<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IT review Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/it-review/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/it-review/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Tue, 05 Apr 2022 16:32:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>IT review Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/it-review/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Protect Sensitive Data on USB Drives and Memory Sticks if they are Lost or Stolen</title>
		<link>https://fosterinstitute.com/easily-lock-the-data-on-usb-drives/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 18 Feb 2022 00:00:38 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[BitLocker]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security assessment]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[encrypt USB drives]]></category>
		<category><![CDATA[it audit]]></category>
		<category><![CDATA[IT review]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[memory stick safety]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[risk management audit]]></category>
		<category><![CDATA[risk management expert]]></category>
		<category><![CDATA[risk management report]]></category>
		<category><![CDATA[USB Drives]]></category>
		<category><![CDATA[usingi bitlocker]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1970</guid>

					<description><![CDATA[<p>People sometimes lose or misplace USB memory sticks, SD Cards, External USB hard drives, and other external storage media. Help protect your data from prying eyes and cyber thieves by encrypting the drive. On Macs and Windows, encrypting an external drive can be as simple as right-clicking on the external drive’s icon and selecting the [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/easily-lock-the-data-on-usb-drives/">Protect Sensitive Data on USB Drives and Memory Sticks if they are Lost or Stolen</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>People sometimes lose or misplace USB memory sticks, SD Cards, External USB hard drives, and other external storage media. Help protect your data from prying eyes and cyber thieves by encrypting the drive.</p>
<p>On Macs and Windows, encrypting an external drive can be as simple as right-clicking on the external drive’s icon and selecting the encryption option.</p>
<p>Two golden rules:</p>
<p>1) Be sure your files are backed up elsewhere before encrypting a drive.</p>
<p>2) Be sure to save the recovery key in case you forget the password.</p>
<p>Encrypting individual files is helpful to protect your data, but attackers can still read the filenames and deduce information. One advantage to encrypting an entire external drive is bad actors cannot see the filenames when you encrypt an entire external drive or memory stick.</p>
<p>I intend to make you aware of the importance of encrypting external drives and not go into technical details. So, you’re welcome to skip the following information. If you encounter errors encrypting drives in the simple method above, there are many details. For example:</p>
<p>Windows: One way to encrypt drives is using BitLocker. If you have Windows Home edition instead of Pro, you cannot encrypt drives, but you can unlock and use encrypted drives. All editions of Windows support the “device encryption” feature.</p>
<p>Macs: You can use an encryption utility called Filevault2. Alternatively, you can encrypt drives when you format them. If you have a Mac with an Apple CPU, some users experience losing access to the data on the drive after encryption. Apple will fix that soon if they haven’t already.</p>
<p>Hopefully, you won&#8217;t encounter any issues when you encrypt your external drives and help protect the data from anyone who steals or discovers a misplaced drive.</p>


<p></p>
<p>The post <a href="https://fosterinstitute.com/easily-lock-the-data-on-usb-drives/">Protect Sensitive Data on USB Drives and Memory Sticks if they are Lost or Stolen</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Find Out if You Can Collect a Bundle from the Equifax Breach</title>
		<link>https://fosterinstitute.com/find-out-if-you-can-collect-a-bundle-from-the-equifax-breach/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 24 Jul 2019 19:37:52 +0000</pubDate>
				<category><![CDATA[Credit Freeze]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT review]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[Security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2981</guid>

					<description><![CDATA[<p>There is a strong chance that hackers obtained your identity information in the Equifax breach. It exposed 148 million American&#8217;s sensitive information, and that sets you and your family up for identity theft. If you already suffered identity theft and can prove Equifax was the source, you might get up to twenty thousand dollars. Beware [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/find-out-if-you-can-collect-a-bundle-from-the-equifax-breach/">Find Out if You Can Collect a Bundle from the Equifax Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There is a strong chance that hackers obtained your identity information in the Equifax breach. It exposed 148 million American&#8217;s sensitive information, and that sets you and your family up for identity theft. If you already suffered identity theft and can prove Equifax was the source, you might get up to twenty thousand dollars.<span id="more-2981"></span></p>
<p>Beware of additional fraud. Several sites are claiming to help you find out if you were part of the breach, but of course, the sites ask for personal information. Be safe: Use the contact information provided by <a href="https://www.equifax.com" target="_blank" rel="noopener noreferrer">Equifax</a>. The Equifax FAQ says to visit: <a href="https://www.equifaxsecurity2017.com/" target="_blank" rel="noopener noreferrer">https://www.equifaxsecurity2017.com/</a></p>
<p>To find out if you are affected, that site points you to: <a href="https://www.equifaxbreachsettlement.com/" target="_blank" rel="noopener noreferrer">https://www.equifaxbreachsettlement.com/</a></p>
<p>For identity theft, credit monitoring is helpful, so you know you are a victim, but by then, it is too late.</p>
<p>Placing credit freezes are a critical step in preventing your identity from being stolen.&#8221;</p>
<p>Freeze your credit, everyone in your family&#8217;s, at all major credit bureaus. To save you time, here are four and how to reach them:</p>
<p>Experian (888) 397-3742<br />
<a href="https://www.experian.com/freeze/center.html" target="_blank" rel="noopener noreferrer">https://www.experian.com/freeze/center.html</a></p>
<p>TransUnion LLC – To Freeze: (888) 909-8872<br />
<a href="https://www.transunion.com/credit-freeze" target="_blank" rel="noopener noreferrer">https://www.transunion.com/credit-freeze</a></p>
<p>Equifax Information Services, LLC (800) 685-1111<br />
<a href="https://www.equifax.com/personal/credit-report-services/" target="_blank" rel="noopener noreferrer">https://www.equifax.com/personal/credit-report-services/</a></p>
<p>Innovis – To Freeze: (800) 540-2505<br />
<a href="https://www.innovis.com/personal/securityFreeze" target="_blank" rel="noopener noreferrer">https://www.innovis.com/personal/securityFreeze</a></p>
<p>Please forward this to your friends. If they don&#8217;t understand the importance of a credit freeze, The FTC provides more information at <a href="https://www.consumer.ftc.gov/articles/0497-credit-freeze-faqs" target="_blank" rel="noopener noreferrer">https://www.consumer.ftc.gov/articles/0497-credit-freeze-faqs</a></p>
<p>The post <a href="https://fosterinstitute.com/find-out-if-you-can-collect-a-bundle-from-the-equifax-breach/">Find Out if You Can Collect a Bundle from the Equifax Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Never Permit Tech Support to Access your Computer</title>
		<link>https://fosterinstitute.com/never-permit-tech-support-to-access-your-computer/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 03 Jul 2019 14:53:45 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Tech Support]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity awareness training]]></category>
		<category><![CDATA[cybersecurity expert]]></category>
		<category><![CDATA[it audit]]></category>
		<category><![CDATA[IT review]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2977</guid>

					<description><![CDATA[<p>A company had a problem with their bank’s remote deposit software. They called technical support, and the bank’s software support person announced, “First, I need to connect to your computer to see what is going on.” Fortunately, the company’s team member told the bank’s technical support person, “It is against company policy to permit any [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/never-permit-tech-support-to-access-your-computer/">Never Permit Tech Support to Access your Computer</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A company had a problem with their bank’s remote deposit software. They called technical support, and the bank’s software support person announced, “First, I need to connect to your computer to see what is going on.” Fortunately, the company’s team member told the bank’s technical support person, <span id="more-2977"></span>“It is against company policy to permit any third parties to connect to our computers.”</p>
<p>The tech support representative at the bank pressed, “I cannot help you if you do not let me into your computer.”</p>
<p>The team member said, “Yes, you can. I can read you anything displayed on the screen, and I can type or click where you say. But we cannot permit anyone to connect remotely. What do you need me to read to you?”</p>
<p>The technician said, “Uh… Ok. What does the error message say?”</p>
<p>The team member replied, “The routing number field is not long enough.”</p>
<p>The technician said, “Ok, that is easy to fix.” And continued to help resolve the problem and all was fine.</p>
<p>Never, ever, permit anyone to remote into your computer.</p>
<p>Once you permit any third party to access your computer, your company’s security is only as good as their security. And you have no idea how good their security is.</p>
<p>Your internal IT team, or outsourced managed service provider, can already take control of your systems without asking you. They will not need to ask your permission. So, if you ever receive a call saying, “This is tech support, you don’t recognize me because I’m the new guy. I need your help to fix your computer. Please go to this website so I can take control of your system to resolve a technical glitch before it crashes your system,” then blow a whistle into the phone as loud as you can. That’s a bad guy using a social engineering ploy in an attempt to trick you into allowing them access into your system.</p>
<p>When in doubt, go back to the only reasonable answer: “No. You will not get access to this computer or any other computer at our organization.” Report this immediately and warn everyone else.</p>
<p>Please forward this to everyone you know or care about, so they know: Never permit anyone, even third party technical support, to access your computer remotely.</p>
<p>The post <a href="https://fosterinstitute.com/never-permit-tech-support-to-access-your-computer/">Never Permit Tech Support to Access your Computer</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6</title>
		<link>https://fosterinstitute.com/when-you-buy-new-wi-fi-devices-be-sure-they-support-wi-fi-version-6/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 18 Jun 2019 15:39:45 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[wi-fi best practices]]></category>
		<category><![CDATA[wi-fi safety]]></category>
		<category><![CDATA[wi-fi security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security assessment]]></category>
		<category><![CDATA[cybersecuirty awareness training]]></category>
		<category><![CDATA[cybersecurity consultant]]></category>
		<category><![CDATA[it audit]]></category>
		<category><![CDATA[IT review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2973</guid>

					<description><![CDATA[<p>Wi-Fi technology is always changing. When you buy new Wi-Fi equipment, be sure to ask if there is a Wi-Fi version 6 option available. You will increase speed, security, and help futureproof your investment. Wi-Fi version 6 will become the new standard for several reasons: Faster: Wi-Fi version 6 won’t necessarily speed up your network [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/when-you-buy-new-wi-fi-devices-be-sure-they-support-wi-fi-version-6/">When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Wi-Fi technology is always changing. When you buy new Wi-Fi equipment, be sure to ask if there is a Wi-Fi version 6 option available. You will increase speed, security, and help futureproof your investment. Wi-Fi version 6 will become the new standard for several reasons:<span id="more-2973"></span></p>
<p>Faster: Wi-Fi version 6 won’t necessarily speed up your network if you have few wireless devices because it only offers faster speeds when multiple wireless phones, computers, appliances, and other devices connect to the access point. Up to 8 devices can communicate simultaneously with the access points, twice as many as before. The new technology even makes mobile device batteries last longer because Wi-Fi v6 can permit devices to draw less power.</p>
<p>More Secure: The primary security-related feature is mandating a security technology called WPA3. The prior version, WPA2, is more than ten years old and vulnerable to remote password guessing attacks. WPA3 requires an attacker to stay physically close to a network when guessing passwords, and your devices can detect frequent guesses. WPA3 encryption is optional in Wi-Fi v5 but required with Wi-Fi version 6.</p>
<p>Futureproofing and Interoperability: When you buy new devices, they may be so expensive that you don’t replace them for years. The good news is that your old Wi-Fi version 5 devices can work with your new access points, and vice versa, so you don’t need to replace everything immediately. However, over time, replace both to experience all of the benefits of version 6.</p>
<p>Nomenclature: You may have noticed that the Wi-Fi Alliance is ditching the old way of naming wireless technology like 802.11b, 802.11a, etc. Now, they are moving to increase version numbers, starting with Wi-Fi v6. The next version will be v7, then v8, and so on.</p>
<p>Please forward this message to people you know who are buying new Wi-Fi devices so they can seek Wi-Fi v6 certified devices when available. They’ll help futureproof their investment, increase security, and enjoy faster connections in busy environments.</p>
<p>The post <a href="https://fosterinstitute.com/when-you-buy-new-wi-fi-devices-be-sure-they-support-wi-fi-version-6/">When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
