<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IT security consultant Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/it-security-consultant/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/it-security-consultant/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Thu, 07 Jul 2022 19:34:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>IT security consultant Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/it-security-consultant/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Battery Backup for Your Work from Home Users’ Internet and Computers for Power Outages</title>
		<link>https://fosterinstitute.com/essential-equipment-for-work-from-home-users-during-power-outages/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 07 Jul 2022 08:34:02 +0000</pubDate>
				<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3449</guid>

					<description><![CDATA[<p>Assuming your remote workers’ temperature is ok, they can continue to work at home during short power outages. You can encourage them to buy, or even issue them, a small uninterruptable power supply UPS for their Internet router. Laptops have built-in battery power. If a worker has a desktop computer or other networking equipment, those [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/essential-equipment-for-work-from-home-users-during-power-outages/">Battery Backup for Your Work from Home Users’ Internet and Computers for Power Outages</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Assuming your remote workers’ temperature is ok, they can continue to work at home during short power outages.</p>
<p>You can encourage them to buy, or even issue them, a small uninterruptable power supply UPS for their Internet router. Laptops have built-in battery power. If a worker has a desktop computer or other networking equipment, those devices must be on a more powerful battery backup.</p>
<p>If you are comparing unit run times, watts are usually a better comparison than VA. A 500W UPS, around one hundred dollars, will probably run an Internet router for between one and two hours. You can ask your IT Pro if you want more details and find out their favorite brand name. APC, Tripp Lite, and CyberPower are popular brands. (The Foster Institute does not receive any compensation for mentioning brands, nor is this an endorsement of the brands. You might find it helpful to know what products our clients find useful).</p>
<p>Please forward this to your friends who might benefit if their workers stay connected during a power outage.</p>
<p>The post <a href="https://fosterinstitute.com/essential-equipment-for-work-from-home-users-during-power-outages/">Battery Backup for Your Work from Home Users’ Internet and Computers for Power Outages</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.</title>
		<link>https://fosterinstitute.com/the-solarwinds-breach-affects-you-too-ask-your-it-team-to-take-these-steps/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 30 Dec 2020 21:07:04 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3378</guid>

					<description><![CDATA[<p>The investigation into the SolarWinds breach keeps revealing more shocking ways attackers infiltrated organizations. Even if your organization doesn&#8217;t use SolarWinds, you must take action. Official channels report that some software giants, including at least one major cloud hosting platform, are compromised. Your suppliers and vendors might be compromised and that affects you, too, even [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/the-solarwinds-breach-affects-you-too-ask-your-it-team-to-take-these-steps/">The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The investigation into the SolarWinds breach keeps revealing more shocking ways attackers infiltrated organizations. Even if your organization doesn&#8217;t use SolarWinds, you must take action.<span id="more-3378"></span></p>
<p>Official channels report that some software giants, including at least one major cloud hosting platform, are compromised. Your suppliers and vendors might be compromised and that affects you, too, even if your systems are safe.</p>
<p>Some steps to take:</p>
<p>1. Remind all of your users that they will likely receive fraudulent email messages that look more realistic than ever. Never enter usernames, passwords, or sensitive data into any forms without checking with your IT Pros first. Never transfer money based on email messages alone.</p>
<p>2. If you receive an email that appears fraudulent, then phone or text the sender to discuss the authenticity. If you email the sender to ask if they sent the first message, a bad actor who compromised their email system will reply to you and say that the original message is safe. Email is less trustworthy than ever, even when you start the conversation.</p>
<p>3. Contact your vendors, suppliers, customers, and anyone you rely upon to ask if they are following this emergency and actively looking for breaches. Ask if they check with their suppliers to require their vigilance too. Assess your risk of one of those entities failing. Have a business continuity plan in place.</p>
<p>4. Many organizations are temporarily disabling SolarWinds. Nobody is sure of the extent of infiltration.</p>
<p>5. Ask your IT pros to implement a two-step login process wherever possible. Reset passwords. Install critical security updates. Restrict account privileges as much as possible. Uninstall all non-essential software. Be hyper-vigilant of anything that appears to be an attack. Our audits and security reviews will help your IT teams secure your systems too.</p>
<p>Rest assured that software giants are working round-the-clock to fight the attackers. The problem is that the attackers had a head start, so they are one step ahead. And, if an organization you rely upon is compromised, it might be too late to stop. The infected organization will need to resolve the problems. They might not realize they are compromised.</p>
<p>The post <a href="https://fosterinstitute.com/the-solarwinds-breach-affects-you-too-ask-your-it-team-to-take-these-steps/">The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Beware: Attackers Buy Top Search Engine Results to Trick You</title>
		<link>https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 16:40:14 +0000</pubDate>
				<category><![CDATA[browser security]]></category>
		<category><![CDATA[Credit Card Security]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[Malicious Advertising]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Website Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3351</guid>

					<description><![CDATA[<p>What seems to be the best way to find a company&#8217;s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site. Here is how the scam works: Suppose you want to look up a company online [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/">Beware: Attackers Buy Top Search Engine Results to Trick You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>What seems to be the best way to find a company&#8217;s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site. <span id="more-3351"></span></p>
<p>Here is how the scam works: Suppose you want to look up a company online named Super Duper, so you type the store&#8217;s name into your favorite search engine. An attacker might have purchased the top result to take you to the website superduperco.com. However, if you knew to scroll down past the paid-for-results, you would have seen that the real website is superduper.com. Attackers set up a website and named it superduperco.com.</p>
<p>Their deceptive site might contain malicious advertising, ask you to enter credit card numbers during checkout, or tempt you to download malicious programs and apps. They might ask you to login or reset a password, and they capture the password you type in.</p>
<p>If you look up a retailer in a search engine, skip past the ads and paid results. Scroll down to see real search results. Even then, be skeptical in case attackers used SEO techniques to appear at the top of the actual search results.</p>
<p>Please forward this to your friends to alert their users that top search engine results can be a trap.</p>
<p>The post <a href="https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/">Beware: Attackers Buy Top Search Engine Results to Trick You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself</title>
		<link>https://fosterinstitute.com/one-nine-year-old-checking-her-email-can-breach-your-entire-organization-and-how-to-protect-yourself/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 07 Oct 2020 08:00:34 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[Remote Worker Security]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3324</guid>

					<description><![CDATA[<p>Workers who use their personal home computers for business put you at significant risk. When another family member shares a work-from-home computer, it magnifies your risk exponentially. If users already work from home using personal home computers, there are potentially cost-free steps to help protect your organization. Consider allowing them to take their work computer [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/one-nine-year-old-checking-her-email-can-breach-your-entire-organization-and-how-to-protect-yourself/">One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Workers who use their personal home computers for business put you at significant risk.<span id="more-3324"></span></p>
<p>When another family member shares a work-from-home computer, it magnifies your risk exponentially. If users already work from home using personal home computers, there are potentially cost-free steps to help protect your organization. Consider allowing them to take their work computer home. If their work computer doesn&#8217;t have wireless access, you can provide an inexpensive USB wireless adapter.</p>
<p>Allow your IT professionals, or IT consultants, to monitor and maintain the security of those computers. Many protection tools support remote users, so you might already have what you need.</p>
<p>Dedicated work computers must remain off-limits to other family members. Set a firm boundary that your workers are not authorized to use the computers for any purpose other than working.</p>
<p>Please forward this to your friends, so they know this cost-free way to help protect work-from-home users.</p>
<p>The post <a href="https://fosterinstitute.com/one-nine-year-old-checking-her-email-can-breach-your-entire-organization-and-how-to-protect-yourself/">One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Your Work From Home Users are Like a Box of Chocolates</title>
		<link>https://fosterinstitute.com/your-work-from-home-users-are-like-a-box-of-chocolates/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 11 Sep 2020 16:37:51 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Remote Worker Security]]></category>
		<category><![CDATA[Remote Workers]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3293</guid>

					<description><![CDATA[<p>Because of so many work from home users, the Internet is like a box of chocolates for attackers. Step 1: Attackers compromise work-from-home users. Step 2: They gain access to their company. Step 3: They bite into the company to discover what&#8217;s inside. There are so many work from home users; this is a target-rich [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/your-work-from-home-users-are-like-a-box-of-chocolates/">Your Work From Home Users are Like a Box of Chocolates</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Because of so many work from home users, the Internet is like a box of chocolates for attackers.<span id="more-3293"></span></p>
<p>Step 1: Attackers compromise work-from-home users.<br />
Step 2: They gain access to their company.<br />
Step 3: They bite into the company to discover what&#8217;s inside.</p>
<p>There are so many work from home users; this is a target-rich environment.</p>
<p>1. You must harden remote users&#8217; systems against attacks. Secure their connections.<br />
2. When possible, issue laptops, so your IT team has more control over your remote users&#8217; security.<br />
3. Implement user training and phish testing. Please say if you&#8217;d like us to provide phish testing and online training for your users. We do all the work so your IT teams can focus on their other tasks.</p>
<p>Please forward this to your friends so they realize their remote users must be more secure than ever, and attackers target them indiscriminately.</p>
<p>The post <a href="https://fosterinstitute.com/your-work-from-home-users-are-like-a-box-of-chocolates/">Your Work From Home Users are Like a Box of Chocolates</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Power Down to Boost Security</title>
		<link>https://fosterinstitute.com/power-down-to-boost-security/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 05 Jun 2020 20:35:40 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3220</guid>

					<description><![CDATA[<p>One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don&#8217;t want to power it down, at least disconnect from your network. You&#8217;ll make your computer less attractive to attackers, and it limits the window during which they can attack. You have [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/power-down-to-boost-security/">Power Down to Boost Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div><span>One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don&#8217;t want to power it down, at least disconnect from your network.</span></div>
<p><span id="more-3220"></span></p>
<p>You&#8217;ll make your computer less attractive to attackers, and it limits the window during which they can attack. You have nothing to lose, and you might even reduce your power bill!</p>
<p>Please forward this to all of your friends, so they know this simple step to protect themselves.</p>
<p>The post <a href="https://fosterinstitute.com/power-down-to-boost-security/">Power Down to Boost Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Remember to Give Your IT Pros a Holiday Gift</title>
		<link>https://fosterinstitute.com/remember-to-give-your-it-pros-a-holiday-gift/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 17 Dec 2019 08:00:30 +0000</pubDate>
				<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[Working with IT]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3019</guid>

					<description><![CDATA[<p>Your IT Team pours out so much time and energy. If you aren’t already, you can brighten their holidays by giving them a gift. The work they do is often so complicated, yet they make it look easy. Unless you are a high-tech executive, it can be difficult to appreciate how sometimes your team accomplishes [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/remember-to-give-your-it-pros-a-holiday-gift/">Remember to Give Your IT Pros a Holiday Gift</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Your IT Team pours out so much time and energy. If you aren’t already, you can brighten their holidays by giving them a gift.</p>
<p>The work they do is often so complicated, yet they make it look easy. Unless you are a high-tech executive, it can be difficult to appreciate how sometimes your team accomplishes a miracle. </p>
<p>In some organizations, the only time the IT team gets noticed is when something technology-related stops functioning correctly.</p>
<p>IT pros, by nature, need to invest more than 40 hours a week to keep up with rapidly changing technology. That doesn’t include responses to the helpdesk crises and completing the projects assigned to them.</p>
<p>Executives reading this newsletter already feel compassion for and support their IT teams. But just in case you know an executive who doesn’t, or the gift slipped their mind, please forward this message to them.  And why not add an IT Appreciation Day to company calendars?</p>
<p>Happy Holidays – and you deserve a bunch of credit too!</p>
<p>The post <a href="https://fosterinstitute.com/remember-to-give-your-it-pros-a-holiday-gift/">Remember to Give Your IT Pros a Holiday Gift</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Huge Data Leak Exposed Your Personal Information</title>
		<link>https://fosterinstitute.com/a-huge-data-leak-exposed-your-personal-information/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 04 Dec 2019 22:38:41 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3008</guid>

					<description><![CDATA[<p>The most massive data leak that&#8217;s ever happened includes neatly bundled information for more than 1 billion people. Keep in mind that the estimated population of the United States is only 330 million. If you use email, you are probably exposed. The leak exposed a tremendous amount of information about you, your personal and work [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/a-huge-data-leak-exposed-your-personal-information/">A Huge Data Leak Exposed Your Personal Information</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The most massive data leak that&#8217;s ever happened includes neatly bundled information for more than 1 billion people. Keep in mind that the estimated population of the United States is only 330 million. If you use email, you are probably exposed.<span id="more-3008"></span></p>
<p>The leak exposed a tremendous amount of information about you, your personal and work history, your interests and hobbies, current and past contact information, and more all gathered and stored in one package. If someone knows your email address, they could immediately know your birthdate if you ever entered that date into a social media profile.</p>
<p>The data might also include your religion, financial information, members of your family, buying preferences, and more. It is alarming that your information is now more readily available than ever. Even more disturbing is that interested parties can access your data all in one place. Do you read the privacy policies when you install applications or sign up for services? You often agree that they can share some or all of your information with third parties. Those third parties may be data aggregation companies, called enrichment companies. This leak&#8217;s source was an Elasticsearch server. It contained data from two data enrichment servers called People Data Labs and OxyData.</p>
<p>What should you do? Now, more than ever, watch for fraudulent messages that seem very legitimate. Consider an example if your data set includes your phone provider. Social engineers might pretend to be your phone provider. They will demonstrate that they know real towns where you&#8217;ve lived. They’ll add legitimacy by including your accurate birthdate, one of your hobbies, and potentially your credit history. On the flip side, people that have your information can impersonate you to organizations. They might reset a password or change your listed email address so they can access your protected accounts. They might be more successful at tricking your relatives and friends into clicking a link because they’ll recognize personal details.</p>
<p>Use different passwords at different websites. Enable two-step verification as suggested and described in prior newsletters. Warn your friends that they must be more vigilant than ever for frauds and scams, even when the contact seems to know all about them.</p>
<p><!--more--></p>
<p>The post <a href="https://fosterinstitute.com/a-huge-data-leak-exposed-your-personal-information/">A Huge Data Leak Exposed Your Personal Information</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>773 Million Passwords Exposed &#8211; Were You Exposed?</title>
		<link>https://fosterinstitute.com/773-million-passwords-exposed-were-you-exposed/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 17 Jan 2019 23:22:23 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Password Manager]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Hardware Key]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Modlishka]]></category>
		<category><![CDATA[password code]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[two step verification]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2699</guid>

					<description><![CDATA[<p>Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords that have shown up on the dark web over the past two or three years. Think of Collection #1 as being a value pack of bundled old password lists. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/773-million-passwords-exposed-were-you-exposed/">773 Million Passwords Exposed &#8211; Were You Exposed?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords<br />
<span id="more-2897"></span><br />
that have shown up on the dark web over the past two or three years. Think of Collection #1 as being a value pack of bundled old password lists.</p>
<p>If you want to find out if your passwords were released, visit his site called <a href="https://haveibeenpwned.com">https://haveibeenpwned.com</a>. If you elect to enter your email address, he will tell you if it is in the collection and give you more details.</p>
<p>What do you do if you are on the list? Reset your passwords. Use a password manager that will remember your passwords for you to make your life easier when you use a different password at each website from now on.</p>
<p>Now is a great time to enable two-step verification. A basic form of two-step verification is when you enter a username and password, and you receive a text message code to type in. Enable two-step verification on PayPal, LinkedIn, Dropbox, Facebook and every other web service you use. On each website, look for Settings &gt; Security. You may need to dig down, but more reputable sites now support two-step verification, but you must enable the feature.</p>
<p>Some bad news is that, about a week ago, a tool called Modlishka shows how to break two-step verification so it isn&#8217;t that secure, but two-step verification is still more secure than a simple username password combination. If it allows, have a website use some other method than texting you a password. Using an app on your phone or calling you via a voice call are options that are often more secure than the text message. Microsoft, Google, and a service called Duo offer these options and more. Having a hardware key is even better unless your laptop users leave the key stored in the laptop case, and their password written on the bottom of the laptop.</p>
<p>The post <a href="https://fosterinstitute.com/773-million-passwords-exposed-were-you-exposed/">773 Million Passwords Exposed &#8211; Were You Exposed?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Happy Computer Security Day!</title>
		<link>https://fosterinstitute.com/happy-computer-security-day/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 30 Nov 2018 19:11:36 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Computer Security Day]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2689</guid>

					<description><![CDATA[<p>November 30th is Computer Security Day. Today is a great day to remind your team members to continue to be extra vigilant as they watch for spam email messages.  Encourage and provide time to your team to keep your systems up to date with all critical security patches for operating systems, Office, browsers, Flash, Java, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/happy-computer-security-day/">Happy Computer Security Day!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>November 30th is Computer Security Day. Today is a great day to remind your team members to continue to be extra vigilant as they watch for spam email messages. <span id="more-2895"></span></p>
<p>Encourage and provide time to your team to keep your systems up to date with all critical security patches for operating systems, Office, browsers, Flash, Java, and Reader. Ask them to show you a list, not a pie chart, of missing critical security patches. If they haven’t checked lately, this is an excellent time for them to be sure the firmware is up-to-date in the firewall and other infrastructure devices.</p>
<p>Thank you for all you are doing to protect against ransomware and all types of cyber threats. You are helping make the world a safer place to live and work!</p>
<p>The post <a href="https://fosterinstitute.com/happy-computer-security-day/">Happy Computer Security Day!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
