [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/microsoft-will-stop-protecting-windows-7-on-january-14-2020/">Microsoft Will Stop Protecting Windows 7 on January 14, 2020</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Windows 7 computers will still run, your anti-virus will still work, as will your other programs. But you are taking a significant risk because Microsoft will no longer provide security updates that help keep attackers out of your network.<br />
<span id="more-2989"></span><br />
Security patches are one of the best ways to protect your systems from attacks.</p>
<p>Any of your computers that you purchased six years ago came with Windows 7 installed. Unless you paid for new licenses and gave your team time to upgrade them, those computers run Windows 7 today.</p>
<p>Some of your options include:<br />
&#8211; Buy new computers<br />
&#8211; If the computer is strong enough, upgrade Windows 7 to Windows 8.1 or Windows 10<br />
&#8211; You can ask your IT team if you use a technology called VDI. If so, they can uninstall Windows 7 completely. They can install Linux, or make a bootable thumb drive, or use a No Touch Desktop program. The computer can function as a screen and keyboard to a server where Windows runs</p>
<p>If, for any reason, you need to keep Windows 7 on some workstations, be sure to give your IT team time to implement compensating controls. For example, they can isolate the computers from the rest. Ask them to install Microsoft&#8217;s downloadable EMET security tool that works in Windows 7.</p>
<p>Support for Windows 8.0 ended in 2016.<br />
Support for Windows 8.1 ends on January 10, 2023.</p>
<p>Please forward this to your friends and business associates, so they know January 14 is the when Windows 7 becomes a severe security risk to their networks.</p>
<p>The post <a href="https://fosterinstitute.com/microsoft-will-stop-protecting-windows-7-on-january-14-2020/">Microsoft Will Stop Protecting Windows 7 on January 14, 2020</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
