<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>it security expert Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/it-security-expert/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/it-security-expert/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Sun, 23 Jul 2023 01:59:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>it security expert Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/it-security-expert/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What to Do if Someone Hacks Your Email Account</title>
		<link>https://fosterinstitute.com/what-to-do-if-someone-hacks-your-email-account/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 21 Jul 2023 16:10:06 +0000</pubDate>
				<category><![CDATA[Email]]></category>
		<category><![CDATA[Hacked Email]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Email Hacking]]></category>
		<category><![CDATA[Email Password]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[Security Patches]]></category>
		<category><![CDATA[two-step authentication]]></category>
		<category><![CDATA[Unauthorized Spammer]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2914</guid>

					<description><![CDATA[<p>How to protect yourself if, or even before, an unauthorized spammer uses one of your email accounts to send out spam: If you have cybersecurity insurance or feel this incident could cause significant damage, consider having a forensic analysis to track down what happened. Contact your email provider, explain what happened, and ask for help. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/what-to-do-if-someone-hacks-your-email-account/">What to Do if Someone Hacks Your Email Account</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>How to protect yourself if, or even before, an unauthorized spammer uses one of your email accounts to send out spam:<span id="more-2914"></span></p>
<p>If you have cybersecurity insurance or feel this incident could cause significant damage, consider having a forensic analysis to track down what happened.</p>
<p>Contact your email provider, explain what happened, and ask for help. Continue down this list while you wait for their response.</p>
<p>Reset your email account password immediately. If you can&#8217;t log in because someone unauthorized reset your password, try resetting it yourself. If that doesn&#8217;t work, contact your email company&#8217;s tech support.</p>
<p>Check if your username and old passwords have appeared on the dark web. Visit <a href="https://haveibeenpwned.com/" target="_blank" rel="noopener">https://haveibeenpwned.com/</a> and similar sites to find out. Never enter your password.</p>
<p>Change passwords for all your accounts including social media, banking, and other sensitive accounts, especially if you&#8217;ve used the same password for multiple accounts. Someone may have access to more than just your email.</p>
<p>Consider using a password manager like 1Password, Dashlane, LastPass, NordPass or another to help ease the pain of having different passwords on every website from now on.</p>
<p>When setting up security questions, avoid real answers that are easy for a bad actor to research. When asked, &#8220;Where were you born,&#8221; you could answer something like, &#8220;The fourth crater on the moon.&#8221; Save your secret answers in a file in a random place with a random name like &#8220;socks.docx&#8221; for when you need the answers. You can encrypt the file for added safety.</p>
<p>Enable two-step verification for your email account. While you are at it, set up two-step verification everywhere you can, primarily on sensitive websites and services. Here is how to add MFA to your LinkedIn account for added security <a href="https://www.linkedin.com/help/linkedin/answer/544/turning-two-step-verification-on-and-off?lang=en" target="_blank" rel="noopener">https://www.linkedin.com/help/linkedin/answer/544/turning-two-step-verification-on-and-off?lang=en</a></p>
<p>If you set up two step authentication so that the site or service sends you an email message for the second part of logging in, and the hacker has access your email, it defeats the purpose of MFA. Therefore, if you set up the two-step login with email as the second step, use a different secure email address.</p>
<p>Review your email&#8217;s &#8220;sent&#8221; folder to spot any unrecognized messages.</p>
<p>Look at all your email accounts in your organization to ensure there are no email forwarding or filtering rules you did not configure.</p>
<p>Check your websites, especially LinkedIn, for any unauthorized changes.</p>
<p>Set up SPF and DKIM. More information here: <a href="https://fosterinstitute.com/block-inbound-and-outbound-fraudulent-email-messages/" target="_blank" rel="noopener">https://fosterinstitute.com/block-inbound-and-outbound-fraudulent-email-messages/</a></p>
<p>Watch out for remote control applications that might allow a bad actor to compromise your computer and send email messages as you.</p>
<p>Be aware that your computer or another computer in your organization might be hacked, enabling attackers to send messages on your behalf. Stay vigilant and take measures to protect against such incidents.</p>
<p>Regularly apply critical security patches to your computer. You can check for updates manually, even if automatic updates are enabled.</p>
<p>Ensure your anti-virus program is current and run a manual scan regularly. Using EDR or XDR services add more security.</p>
<p>If you use a browser to send and receive email, this is a drastic step, but consider uninstalling the browser. When you reinstall the browser, add only the plugins you need.</p>
<p>If you use your phone or tablet for email, they could be hacked. Apply security patches, keep them in your possession, examine the privacy settings, and lock devices when not in use.</p>
<p>Watch out for apps on your computer, tablet, or phone that may be harvesting your address book without your knowledge. A drastic move would be to factory reset and erase them, but be sure your important data is stored in the cloud or backed up.</p>
<p>Notify financial institutions that if they receive messages from you, the messages could be fraudulent.</p>
<p>You might want to set up a new email address to use until you feel confident your old address is safe.</p>
<p>If you haven&#8217;t already, freeze your credit.</p>
<p>Monitor your financial accounts.</p>
<p>Before you send out notifications, you will want to talk to an advisor who can help you know what to say.</p>
<p>Please forward this to your friends so that, if someone appears to hack their email account, they will know what to do to.</p>
<p>Subscribe to maximize your executive potential with Foster Institute&#8217;s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>The post <a href="https://fosterinstitute.com/what-to-do-if-someone-hacks-your-email-account/">What to Do if Someone Hacks Your Email Account</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Battery Backup for Your Work from Home Users’ Internet and Computers for Power Outages</title>
		<link>https://fosterinstitute.com/essential-equipment-for-work-from-home-users-during-power-outages/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 07 Jul 2022 08:34:02 +0000</pubDate>
				<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3449</guid>

					<description><![CDATA[<p>Assuming your remote workers’ temperature is ok, they can continue to work at home during short power outages. You can encourage them to buy, or even issue them, a small uninterruptable power supply UPS for their Internet router. Laptops have built-in battery power. If a worker has a desktop computer or other networking equipment, those [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/essential-equipment-for-work-from-home-users-during-power-outages/">Battery Backup for Your Work from Home Users’ Internet and Computers for Power Outages</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Assuming your remote workers’ temperature is ok, they can continue to work at home during short power outages.</p>
<p>You can encourage them to buy, or even issue them, a small uninterruptable power supply UPS for their Internet router. Laptops have built-in battery power. If a worker has a desktop computer or other networking equipment, those devices must be on a more powerful battery backup.</p>
<p>If you are comparing unit run times, watts are usually a better comparison than VA. A 500W UPS, around one hundred dollars, will probably run an Internet router for between one and two hours. You can ask your IT Pro if you want more details and find out their favorite brand name. APC, Tripp Lite, and CyberPower are popular brands. (The Foster Institute does not receive any compensation for mentioning brands, nor is this an endorsement of the brands. You might find it helpful to know what products our clients find useful).</p>
<p>Please forward this to your friends who might benefit if their workers stay connected during a power outage.</p>
<p>The post <a href="https://fosterinstitute.com/essential-equipment-for-work-from-home-users-during-power-outages/">Battery Backup for Your Work from Home Users’ Internet and Computers for Power Outages</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>If You Get Hacked, Do Not Email Anyone About It</title>
		<link>https://fosterinstitute.com/if-you-get-hacked-do-not-email-anyone-about-it/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 15 Oct 2020 21:17:38 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3329</guid>

					<description><![CDATA[<p>You&#8217;ve trained your users to be vigilant for symptoms of cybersecurity issues. Now teach them to share their concerns confidentially. Alert your users today: Tell them to, if they suspect something, avoid opening a support ticket or emailing your IT professionals about the concern. More often than ever before, bad actors infiltrate organizations in a [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/if-you-get-hacked-do-not-email-anyone-about-it/">If You Get Hacked, Do Not Email Anyone About It</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You&#8217;ve trained your users to be vigilant for symptoms of cybersecurity issues. Now teach them to share their concerns confidentially.<span id="more-3329"></span><br />
Alert your users today: Tell them to, if they suspect something, avoid opening a support ticket or emailing your IT professionals about the concern.</p>
<p>More often than ever before, bad actors infiltrate organizations in a slow, methodical way. They can remain undetected for weeks, months, even years. The FBI uses the term dwell time to designate the period from when attackers infiltrate systems until you discover them. The FBI warns businesses that attackers can cause significant damage during dwell time. Bad actors quickly establish backdoors to ensure access, even if you block their first point of entry. They deploy keyloggers on systems to record keystrokes. If your cyber assets are compromised, the bad actors can potentially monitor your messages to find out when you discover their presence in your network, computers, applications, cloud resources, websites, or anywhere else.</p>
<p>Once attackers know you&#8217;ve discovered their infiltration, that triggers them to move forward with their next phase, often contacting you to demand a ransom. Sometimes they threaten severe consequences if you attempt to recover your system in any other way than paying them. Since they are in your systems, you must take the threats seriously.</p>
<p>Establish a protocol for workers to communicate suspicions in some method other than email.</p>
<p>Even your IT department must avoid emailing each other questions such as, &#8220;I received an alert that someone is resetting an administrator password. That&#8217;s odd. Is that you?&#8221; Instead, they must communicate by mobile phone or radio.</p>
<p>If you suspect a breach and contact us, consider phoning. If you must email, use a personal account outside of your company account, and use a phone or some device other than a company computer&#8217;s keyboard to send the message.</p>
<p>I’m not talking about when users receive a phishing message. I’m talking about if they receive a phishing message that includes customer account information, if an important file is missing or won’t open, or if they receive an unexpected login request on a website or to open a file. IT needs to investigate these early-warning signs.</p>
<p>Please forward this to other executives who you care about to establish a mobile hotline number for users to reach the IT team to report suspicious activity. Help avoid triggering attackers’ responses before your IT team has time to react and, hopefully, mitigate a potential cybersecurity disaster.</p>
<p>The post <a href="https://fosterinstitute.com/if-you-get-hacked-do-not-email-anyone-about-it/">If You Get Hacked, Do Not Email Anyone About It</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Be Smart and Avoid This Comforting Belief</title>
		<link>https://fosterinstitute.com/be-smart-and-avoid-this-comforting-belief/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 02 Oct 2020 20:03:41 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3322</guid>

					<description><![CDATA[<p>Someone told me today, as is common: Attackers are only interested in hacking large businesses. Believing that small to mid-size businesses are not targets helps business owners and executives sleep better at night. The thought is comforting. However, the reality is that instead of choosing targets based on organization size, the majority of attackers choose [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/be-smart-and-avoid-this-comforting-belief/">Be Smart and Avoid This Comforting Belief</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Someone told me today, as is common: Attackers are only interested in hacking large businesses.<span id="more-3322"></span></p>
<p>Believing that small to mid-size businesses are not targets helps business owners and executives sleep better at night. The thought is comforting.</p>
<p>However, the reality is that instead of choosing targets based on organization size, the majority of attackers choose soft, easy to breach, targets. In particular, that category includes work-from-home computers.</p>
<p>In our consulting business, we&#8217;re seeing many firms suffer major breaches that originate at an unsuspecting work-from-home user&#8217;s computer.</p>
<p>Please forward this to your friends so they know that it may feel comforting to believe attackers only go after the big companies, that belief is putting their organization at tremendous risk.</p>
<p>The post <a href="https://fosterinstitute.com/be-smart-and-avoid-this-comforting-belief/">Be Smart and Avoid This Comforting Belief</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Hacker Profile &#8211; Who Are They?</title>
		<link>https://fosterinstitute.com/a-hacker-profile-who-are-they/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 24 Sep 2020 16:58:42 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3316</guid>

					<description><![CDATA[<p>I experienced a presentation by the US Secret Service last week, and they provided the common background they&#8217;ve identified in attackers: They may be married and have a family Introverted with a close group of friends Often learned to program at a young age College educated, often in electronics, IT, or physics No social media [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/a-hacker-profile-who-are-they/">A Hacker Profile &#8211; Who Are They?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I experienced a presentation by the US Secret Service last week, and they provided the common background they&#8217;ve identified in attackers: <span id="more-3316"></span></p>
<ul>
<li>They may be married and have a family</li>
<li>Introverted with a close group of friends</li>
<li>Often learned to program at a young age</li>
<li>College educated, often in electronics, IT, or physics</li>
<li>No social media accounts &#8211; to avoid drawing attention</li>
<li>Believe that soft drugs, such as marijuana, help them work</li>
</ul>
<p>Notice that the Secret Service doesn&#8217;t specify a gender.</p>
<p>Please forward this to your friends, so they know their adversaries a little bit better.</p>
<p>The post <a href="https://fosterinstitute.com/a-hacker-profile-who-are-they/">A Hacker Profile &#8211; Who Are They?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Your Work From Home Users are Like a Box of Chocolates</title>
		<link>https://fosterinstitute.com/your-work-from-home-users-are-like-a-box-of-chocolates/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 11 Sep 2020 16:37:51 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Remote Worker Security]]></category>
		<category><![CDATA[Remote Workers]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3293</guid>

					<description><![CDATA[<p>Because of so many work from home users, the Internet is like a box of chocolates for attackers. Step 1: Attackers compromise work-from-home users. Step 2: They gain access to their company. Step 3: They bite into the company to discover what&#8217;s inside. There are so many work from home users; this is a target-rich [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/your-work-from-home-users-are-like-a-box-of-chocolates/">Your Work From Home Users are Like a Box of Chocolates</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Because of so many work from home users, the Internet is like a box of chocolates for attackers.<span id="more-3293"></span></p>
<p>Step 1: Attackers compromise work-from-home users.<br />
Step 2: They gain access to their company.<br />
Step 3: They bite into the company to discover what&#8217;s inside.</p>
<p>There are so many work from home users; this is a target-rich environment.</p>
<p>1. You must harden remote users&#8217; systems against attacks. Secure their connections.<br />
2. When possible, issue laptops, so your IT team has more control over your remote users&#8217; security.<br />
3. Implement user training and phish testing. Please say if you&#8217;d like us to provide phish testing and online training for your users. We do all the work so your IT teams can focus on their other tasks.</p>
<p>Please forward this to your friends so they realize their remote users must be more secure than ever, and attackers target them indiscriminately.</p>
<p>The post <a href="https://fosterinstitute.com/your-work-from-home-users-are-like-a-box-of-chocolates/">Your Work From Home Users are Like a Box of Chocolates</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zoom Security Issues &#8211; Protect Yourself</title>
		<link>https://fosterinstitute.com/zoom-security-issues-protect-yourself/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 07 Apr 2020 23:03:01 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Video Meeting Security]]></category>
		<category><![CDATA[Zoom]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3081</guid>

					<description><![CDATA[<p>Every business is concerned and should be, about cybersecurity during online meetings. Due to its popularity, Zoom is an attractive target for the bad actors. There are hundreds, maybe more, people working all the time to break Zoom&#8217;s security. To help address the security problems, Zoom now offers a reward for anyone who finds a [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/zoom-security-issues-protect-yourself/">Zoom Security Issues &#8211; Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Every business is concerned and should be, about cybersecurity during online meetings. Due to its popularity, Zoom is an attractive target for the bad actors. There are hundreds, maybe more, people working all the time to break Zoom&#8217;s security. <span id="more-3081"></span></p>
<p><iframe title="Zoom Security Issues - Protect Yourself" src="https://player.vimeo.com/video/405210252?dnt=1&amp;app_id=122963" width="384" height="240" frameborder="0" allow="autoplay; fullscreen" allowfullscreen></iframe></p>
<p>To help address the security problems, Zoom now offers a reward for anyone who finds a way to break in. The payoff, for bad actors and researchers, is enormous. A sobering thought is that maybe the attackers already have full control over Zoom. However, they might have complete control over GoToMeeting, Microsoft Teams, Skype, TeamViewer, WebEx, and any other virtual meeting platform. I certainly hope not.</p>
<h2>Zoom is Making Improvements</h2>
<p>Zoom says they&#8217;ve configured the system to avoid sending meetings through China&#8217;s servers. Otherwise, the Chinese government might require disclosure of your communications.</p>
<p>If you use Zoom on a Mac, then if a bad actor has your computer, they could take over your camera and microphone. Additionally, Zoom exposed information that could reveal Windows passwords. Zoom says they fixed those problems.</p>
<p>After Consumer Reports raised red flags, Zoom improved its privacy policy and practices. Zoom still has problems. A notable issue is that there is no end-to-end encryption during meetings. Security best practices dictate protection from each participant to every other.</p>
<h2>You and Other Companies can Help Protect Meetings</h2>
<p>For example, if you permit your users to record the meeting, encourage them to password protect the recordings, especially if they upload them to a cloud storage service. Otherwise, anyone with access to the recording can play it back.</p>
<p>Require passwords and require waiting rooms per new default settings. The goal is to stop intruders from interrupting a Zoom meeting with disruptive or disgusting content.</p>
<p>Configure the meeting so that only the host can share their screen. Then intruders cannot share theirs.</p>
<p>Never use a personal meeting room ID for scheduling meetings. Use the default setting to generate a meeting ID randomly.</p>
<p>Alert users to expect fraudulent email meeting invitations attempting to trick users into typing their Zoom username and password.</p>
<p>Enable two-step login requirements to protect accounts even if a bad actor does discover usernames and passwords.</p>
<p>Or, you could ditch Zoom all together. Options include FaceTime, Signal, Teams, and many others. But who knows which one could get hacked? No matter how secure it is, all it takes to destroy security is for one person on the call, or an attacker with remote access to their computer, to record the conversation using third party screen recording software.</p>
<p>To help protect your Zoom meetings, watch other videos that concisely cover the security settings available in a paid Zoom account, configuring the two-step login feature, and a run-through of paid account settings so you can follow along:</p>
<p><a href="https://fosterinstitute.com/?p=3094&amp;preview=true" target="_blank" rel="noopener noreferrer">Zoom Security &#8211; Set Up Two-Step Login</a></p>
<p><a href="https://fosterinstitute.com/?p=3099&amp;preview=true" target="_blank" rel="noopener noreferrer">Zoom Security Settings &#8211; The Concise Details</a></p>
<p><a href="https://fosterinstitute.com/blog/follow-along-to-set-zoom-security-settings/" target="_blank" rel="noopener noreferrer">Zoom Security &#8211; Follow Along to Set Settings</a></p>
<p>The post <a href="https://fosterinstitute.com/zoom-security-issues-protect-yourself/">Zoom Security Issues &#8211; Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Make your Zoom Secure</title>
		<link>https://fosterinstitute.com/make-your-zoom-secure/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 02 Apr 2020 20:55:51 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Remote Workers]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Zoom]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[cyber security speaker]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[remote worker security]]></category>
		<category><![CDATA[Zoom Safety]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3067</guid>

					<description><![CDATA[<p>Tomorrow (Friday) morning, expect a completed guide that is quick for you to implement to lock down your Zoom security. Get started now on a few settings: To help prevent an attacker logging into your Zoom account, enable two-step login. Once activated, then when you log in, you&#8217;ll enter your password along with a separate [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/make-your-zoom-secure/">Make your Zoom Secure</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Tomorrow (Friday) morning, expect a completed guide that is quick for you to implement to lock down your Zoom security. Get started now on a few settings:<span id="more-3067"></span></p>
<p>To help prevent an attacker logging into your Zoom account, enable two-step login. Once activated, then when you log in, you&#8217;ll enter your password along with a separate numerical code. Rather than sending the code as a text message, Zoom uses a more secure approach and requires you to use a passcode generator app. To configure two-step login, go into your account settings. Scroll down until you see the word Admin in the left-hand column, click on Advanced and then click the security option. Scroll down the main window until you see Sign in with Two-Factor Authentication. Enable the option. Sign out of Zoom and sign back in to complete the installation. Follow the prompts to associate your authentication app with Zoom.</p>
<p>When you schedule a meeting, for Meeting ID setting, select Generate Automatically. I&#8217;ll explain why soon, know that you need to keep your Personal Meeting ID private except for a few people you trust.</p>
<p>Zoom permits you to choose whether or not to require passwords for your meetings. In most cases, you should require a password. As long as someone gets the meeting notice you send them, they won&#8217;t even need the password because the password gets imbedded into the meeting invitation. However, embedding the passphrase inside the invitation exposes you to a risk. If an unauthorized person obtains the invitation, they too can authenticate to your meeting without needing to know the password.</p>
<p>One of the best security features is a tool called Waiting Room. Tomorrow’s tool will show how to set it up quickly. Be sure to sign up for our newsletter to receive the links for a powerful experience tomorrow and a concise video on Monday morning.</p>
<p>The post <a href="https://fosterinstitute.com/make-your-zoom-secure/">Make your Zoom Secure</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Alert Your Team &#8211; USB Devices, Login Prompts, and Apps</title>
		<link>https://fosterinstitute.com/alert-your-team-usb-devices-login-prompts-and-apps/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 27 Mar 2020 20:56:16 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[recommendations]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3065</guid>

					<description><![CDATA[<p>Warn your users about three ways attackers continue to exploit the COVID-19 crisis: USB: A new ploy is bad actors mailing USB devices, appearing to be from your company to your users. Once plugged in, they can open up a channel that permits unauthorized remote control and capturing keystrokes, including passwords. Fake Login Prompts: Remind [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/alert-your-team-usb-devices-login-prompts-and-apps/">Alert Your Team &#8211; USB Devices, Login Prompts, and Apps</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Warn your users about three ways attackers continue to exploit the COVID-19 crisis:<span id="more-3065"></span></p>
<p>USB: A new ploy is bad actors mailing USB devices, appearing to be from your company to your users. Once plugged in, they can open up a channel that permits unauthorized remote control and capturing keystrokes, including passwords.</p>
<p>Fake Login Prompts: Remind your users to beware of login screens when they don&#8217;t expect them. Attackers create persuasive prompts that ask your users passwords for their logon, VPN, or Microsoft Office 365 login, and more. Sometimes the windows tell the user that their connection dropped, and to provide credentials to reestablish their link. Your Users must ignore those prompts and notify your IT team immediately.</p>
<p>Fraudulent websites and apps: Sites may have useful coronavirus information, but they also contain malicious attack software that strives to infect computers. Attackers create bad apps offering online statistics, tracking of the virus spread, and more.</p>
<p>Please forward this to your friends so they can alert their users too.</p>
<p>The post <a href="https://fosterinstitute.com/alert-your-team-usb-devices-login-prompts-and-apps/">Alert Your Team &#8211; USB Devices, Login Prompts, and Apps</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Plan Now for Slow Internet and Dropped Phone Calls</title>
		<link>https://fosterinstitute.com/plan-now-for-slow-internet-and-dropped-phone-calls/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 20 Mar 2020 20:01:55 +0000</pubDate>
				<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Remote Worker]]></category>
		<category><![CDATA[Slow Internet]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3061</guid>

					<description><![CDATA[<p>Prepare now for slow Internet speeds and dropped mobile phone calls. Some customers report that their remote workers experience slow Internet speeds. The sheer number of people working from home, and others watching videos at home, is causing the Internet to experience slowdowns similar to traffic during rush hour. You may have heard that Netflix [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/plan-now-for-slow-internet-and-dropped-phone-calls/">Plan Now for Slow Internet and Dropped Phone Calls</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Prepare now for slow Internet speeds and dropped mobile phone calls. Some customers report that their remote workers experience slow Internet speeds. The sheer number of people working from home, and others watching videos at home, is causing the Internet to experience slowdowns similar to traffic during rush hour.<span id="more-3061"></span></p>
<p>You may have heard that Netflix agreed to reduce the picture quality of movies in the UK to reduce the load on the Internet. What&#8217;s that have to do with your company? Prepare a contingency plan now. Something easy to change is to instruct your workers to ask their family members to please download their movies at night rather than streaming the videos during work hours. That way, their family can watch their downloaded movies during the daytime without using up your workers&#8217; remote network speed.</p>
<p>If your remote workers use VPN connections, and they experience slow speeds, your IT team can enable something called split tunneling. Then, if they aren&#8217;t already, your workers&#8217; computers take a shortcut directly to the Internet without going a long way around through your primary office location&#8217;s firewall first. That trades speed for security, so executives have to make the decision, but the change might be worth it if your workers cannot work otherwise. There are other strategies too. Know that recorded video and audio conference calls will make it through even when a real-time conference is so slow it fails.</p>
<p>Other customers explain that the cellular towers in their area are so overloaded that phone calls get dropped, and voices are sometimes garbled beyond understandability. That&#8217;s when text messages, though less convenient, will be your plan B. At least text messages will usually go through even with weak or slow connections.</p>
<p>Please forward this message to your friends so they can have a plan in place at their company in case an Internet or cell phone traffic jam interferes with their business.</p>
<p>The post <a href="https://fosterinstitute.com/plan-now-for-slow-internet-and-dropped-phone-calls/">Plan Now for Slow Internet and Dropped Phone Calls</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
