<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>it security audit Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/it-security-audit/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/it-security-audit/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Sun, 23 Jul 2023 01:59:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>it security audit Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/it-security-audit/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What to Do if Someone Hacks Your Email Account</title>
		<link>https://fosterinstitute.com/what-to-do-if-someone-hacks-your-email-account/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 21 Jul 2023 16:10:06 +0000</pubDate>
				<category><![CDATA[Email]]></category>
		<category><![CDATA[Hacked Email]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Email Hacking]]></category>
		<category><![CDATA[Email Password]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[Security Patches]]></category>
		<category><![CDATA[two-step authentication]]></category>
		<category><![CDATA[Unauthorized Spammer]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2914</guid>

					<description><![CDATA[<p>How to protect yourself if, or even before, an unauthorized spammer uses one of your email accounts to send out spam: If you have cybersecurity insurance or feel this incident could cause significant damage, consider having a forensic analysis to track down what happened. Contact your email provider, explain what happened, and ask for help. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/what-to-do-if-someone-hacks-your-email-account/">What to Do if Someone Hacks Your Email Account</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>How to protect yourself if, or even before, an unauthorized spammer uses one of your email accounts to send out spam:<span id="more-2914"></span></p>
<p>If you have cybersecurity insurance or feel this incident could cause significant damage, consider having a forensic analysis to track down what happened.</p>
<p>Contact your email provider, explain what happened, and ask for help. Continue down this list while you wait for their response.</p>
<p>Reset your email account password immediately. If you can&#8217;t log in because someone unauthorized reset your password, try resetting it yourself. If that doesn&#8217;t work, contact your email company&#8217;s tech support.</p>
<p>Check if your username and old passwords have appeared on the dark web. Visit <a href="https://haveibeenpwned.com/" target="_blank" rel="noopener">https://haveibeenpwned.com/</a> and similar sites to find out. Never enter your password.</p>
<p>Change passwords for all your accounts including social media, banking, and other sensitive accounts, especially if you&#8217;ve used the same password for multiple accounts. Someone may have access to more than just your email.</p>
<p>Consider using a password manager like 1Password, Dashlane, LastPass, NordPass or another to help ease the pain of having different passwords on every website from now on.</p>
<p>When setting up security questions, avoid real answers that are easy for a bad actor to research. When asked, &#8220;Where were you born,&#8221; you could answer something like, &#8220;The fourth crater on the moon.&#8221; Save your secret answers in a file in a random place with a random name like &#8220;socks.docx&#8221; for when you need the answers. You can encrypt the file for added safety.</p>
<p>Enable two-step verification for your email account. While you are at it, set up two-step verification everywhere you can, primarily on sensitive websites and services. Here is how to add MFA to your LinkedIn account for added security <a href="https://www.linkedin.com/help/linkedin/answer/544/turning-two-step-verification-on-and-off?lang=en" target="_blank" rel="noopener">https://www.linkedin.com/help/linkedin/answer/544/turning-two-step-verification-on-and-off?lang=en</a></p>
<p>If you set up two step authentication so that the site or service sends you an email message for the second part of logging in, and the hacker has access your email, it defeats the purpose of MFA. Therefore, if you set up the two-step login with email as the second step, use a different secure email address.</p>
<p>Review your email&#8217;s &#8220;sent&#8221; folder to spot any unrecognized messages.</p>
<p>Look at all your email accounts in your organization to ensure there are no email forwarding or filtering rules you did not configure.</p>
<p>Check your websites, especially LinkedIn, for any unauthorized changes.</p>
<p>Set up SPF and DKIM. More information here: <a href="https://fosterinstitute.com/block-inbound-and-outbound-fraudulent-email-messages/" target="_blank" rel="noopener">https://fosterinstitute.com/block-inbound-and-outbound-fraudulent-email-messages/</a></p>
<p>Watch out for remote control applications that might allow a bad actor to compromise your computer and send email messages as you.</p>
<p>Be aware that your computer or another computer in your organization might be hacked, enabling attackers to send messages on your behalf. Stay vigilant and take measures to protect against such incidents.</p>
<p>Regularly apply critical security patches to your computer. You can check for updates manually, even if automatic updates are enabled.</p>
<p>Ensure your anti-virus program is current and run a manual scan regularly. Using EDR or XDR services add more security.</p>
<p>If you use a browser to send and receive email, this is a drastic step, but consider uninstalling the browser. When you reinstall the browser, add only the plugins you need.</p>
<p>If you use your phone or tablet for email, they could be hacked. Apply security patches, keep them in your possession, examine the privacy settings, and lock devices when not in use.</p>
<p>Watch out for apps on your computer, tablet, or phone that may be harvesting your address book without your knowledge. A drastic move would be to factory reset and erase them, but be sure your important data is stored in the cloud or backed up.</p>
<p>Notify financial institutions that if they receive messages from you, the messages could be fraudulent.</p>
<p>You might want to set up a new email address to use until you feel confident your old address is safe.</p>
<p>If you haven&#8217;t already, freeze your credit.</p>
<p>Monitor your financial accounts.</p>
<p>Before you send out notifications, you will want to talk to an advisor who can help you know what to say.</p>
<p>Please forward this to your friends so that, if someone appears to hack their email account, they will know what to do to.</p>
<p>Subscribe to maximize your executive potential with Foster Institute&#8217;s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>The post <a href="https://fosterinstitute.com/what-to-do-if-someone-hacks-your-email-account/">What to Do if Someone Hacks Your Email Account</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks</title>
		<link>https://fosterinstitute.com/tips-and-tricks-an-unconventional-way-to-protect-yourself-from-solarwinds-and-future-hacks/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 13 Jan 2021 22:53:39 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3406</guid>

					<description><![CDATA[<p>Will running one rarely used program stop future attacks? It will in the SolarWinds attack and perhaps stop future compromises too. It makes sense that malware uses strategies to infect and hide inside of networks undetected. Here is some fascinating insight into that self-preservation: The malware related to SolarWinds attack looks for specific security related [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/tips-and-tricks-an-unconventional-way-to-protect-yourself-from-solarwinds-and-future-hacks/">Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Will running one rarely used program stop future attacks? It will in the SolarWinds attack and perhaps stop future compromises too.<span id="more-3406"></span></p>
<p>It makes sense that malware uses strategies to infect and hide inside of networks undetected. Here is some fascinating insight into that self-preservation: The malware related to SolarWinds attack looks for specific security related software, including a free program named WireShark, before installing itself. If Wireshark is running in Windows, the virus installation terminates itself.</p>
<p>Should you run WireShark on your computers 24&#215;7? Ordinarily, IT Professions remove WireShark in case attackers installed it. Paradoxically, running WireShark will stop the initial activation of the SolarWinds attack. WireShark is not the only choice. Open this Microsoft article and use CTRL-F search for the word WireShark to see the other security related tools that will horrify some malware: <a href="https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/" target="_blank" rel="noopener">https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/</a></p>
<p>But, after SUNBURST installs itself, it is too late. It doesn&#8217;t look for security related tools after installation.</p>
<p>This message is not a recommendation to run these applications, nor is it intended to dissuade you. If organizations start adopting this strategy to thwart cautious attacks, it will be interesting to see how malware responds.</p>
<p>Forward this article to your friends so they receive this insight into how bad actors strive to avoid detection and discuss implementing this unconventional approach to stopping malware installations.</p>
<p>The post <a href="https://fosterinstitute.com/tips-and-tricks-an-unconventional-way-to-protect-yourself-from-solarwinds-and-future-hacks/">Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks</title>
		<link>https://fosterinstitute.com/emergency-update-if-your-it-team-uses-solarwinds-products-and-how-to-protect-against-supply-chain-attacks/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 15 Dec 2020 16:15:23 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[CCleaner]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[Infection Vector]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[SolarWinds]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3367</guid>

					<description><![CDATA[<p>Bad Actors compromised a product called SolarWinds Orion and then used that as a vector attack organization. Ask your IT team if they use SolarWinds products, and if so, they must visit SolarWinds dot com/security advisory immediately for more information. SolarWinds is a well-respected organization, and many organizations utilize their products. Not enough details are [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/emergency-update-if-your-it-team-uses-solarwinds-products-and-how-to-protect-against-supply-chain-attacks/">Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Bad Actors compromised a product called SolarWinds Orion and then used that as a vector attack organization. Ask your IT team if they use SolarWinds products, and if so, they must <span id="more-3367"></span>visit SolarWinds dot com/security advisory immediately for more information.</p>
<p>SolarWinds is a well-respected organization, and many organizations utilize their products. Not enough details are known to discredit their organization. Clearly, attackers see them as valuable enough to use as an infection vector.</p>
<p>This is called a supply chain attack because bad actors use a trusted product in an organization&#8217;s supply chain to attack the organization. A similar well-publicized attack happened with a popular tool, with many benefits, called CCleaner. The attackers successfully compromised 2.3 Million PCs.</p>
<p>The CCleaner supply chain attack is an illustration of dwell time. Attackers waited five months from the time they gained access to CCleaner before they launched the attack on CCleaner users. Many computers were safe, but not 2.3 Million of them.</p>
<p>Remember: Just because your organization fixes a vector through which the infection came does not eliminate damage already done. As an analogy, if you were the king or queen of a castle, and you found that attackers entered your castle walls to attack your city, raising the bridge over your moat does not eliminate the attackers who already made it inside.</p>
<p>Supply chain attacks are one of many reasons to eliminate as much software as possible at your organization. If a program is not essential, remove it asap. SolarWinds is vital for many organizations.</p>
<p>Please forward this to your friends so they can alert their IT departments to address this situation, and know to remove all non-essential software from all computers.</p>
<p>The post <a href="https://fosterinstitute.com/emergency-update-if-your-it-team-uses-solarwinds-products-and-how-to-protect-against-supply-chain-attacks/">Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Beware: Attackers Buy Top Search Engine Results to Trick You</title>
		<link>https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 16:40:14 +0000</pubDate>
				<category><![CDATA[browser security]]></category>
		<category><![CDATA[Credit Card Security]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[Malicious Advertising]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Website Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3351</guid>

					<description><![CDATA[<p>What seems to be the best way to find a company&#8217;s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site. Here is how the scam works: Suppose you want to look up a company online [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/">Beware: Attackers Buy Top Search Engine Results to Trick You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>What seems to be the best way to find a company&#8217;s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site. <span id="more-3351"></span></p>
<p>Here is how the scam works: Suppose you want to look up a company online named Super Duper, so you type the store&#8217;s name into your favorite search engine. An attacker might have purchased the top result to take you to the website superduperco.com. However, if you knew to scroll down past the paid-for-results, you would have seen that the real website is superduper.com. Attackers set up a website and named it superduperco.com.</p>
<p>Their deceptive site might contain malicious advertising, ask you to enter credit card numbers during checkout, or tempt you to download malicious programs and apps. They might ask you to login or reset a password, and they capture the password you type in.</p>
<p>If you look up a retailer in a search engine, skip past the ads and paid results. Scroll down to see real search results. Even then, be skeptical in case attackers used SEO techniques to appear at the top of the actual search results.</p>
<p>Please forward this to your friends to alert their users that top search engine results can be a trap.</p>
<p>The post <a href="https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/">Beware: Attackers Buy Top Search Engine Results to Trick You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them</title>
		<link>https://fosterinstitute.com/attackers-can-take-control-of-your-network-in-three-seconds-and-how-to-stop-them/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 23 Oct 2020 19:03:56 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Remote Worker Security]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3333</guid>

					<description><![CDATA[<p>An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network. The attacker does not need to know any passwords; they do not even need a username. They plug in a cable, and 3 seconds later, they&#8217;ve completely compromised your network. An attacker posing as [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/attackers-can-take-control-of-your-network-in-three-seconds-and-how-to-stop-them/">Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network.<span id="more-3333"></span></p>
<p>The attacker does not need to know any passwords; they do not even need a username. They plug in a cable, and 3 seconds later, they&#8217;ve completely compromised your network. An attacker posing as a visitor, a copier repair person, or a member of a cleaning crew can all compromise your organization. They can steal sensitive information, install ransomware, and can shut down operations entirely. They bypass the majority of, if not all, of your other protections because now they&#8217;re a Domain Administrator.</p>
<p>This exploit is so severe that the Department of Homeland Security directed all federal agencies to apply the patch in accordance with the Federal Emergency Directive 20-04.</p>
<p>Take these three steps ASAP:</p>
<p>First, ask your IT team if they&#8217;ve backed up your Domain Controller servers and applied Microsoft&#8217;s patches that address the Zerologon exploit CVE-2020-1472. They must do this immediately. Be compassionate if they&#8217;ve not. IMPORTANT: Realize that if an attacker already took over a network, the patch doesn&#8217;t help.</p>
<p>Second, if you have Domain Controllers using operating systems older than Windows Server 2008 R2, your IT professionals must shut them down for good. Be sure to migrate any mission-critical services to other servers.</p>
<p>Third, does your organization rely on third parties to support you? What if one of your major suppliers, a distributor, or your biggest customer falls prey to an attack? Prepare your organization now for an interruption of their operations. Be sure their executives know about this flaw and these three steps. You do not want a catastrophe at their organization to domino and cause a disaster for you, even though you&#8217;ve protected your systems.</p>
<p>Additional steps:</p>
<p>Inform your work-from-home team members that, in some cases, the attacker can take over your network using a VPN connection. Do you have an armed guard at every work-from-home user&#8217;s home to watch visitors? Of course not. But your entire organization might rely on their security. What if a teenager&#8217;s friend feels like playing around, experimenting, with this new cool exploit on a mom or dad&#8217;s computer?</p>
<p>The patches only protect you from attacks from Windows devices. If an attacker accesses a network port or cable with a non-Windows machine, the attacker can still take control of your network. Microsoft will release a second patch on February 9, 2021. Ask your IT team to configure alerts now to monitor security log events 5827 thru 5831 to see when connections are allowed or denied.</p>
<p>The average time for IT Professionals to apply critical security patches is five months, but you need to help yours be above average. Ask them what you can do to help them have time to test and install all critical security patches within 14 days or sooner. They might want to have a patch management tool. They might need more time to devote to applying updates.</p>
<p>Confirm that your IT Team disconnects or disables all unused Ethernet ports, including those in conference rooms. Lock doors to any offices and conference rooms that contain active Ethernet ports. Train everyone to be proactive and remove opportunities for anyone, including guests and repair people, to plug a device into a network port.</p>
<p>Keep in mind that 911 systems, airlines, governments, and every organization that you depend on are at risk for Zerologon exploit CVE-2020-1472 until they take action too.</p>
<p>Please forward this to fellow executives you care about so they can support their IT Professionals successfully backing up servers and applying the emergency patch.</p>
<p>The post <a href="https://fosterinstitute.com/attackers-can-take-control-of-your-network-in-three-seconds-and-how-to-stop-them/">Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>If You Get Hacked, Do Not Email Anyone About It</title>
		<link>https://fosterinstitute.com/if-you-get-hacked-do-not-email-anyone-about-it/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 15 Oct 2020 21:17:38 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3329</guid>

					<description><![CDATA[<p>You&#8217;ve trained your users to be vigilant for symptoms of cybersecurity issues. Now teach them to share their concerns confidentially. Alert your users today: Tell them to, if they suspect something, avoid opening a support ticket or emailing your IT professionals about the concern. More often than ever before, bad actors infiltrate organizations in a [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/if-you-get-hacked-do-not-email-anyone-about-it/">If You Get Hacked, Do Not Email Anyone About It</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You&#8217;ve trained your users to be vigilant for symptoms of cybersecurity issues. Now teach them to share their concerns confidentially.<span id="more-3329"></span><br />
Alert your users today: Tell them to, if they suspect something, avoid opening a support ticket or emailing your IT professionals about the concern.</p>
<p>More often than ever before, bad actors infiltrate organizations in a slow, methodical way. They can remain undetected for weeks, months, even years. The FBI uses the term dwell time to designate the period from when attackers infiltrate systems until you discover them. The FBI warns businesses that attackers can cause significant damage during dwell time. Bad actors quickly establish backdoors to ensure access, even if you block their first point of entry. They deploy keyloggers on systems to record keystrokes. If your cyber assets are compromised, the bad actors can potentially monitor your messages to find out when you discover their presence in your network, computers, applications, cloud resources, websites, or anywhere else.</p>
<p>Once attackers know you&#8217;ve discovered their infiltration, that triggers them to move forward with their next phase, often contacting you to demand a ransom. Sometimes they threaten severe consequences if you attempt to recover your system in any other way than paying them. Since they are in your systems, you must take the threats seriously.</p>
<p>Establish a protocol for workers to communicate suspicions in some method other than email.</p>
<p>Even your IT department must avoid emailing each other questions such as, &#8220;I received an alert that someone is resetting an administrator password. That&#8217;s odd. Is that you?&#8221; Instead, they must communicate by mobile phone or radio.</p>
<p>If you suspect a breach and contact us, consider phoning. If you must email, use a personal account outside of your company account, and use a phone or some device other than a company computer&#8217;s keyboard to send the message.</p>
<p>I’m not talking about when users receive a phishing message. I’m talking about if they receive a phishing message that includes customer account information, if an important file is missing or won’t open, or if they receive an unexpected login request on a website or to open a file. IT needs to investigate these early-warning signs.</p>
<p>Please forward this to other executives who you care about to establish a mobile hotline number for users to reach the IT team to report suspicious activity. Help avoid triggering attackers’ responses before your IT team has time to react and, hopefully, mitigate a potential cybersecurity disaster.</p>
<p>The post <a href="https://fosterinstitute.com/if-you-get-hacked-do-not-email-anyone-about-it/">If You Get Hacked, Do Not Email Anyone About It</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zoom Security &#8211; Follow Along to Set Security Settings</title>
		<link>https://fosterinstitute.com/follow-along-to-set-zoom-security-settings/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 03 Apr 2020 15:11:58 +0000</pubDate>
				<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Zoom]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3071</guid>

					<description><![CDATA[<p>Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings. This video is [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/follow-along-to-set-zoom-security-settings/">Zoom Security &#8211; Follow Along to Set Security Settings</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings.</p>
<p>This video is for non-technical people who need to make Zoom more secure today. So, if that’s you, open up your zoom account settings on your screen, and keep this video where you can see it side-by-side. Pause the video when you need to.<span id="more-3071"></span></p>
<p>Some people say, &#8220;Mike, tell us what settings to change to increase our Zoom security.&#8221; If that&#8217;s you, then you are going to love this video. It walks you through your Zoom account settings so you can follow along.</p>
<p><iframe title="Zoom Security - Follow Along to Set Settings" src="https://player.vimeo.com/video/403594987?dnt=1&amp;app_id=122963" width="384" height="235" frameborder="0" allow="autoplay; fullscreen" allowfullscreen></iframe></p>
<p>I know that some of you will want to fine tune the settings more than this. This video is not designed to replace your IT Pro; they know more about your specific system and requirements.</p>
<p>To help protect your Zoom meetings, watch other videos that cover concerns about using Zoom:</p>
<p><a href="https://fosterinstitute.com/?p=3094&amp;preview=true" target="_blank" rel="noopener noreferrer">Zoom Security &#8211; Set Up Two-Step Login</a></p>
<p><a href="https://fosterinstitute.com/?p=3099&amp;preview=true" target="_blank" rel="noopener noreferrer">Zoom Security Settings &#8211; The Concise Details</a></p>
<p><a href="https://fosterinstitute.com/blog/zoom-security-issues-protect-yourself/" target="_blank" rel="noopener noreferrer">Zoom Security Issues &#8211; Protect Yourself</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/follow-along-to-set-zoom-security-settings/">Zoom Security &#8211; Follow Along to Set Security Settings</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Make your Zoom Secure</title>
		<link>https://fosterinstitute.com/make-your-zoom-secure/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 02 Apr 2020 20:55:51 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Remote Workers]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Zoom]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[cyber security speaker]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[remote worker security]]></category>
		<category><![CDATA[Zoom Safety]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3067</guid>

					<description><![CDATA[<p>Tomorrow (Friday) morning, expect a completed guide that is quick for you to implement to lock down your Zoom security. Get started now on a few settings: To help prevent an attacker logging into your Zoom account, enable two-step login. Once activated, then when you log in, you&#8217;ll enter your password along with a separate [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/make-your-zoom-secure/">Make your Zoom Secure</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Tomorrow (Friday) morning, expect a completed guide that is quick for you to implement to lock down your Zoom security. Get started now on a few settings:<span id="more-3067"></span></p>
<p>To help prevent an attacker logging into your Zoom account, enable two-step login. Once activated, then when you log in, you&#8217;ll enter your password along with a separate numerical code. Rather than sending the code as a text message, Zoom uses a more secure approach and requires you to use a passcode generator app. To configure two-step login, go into your account settings. Scroll down until you see the word Admin in the left-hand column, click on Advanced and then click the security option. Scroll down the main window until you see Sign in with Two-Factor Authentication. Enable the option. Sign out of Zoom and sign back in to complete the installation. Follow the prompts to associate your authentication app with Zoom.</p>
<p>When you schedule a meeting, for Meeting ID setting, select Generate Automatically. I&#8217;ll explain why soon, know that you need to keep your Personal Meeting ID private except for a few people you trust.</p>
<p>Zoom permits you to choose whether or not to require passwords for your meetings. In most cases, you should require a password. As long as someone gets the meeting notice you send them, they won&#8217;t even need the password because the password gets imbedded into the meeting invitation. However, embedding the passphrase inside the invitation exposes you to a risk. If an unauthorized person obtains the invitation, they too can authenticate to your meeting without needing to know the password.</p>
<p>One of the best security features is a tool called Waiting Room. Tomorrow’s tool will show how to set it up quickly. Be sure to sign up for our newsletter to receive the links for a powerful experience tomorrow and a concise video on Monday morning.</p>
<p>The post <a href="https://fosterinstitute.com/make-your-zoom-secure/">Make your Zoom Secure</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Information that You Need to Know About the California Consumer Privacy Act</title>
		<link>https://fosterinstitute.com/information-that-you-need-to-know-about-the-california-consumer-privacy-act/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 21 Jan 2020 15:48:32 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[CCPA]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3025</guid>

					<description><![CDATA[<p>California&#8217;s CCPA act went into effect on January 1, but you have until July 1, 2020 when it is enforced. Get started now. First, you need to Add a footer to all of your web pages to the effect of &#8220;The CCPA requires us to notify you that we could sell your data unless you [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/information-that-you-need-to-know-about-the-california-consumer-privacy-act/">Information that You Need to Know About the California Consumer Privacy Act</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>California&#8217;s CCPA act went into effect on January 1, but you have until July 1, 2020 when it is enforced. Get started now. First, you need to<span id="more-3025"></span></p>
<p>Add a footer to all of your web pages to the effect of &#8220;The CCPA requires us to notify you that we could sell your data unless you opt-out here&#8221; and provide them a link. Do it even if you don&#8217;t sell data.</p>
<p>CCPA applies to you if:</p>
<ul>
<li>At least half of your organization&#8217;s revenue is from the sale of personal data, or</li>
<li>Your organization stores personal data of fifty thousand people or more, or</li>
<li>Your organization has at least twenty-five million dollars annual revenue</li>
</ul>
<p>If one of those applies, then:</p>
<ul>
<li>If a consumer in California asks, you must be able to give them copies of all of the data you collected about them.</li>
<li>You must be able to tell them if you sold their data and to whom.</li>
<li>Consumers can demand that you delete their data. Scouring their information from all of your applications and tools can be difficult because you have to remove them from your contact list, accounts receivable, order history, and everywhere else you store any information about them or their activities.</li>
</ul>
<p>Protected data includes contact information and anything that can identify a household, including GPS locations.</p>
<p>Confusion abounds in the CCPA. For example, if consumers choose to opt-out, an organization cannot discriminate against them by blocking or offering a lower level of service. But some companies provide services based on their consumers&#8217; data, so how can they give the same level of service to consumers who do not provide data? Another example is that employers need to keep some data on employees. What if an employee asks to have all their data, including their social security number, erased everywhere, but want to continue their employment? There are extensive attempts to address these issues, but the rules are confusing.</p>
<p>You’ll need to involve your lawyer to help wade through the issues, and that leads to the obligatory disclaimer: Do not misconstrue this to be legal advice. Check with your lawyer.</p>
<p>The CCPA is only the beginning. Expect to see similar laws in other states and at a national level too. Please forward this to your friends and associates, so they know they only have until July 1, 2020, to prepare.</p>
<p>The post <a href="https://fosterinstitute.com/information-that-you-need-to-know-about-the-california-consumer-privacy-act/">Information that You Need to Know About the California Consumer Privacy Act</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Remember to Give Your IT Pros a Holiday Gift</title>
		<link>https://fosterinstitute.com/remember-to-give-your-it-pros-a-holiday-gift/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 17 Dec 2019 08:00:30 +0000</pubDate>
				<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[Working with IT]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3019</guid>

					<description><![CDATA[<p>Your IT Team pours out so much time and energy. If you aren’t already, you can brighten their holidays by giving them a gift. The work they do is often so complicated, yet they make it look easy. Unless you are a high-tech executive, it can be difficult to appreciate how sometimes your team accomplishes [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/remember-to-give-your-it-pros-a-holiday-gift/">Remember to Give Your IT Pros a Holiday Gift</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Your IT Team pours out so much time and energy. If you aren’t already, you can brighten their holidays by giving them a gift.</p>
<p>The work they do is often so complicated, yet they make it look easy. Unless you are a high-tech executive, it can be difficult to appreciate how sometimes your team accomplishes a miracle. </p>
<p>In some organizations, the only time the IT team gets noticed is when something technology-related stops functioning correctly.</p>
<p>IT pros, by nature, need to invest more than 40 hours a week to keep up with rapidly changing technology. That doesn’t include responses to the helpdesk crises and completing the projects assigned to them.</p>
<p>Executives reading this newsletter already feel compassion for and support their IT teams. But just in case you know an executive who doesn’t, or the gift slipped their mind, please forward this message to them.  And why not add an IT Appreciation Day to company calendars?</p>
<p>Happy Holidays – and you deserve a bunch of credit too!</p>
<p>The post <a href="https://fosterinstitute.com/remember-to-give-your-it-pros-a-holiday-gift/">Remember to Give Your IT Pros a Holiday Gift</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
