<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IT security procedures Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/it-security-procedures/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/it-security-procedures/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Thu, 17 Jan 2019 23:22:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>IT security procedures Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/it-security-procedures/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>773 Million Passwords Exposed &#8211; Were You Exposed?</title>
		<link>https://fosterinstitute.com/773-million-passwords-exposed-were-you-exposed/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 17 Jan 2019 23:22:23 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Password Manager]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Hardware Key]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Modlishka]]></category>
		<category><![CDATA[password code]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[two step verification]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2699</guid>

					<description><![CDATA[<p>Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords that have shown up on the dark web over the past two or three years. Think of Collection #1 as being a value pack of bundled old password lists. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/773-million-passwords-exposed-were-you-exposed/">773 Million Passwords Exposed &#8211; Were You Exposed?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords<br />
<span id="more-2897"></span><br />
that have shown up on the dark web over the past two or three years. Think of Collection #1 as being a value pack of bundled old password lists.</p>
<p>If you want to find out if your passwords were released, visit his site called <a href="https://haveibeenpwned.com">https://haveibeenpwned.com</a>. If you elect to enter your email address, he will tell you if it is in the collection and give you more details.</p>
<p>What do you do if you are on the list? Reset your passwords. Use a password manager that will remember your passwords for you to make your life easier when you use a different password at each website from now on.</p>
<p>Now is a great time to enable two-step verification. A basic form of two-step verification is when you enter a username and password, and you receive a text message code to type in. Enable two-step verification on PayPal, LinkedIn, Dropbox, Facebook and every other web service you use. On each website, look for Settings &gt; Security. You may need to dig down, but more reputable sites now support two-step verification, but you must enable the feature.</p>
<p>Some bad news is that, about a week ago, a tool called Modlishka shows how to break two-step verification so it isn&#8217;t that secure, but two-step verification is still more secure than a simple username password combination. If it allows, have a website use some other method than texting you a password. Using an app on your phone or calling you via a voice call are options that are often more secure than the text message. Microsoft, Google, and a service called Duo offer these options and more. Having a hardware key is even better unless your laptop users leave the key stored in the laptop case, and their password written on the bottom of the laptop.</p>
<p>The post <a href="https://fosterinstitute.com/773-million-passwords-exposed-were-you-exposed/">773 Million Passwords Exposed &#8211; Were You Exposed?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Happy Computer Security Day!</title>
		<link>https://fosterinstitute.com/happy-computer-security-day/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 30 Nov 2018 19:11:36 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Computer Security Day]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2689</guid>

					<description><![CDATA[<p>November 30th is Computer Security Day. Today is a great day to remind your team members to continue to be extra vigilant as they watch for spam email messages.  Encourage and provide time to your team to keep your systems up to date with all critical security patches for operating systems, Office, browsers, Flash, Java, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/happy-computer-security-day/">Happy Computer Security Day!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>November 30th is Computer Security Day. Today is a great day to remind your team members to continue to be extra vigilant as they watch for spam email messages. <span id="more-2895"></span></p>
<p>Encourage and provide time to your team to keep your systems up to date with all critical security patches for operating systems, Office, browsers, Flash, Java, and Reader. Ask them to show you a list, not a pie chart, of missing critical security patches. If they haven’t checked lately, this is an excellent time for them to be sure the firmware is up-to-date in the firewall and other infrastructure devices.</p>
<p>Thank you for all you are doing to protect against ransomware and all types of cyber threats. You are helping make the world a safer place to live and work!</p>
<p>The post <a href="https://fosterinstitute.com/happy-computer-security-day/">Happy Computer Security Day!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>You Might Stop Receiving Essential Email Messages, and What to Do About It</title>
		<link>https://fosterinstitute.com/you-might-stop-receiving-essential-email-messages-and-what-to-do-about-it/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 09 Nov 2018 17:16:56 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Email Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[online impersonators]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2684</guid>

					<description><![CDATA[<p>If someone ever impersonates you via email, you may stop receiving legitimate email messages too. Computers belonging to people who received a fake email message may automatically send all new messages to the phony address instead of yours. Senders don’t realize what is happening, and you stop receiving essential email messages. Consider Nick. One day, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/you-might-stop-receiving-essential-email-messages-and-what-to-do-about-it/">You Might Stop Receiving Essential Email Messages, and What to Do About It</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If someone ever impersonates you via email, you may stop receiving legitimate email messages too. Computers belonging to people who received a fake email message may automatically send all new messages to the phony address instead of yours. Senders don’t realize what is happening, and you stop receiving essential email messages.<span id="more-2894"></span><br />
Consider Nick. One day, one of his friends notified him that they received an email message that appeared to be from Nick saying he was in a predicament and wants them to send money. Of course, Nick did not send the message. Someone is impersonating him! The recipient was aware enough to realize the request for payment was counterfeit.</p>
<p>Then, the unexpected happened. Some of Nick’s business associates, customers, and friends complained, “Hey Nick – Why haven’t you replied to that email message I sent you last week?” His associate named Tony felt snubbed because Nick stopped replying to his messages. Nick had no idea Tony was sending messages because Nick never received any of them.</p>
<p>The cause of this problem is that, unbeknownst to most people, when a bad actor sent the fake email with a made up email address, the recipient’s computer stores the phony email address to be used in the future to auto-fill the &#8220;To:&#8221; address field.</p>
<p>Check your computer. When you start to compose an email message and begin typing the name of the person to whom you are sending the message, does their name show up automatically on a list before you finish typing?</p>
<p>A bad actor might have impersonated you by spoofing your email address with a fake one: Nick Stark &lt;Nich0las @yahoo.com&gt;. But your real email address may be Nick Stark &lt;NStark @yourcompany.com&gt;. While your name is the same, the addresses are different.</p>
<p>From now on, when someone sends an email to you, their address book will auto-fill “Nick Stark” as they type your name into the “To” box in the email message. Unless they pay special attention, their email program may send the email message to the fraudulent email address. You will not receive the email, and the sender expects that you will.</p>
<p>One way you can solve this is to alert people that, when they send you an email message, to verify that, as they fill in your name as the recipient, the email address that shows up is Nstark @yourcompany.com. If they see your name with the wrong email address in their auto-fill list, they should click the option to delete the record with the fake address.</p>
<p>If you have ever been the victim of spoofed email messages sent in your name, you should notify your contacts. If people complain that you do not receive email messages they send you, you should advise your contacts as well.</p>
<p>The auto-fill feature is helpful when sending email messages, but it can come back to bite you if an attacker ever impersonates you in an email message.</p>
<p>Send this message to your friends, especially if anyone ever fakes their email address, so they can help ensure that they receive legitimate email messages.</p>
<p>The post <a href="https://fosterinstitute.com/you-might-stop-receiving-essential-email-messages-and-what-to-do-about-it/">You Might Stop Receiving Essential Email Messages, and What to Do About It</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Stealing Tesla Cars, and Stealing Your Network with Agent Tesla</title>
		<link>https://fosterinstitute.com/stealing-tesla-cars-and-stealing-your-network-with-agent-tesla/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 25 Oct 2018 20:16:24 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Agent Tesla]]></category>
		<category><![CDATA[Breaking Passwords]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Disgruntled Employee Security]]></category>
		<category><![CDATA[GoToMyPC]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[LogMeIn]]></category>
		<category><![CDATA[Stealing Keystroks]]></category>
		<category><![CDATA[Tesla Hackers]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2678</guid>

					<description><![CDATA[<p>The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization&#8217;s security too.First the theft. Wired magazine published an article you can find by searching the title: Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob. Then, you can watch a security cam [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/stealing-tesla-cars-and-stealing-your-network-with-agent-tesla/">Stealing Tesla Cars, and Stealing Your Network with Agent Tesla</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization&#8217;s security too.<span id="more-2893"></span>First the theft. Wired magazine published an article you can find by searching the title: Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob. Then, you can watch a security cam video of two men stealing a Model S in real life on YouTube. The thieves had to use Google to find out how to unplug the car. To see the short video, search: Tesla Model S Being Stolen Antony Kennedy or click <a href="https://www.youtube.com/watch?v=odG2GX4_cUQ&amp;feature=youtu.be" target="_blank" rel="noopener noreferrer">here</a>.</p>
<p>Now, what affects you directly whether you own a Tesla or not. Many IT Professionals, consultants, and outsourced IT firms access your network remotely using tools designed to help them help your users solve technical issues. Example programs include GoToMyPC, TeamViewer, LogMeIn, VNC, and Splashtop. Some outsourced companies use a product called Agent Tesla to support their customers. If you visit the website agent tesla dot com, you will see that the product has additional features including stealing keystrokes, breaking passwords, and spreading itself like a virus through a network. It appears that some bad actors have been using this tool to infect computers at companies without the company&#8217;s permission. And the tech support representatives at Agent Tesla were more than willing to assist the bad actors.</p>
<p>A key takeaway is that user-friendly tools can permit non-technical people to hack your network without needing any technical know-how.</p>
<p>What if a disgruntled or unscrupulous worker in your company installs GoToMyPC, LogMeIn, or similar easy-to-use software on computers in your private offices? They could overhear private conversations without anyone knowing. One of our clients experienced millions of dollars of embezzlement because a trusted worker used one of those programs on the computer that was in the conference room. The embezzler was not technically savvy at all, and he heard enough confidential information to embezzle millions and wreak all kinds of havoc. He did not need to use the additional user-friendly features that Agent Tesla provides including password cracking and automatic infection of other computers, but he could have.</p>
<p>Visit with your IT professionals. What are you, as an organization, doing to protect yourself from someone intentionally utilizing a readily available program, such as Agent Tesla, to infect your network, spy on your workers, steal information, and break your passwords?</p>
<p>The CEO, Owner, President, and other chief executives suffer the most when an attack devastates an organization. Most of them wish they&#8217;d have taken more of an active role in security. Learn from their mistakes, before it is too late.</p>
<p>The post <a href="https://fosterinstitute.com/stealing-tesla-cars-and-stealing-your-network-with-agent-tesla/">Stealing Tesla Cars, and Stealing Your Network with Agent Tesla</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Can you Trust the Kindness of Tech Support Strangers?</title>
		<link>https://fosterinstitute.com/can-you-trust-the-kindness-of-tech-support-strangers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 19 Oct 2018 18:56:51 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Tech Support]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[program safety]]></category>
		<category><![CDATA[remote access]]></category>
		<category><![CDATA[remote access safety]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[tech support imposters]]></category>
		<category><![CDATA[tech support safety]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2673</guid>

					<description><![CDATA[<p>If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your computer, think twice. Their program already installed on your computer should be able to give them all the information that [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/can-you-trust-the-kindness-of-tech-support-strangers/">Can you Trust the Kindness of Tech Support Strangers?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your computer, think twice.<br />
<span id="more-2892"></span></p>
<p>Their program already installed on your computer should be able to give them all the information that they need. Even if the tech support person does require you to install another program, there is a possibility that the diagnostic program has an undiscovered security vulnerability.</p>
<p>If you do decide to install the program, at least make sure that the file location they offer you is on their main website, not a misspelled version such as qickbooks.com or abode.com.</p>
<p>Additionally, refuse to permit tech support to log in to your computer, even if you were the one who called them. Do you want to trust the security of your computer to a stranger?</p>
<p>Ask if there is some other way to provide them with the information they need.</p>
<p>Beware of imposters asking you to provide remote access or asking you to download diagnostic software.</p>
<p>The post <a href="https://fosterinstitute.com/can-you-trust-the-kindness-of-tech-support-strangers/">Can you Trust the Kindness of Tech Support Strangers?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else</title>
		<link>https://fosterinstitute.com/the-insanity-of-your-network-storing-keys-in-the-same-place-as-everyone-else/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 10 Sep 2018 16:07:03 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[master passwords]]></category>
		<category><![CDATA[password access]]></category>
		<category><![CDATA[password location]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[safely storing passwords]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2666</guid>

					<description><![CDATA[<p>Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet. You assign your IT team the responsibility to secure and manage the keys to the vehicles, so you give each member of your IT [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/the-insanity-of-your-network-storing-keys-in-the-same-place-as-everyone-else/">The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet.</p>
<p>You assign your IT team <span id="more-2666"></span>the responsibility to secure and manage the keys to the vehicles, so you give each member of your IT team a copy of the master key.</p>
<p>Here is where it gets crazy: Suppose that there is a well-known tradition, in all companies, for IT professionals to store their master keys in the top drawer of their desks. Unfortunately, if someone wants to steal a vehicle, they know right where to find a master key. They can take all the cars once they gain access to the master, and they know exactly where to find it.</p>
<p>In the real world, your IT team has the responsibility to secure and manage your most sensitive data. In doing so, they have the master keys that unlock all the other keys. It is a tradition to give all IT professionals, and even outside consultants, keys to the master lockbox. The shocking part is that all IT professionals are encouraged to store the master keys in the same place, in the default well-known security groups named schema, enterprise, and domain admins.</p>
<p>Your IT team must create new security groups, with different names, in which to store the master keys. It is crucial that the new groups only provide specific privileges to member users on a need to know basis. It is ok if this strategy is new to them.</p>
<p>To measure this, ask your IT professionals to show you what users are members of those default security groups. Discuss moving those users into specific groups that provide the least amount of access they need to perform their work. Depending on the complexity of your system, this may take more time. IT professionals are always busy, so discuss with them their current projects, then prioritize this essential security improvement accordingly.</p>
<p>Storing master keys in a well-known location is absurd, and it is likely that you are doing that now.</p>
<p>The post <a href="https://fosterinstitute.com/the-insanity-of-your-network-storing-keys-in-the-same-place-as-everyone-else/">The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Stop Hidden Attacks Buried in Email Attachments</title>
		<link>https://fosterinstitute.com/stop-hidden-attacks-buried-in-email-attachments/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 09 Jul 2018 13:00:47 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Attachments]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Disabling Macros]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[bad attachments]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[disable macros]]></category>
		<category><![CDATA[email attacks]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Hidden Cyber Attacks]]></category>
		<category><![CDATA[infected attachments]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[macros]]></category>
		<category><![CDATA[malicious attachments]]></category>
		<category><![CDATA[malicious email]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2644</guid>

					<description><![CDATA[<p>When you receive an email attachment, even when you are expecting the document and know the sender, the attached file can be poisoned.  And the friend or associate who sends you the attachment probably does not know that the file is infected. A term to know is macro. It is a set of automated instructions [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/stop-hidden-attacks-buried-in-email-attachments/">Stop Hidden Attacks Buried in Email Attachments</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>When you receive an email attachment, even when you are expecting the document and know the sender, the attached file can be poisoned. <span id="more-2644"></span><br />
And the friend or associate who sends you the attachment probably does not know that the file is infected.</p>
<p>A term to know is macro. It is a set of automated instructions like a program. Emailed Attachments may contain macros.</p>
<p>Macros can contain malicious code that will infect your computer, and give an attacker full access to your computer and network.</p>
<p>If you ever see a message on your screen instructing you to enable macros, refuse.</p>
<p>Your IT department, or IT provider, can disable macros.</p>
<p>At home – you can do it yourself. Find step-by-step instructions by searching the web using the search terms: Disable Macros Office.</p>
<p>On a Windows computer, open each Office application, choose File, Options, Trust Center, Trust Settings, and choose the option to disable all macros with notification.</p>
<p>On a Mac, choose Preferences from the menu in each Office application. In Word, the preferences settings will show up when you pull down the menu labeled Word. Then select Security and Privacy settings. Choose to disable macros with notification.</p>
<p>Forward this message to users who use their computers to work from home, so they can make sure their computers are safe. That will protect your network.</p>
<p>Please forward this to your friends, so they know how dangerous macros are too.</p>
<p>The post <a href="https://fosterinstitute.com/stop-hidden-attacks-buried-in-email-attachments/">Stop Hidden Attacks Buried in Email Attachments</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ask IT Pros to Check Your Routers and Firewalls</title>
		<link>https://fosterinstitute.com/ask-it-pros-to-check-your-routers-and-firewalls/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 28 Jun 2018 21:37:02 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Firewall Security]]></category>
		<category><![CDATA[Web Content Filtering]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[filtering]]></category>
		<category><![CDATA[filtering tool]]></category>
		<category><![CDATA[firewall appliance]]></category>
		<category><![CDATA[firewalls]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[web content filter]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2640</guid>

					<description><![CDATA[<p>We audited a company last week and discovered that their web filtering tools, designed to stop users from accidentally landing on malicious websites, was not blocking dangerous sites. In these days with ransomware and bad actors tricking users into clicking on dangerous links, it is essential to have web content filtering in place. Even if [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/ask-it-pros-to-check-your-routers-and-firewalls/">Ask IT Pros to Check Your Routers and Firewalls</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>We audited a company last week and discovered that their web filtering tools, designed to stop users from accidentally landing on malicious websites, was not blocking dangerous sites. In these days with ransomware and bad actors tricking users into clicking on dangerous links, it is essential to have web content filtering in place.<span id="more-2640"></span></p>
<p>Even if a user does click a link, a good web content filter can often protect your network when user training fails.</p>
<p>We notified the company’s outsourced IT providers, and they determined that the web protection gateway failed and was permitting all traffic into the network. Were it not for the audit, it would still be allowing clicked links to take users to malicious websites.</p>
<p>This firewall appliance is a well-known brand that starts with a B, but it could be any manufacturer. Computer hardware is far from perfect. A big concern is that the firewall failed and no one knew it. As auditors, it is common to find malfunctioning security equipment. Just because all the green lights are flashing on the outside of the firewall does not mean it is working correctly.</p>
<p>Now is an excellent time to ask your IT professionals, even outsourced companies, to devote time to checking your firewalls, routers, wireless network access points, and other devices. They need to apply all critical security patches, verify the filtering rules, and be sure the devices are working fast without hindering the flow of your information. If you want to, have them reach out to us for more technical recommendations.</p>
<p>You can even update your routers and devices at home if you have some extra time. An excellent place to start is at the device manufacturer’s website. There will be instructions to download and install the most recent firmware. Look at the support site about ways you can enable supported security features in your home devices including web content filtering. Be sure to leave time to tweak the settings. Depending on how familiar you are with the settings, this process might take you ten minutes or, if things get a little crazy, it could take an hour or more at home.</p>
<p>Please forward this to everyone you know so they can ask their IT professionals to make sure the firewalls and other devices are up and running correctly. Let’s keep your networks safe.</p>
<p>The post <a href="https://fosterinstitute.com/ask-it-pros-to-check-your-routers-and-firewalls/">Ask IT Pros to Check Your Routers and Firewalls</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to E-Mail Encrypted Attachments</title>
		<link>https://fosterinstitute.com/how-to-e-mail-encrypted-attachments/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 11 May 2018 15:31:58 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Encrypted Attachments]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Secure Attachments]]></category>
		<category><![CDATA[Secure email]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2637</guid>

					<description><![CDATA[<p>E-mail messages can be intercepted or read by an unauthorized individual. When you want privacy, one way is to encrypt your documents before you attach them to your email message. Microsoft Office, for Windows and Mac, has a feature on the File menu called Protect Document. Choose that option, and enter a secret password. Use [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/how-to-e-mail-encrypted-attachments/">How to E-Mail Encrypted Attachments</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>E-mail messages can be intercepted or read by an unauthorized individual.<span id="more-2637"></span></p>
<p>When you want privacy, one way is to encrypt your documents before you attach them to your email message.</p>
<p>Microsoft Office, for Windows and Mac, has a feature on the File menu called Protect Document. Choose that option, and enter a secret password.</p>
<p>Use a phrase such as: the chairs are in a row.</p>
<p>E-mail that file to your recipient.</p>
<p>Then, phone, or text, the password to your recipient. If you email the recipient the password, even if it is in a separate email message, whoever is reading your email messages will receive both the attachment and the secret code.</p>
<p>Please forward this to any of your friends who may want to send sensitive email attachments.</p>
<p>The post <a href="https://fosterinstitute.com/how-to-e-mail-encrypted-attachments/">How to E-Mail Encrypted Attachments</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Simple Change Can Help Protect Your Family, and It Works on Apple and Windows</title>
		<link>https://fosterinstitute.com/a-simple-change-can-help-protect-your-family-and-it-works-on-apple-and-windows/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 27 Apr 2018 17:21:57 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Clean Browsing]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Norton ConnectSafe]]></category>
		<category><![CDATA[Open DNS]]></category>
		<category><![CDATA[Quad9]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Automatic Protection]]></category>
		<category><![CDATA[Bill de Blasio]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[NYC Secure]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2632</guid>

					<description><![CDATA[<p>There is a setting on your computer that can help protect your family. You don&#8217;t need to know this part: There is a service called Domain Name Service, DNS, that is a massive index for the Internet. If someone in your family, or at work, types in make a wish dot com, DNS looks up [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/a-simple-change-can-help-protect-your-family-and-it-works-on-apple-and-windows/">A Simple Change Can Help Protect Your Family, and It Works on Apple and Windows</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There is a setting on your computer that can help protect your family.<span id="more-2632"></span></p>
<p>You don&#8217;t need to know this part: There is a service called Domain Name Service, DNS, that is a massive index for the Internet. If someone in your family, or at work, types in make a wish dot com, DNS looks up those letters and finds that the Make a Wish server is at address 184.168.221.30. Since computers think in numbers, it can then take you to that website.</p>
<p>Your internet service provider provides you with DNS lookups. So, if someone clicks on terrible dot com or infected dot com, your computer will take you to those sites.</p>
<p>However, there are DNS services that will help protect you. When someone clicks on an address, those DNS servers will look up the address and, before sending you there, do its best to make sure it is a good site.</p>
<p>There is nothing to install, and there are no charges for the services. All you need to do is tell your computer to use the new DNS servers, and all the sites show you how to do that. Check out:</p>
<p>Clean Browsing</p>
<p><a href="https://connectsafe.norton.com/" target="_blank" rel="noopener">Norton ConnectSafe</a></p>
<p><a href="https://www.opendns.com/home-internet-security/" target="_blank" rel="noopener">OpenDNS</a></p>
<p><a href="https://quad9.com/" target="_blank" rel="noopener">Quad9</a></p>
<p>Additionally, you might even notice a boost in speed!</p>
<p>Please forward this to everyone you know who would like added protection when they click on a link or even type in an address while surfing the web.</p>
<p>The post <a href="https://fosterinstitute.com/a-simple-change-can-help-protect-your-family-and-it-works-on-apple-and-windows/">A Simple Change Can Help Protect Your Family, and It Works on Apple and Windows</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
