<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IT security training Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/it-security-training/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/it-security-training/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Sun, 23 Jul 2023 01:59:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>IT security training Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/it-security-training/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What to Do if Someone Hacks Your Email Account</title>
		<link>https://fosterinstitute.com/what-to-do-if-someone-hacks-your-email-account/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 21 Jul 2023 16:10:06 +0000</pubDate>
				<category><![CDATA[Email]]></category>
		<category><![CDATA[Hacked Email]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Email Hacking]]></category>
		<category><![CDATA[Email Password]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[Security Patches]]></category>
		<category><![CDATA[two-step authentication]]></category>
		<category><![CDATA[Unauthorized Spammer]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2914</guid>

					<description><![CDATA[<p>How to protect yourself if, or even before, an unauthorized spammer uses one of your email accounts to send out spam: If you have cybersecurity insurance or feel this incident could cause significant damage, consider having a forensic analysis to track down what happened. Contact your email provider, explain what happened, and ask for help. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/what-to-do-if-someone-hacks-your-email-account/">What to Do if Someone Hacks Your Email Account</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>How to protect yourself if, or even before, an unauthorized spammer uses one of your email accounts to send out spam:<span id="more-2914"></span></p>
<p>If you have cybersecurity insurance or feel this incident could cause significant damage, consider having a forensic analysis to track down what happened.</p>
<p>Contact your email provider, explain what happened, and ask for help. Continue down this list while you wait for their response.</p>
<p>Reset your email account password immediately. If you can&#8217;t log in because someone unauthorized reset your password, try resetting it yourself. If that doesn&#8217;t work, contact your email company&#8217;s tech support.</p>
<p>Check if your username and old passwords have appeared on the dark web. Visit <a href="https://haveibeenpwned.com/" target="_blank" rel="noopener">https://haveibeenpwned.com/</a> and similar sites to find out. Never enter your password.</p>
<p>Change passwords for all your accounts including social media, banking, and other sensitive accounts, especially if you&#8217;ve used the same password for multiple accounts. Someone may have access to more than just your email.</p>
<p>Consider using a password manager like 1Password, Dashlane, LastPass, NordPass or another to help ease the pain of having different passwords on every website from now on.</p>
<p>When setting up security questions, avoid real answers that are easy for a bad actor to research. When asked, &#8220;Where were you born,&#8221; you could answer something like, &#8220;The fourth crater on the moon.&#8221; Save your secret answers in a file in a random place with a random name like &#8220;socks.docx&#8221; for when you need the answers. You can encrypt the file for added safety.</p>
<p>Enable two-step verification for your email account. While you are at it, set up two-step verification everywhere you can, primarily on sensitive websites and services. Here is how to add MFA to your LinkedIn account for added security <a href="https://www.linkedin.com/help/linkedin/answer/544/turning-two-step-verification-on-and-off?lang=en" target="_blank" rel="noopener">https://www.linkedin.com/help/linkedin/answer/544/turning-two-step-verification-on-and-off?lang=en</a></p>
<p>If you set up two step authentication so that the site or service sends you an email message for the second part of logging in, and the hacker has access your email, it defeats the purpose of MFA. Therefore, if you set up the two-step login with email as the second step, use a different secure email address.</p>
<p>Review your email&#8217;s &#8220;sent&#8221; folder to spot any unrecognized messages.</p>
<p>Look at all your email accounts in your organization to ensure there are no email forwarding or filtering rules you did not configure.</p>
<p>Check your websites, especially LinkedIn, for any unauthorized changes.</p>
<p>Set up SPF and DKIM. More information here: <a href="https://fosterinstitute.com/block-inbound-and-outbound-fraudulent-email-messages/" target="_blank" rel="noopener">https://fosterinstitute.com/block-inbound-and-outbound-fraudulent-email-messages/</a></p>
<p>Watch out for remote control applications that might allow a bad actor to compromise your computer and send email messages as you.</p>
<p>Be aware that your computer or another computer in your organization might be hacked, enabling attackers to send messages on your behalf. Stay vigilant and take measures to protect against such incidents.</p>
<p>Regularly apply critical security patches to your computer. You can check for updates manually, even if automatic updates are enabled.</p>
<p>Ensure your anti-virus program is current and run a manual scan regularly. Using EDR or XDR services add more security.</p>
<p>If you use a browser to send and receive email, this is a drastic step, but consider uninstalling the browser. When you reinstall the browser, add only the plugins you need.</p>
<p>If you use your phone or tablet for email, they could be hacked. Apply security patches, keep them in your possession, examine the privacy settings, and lock devices when not in use.</p>
<p>Watch out for apps on your computer, tablet, or phone that may be harvesting your address book without your knowledge. A drastic move would be to factory reset and erase them, but be sure your important data is stored in the cloud or backed up.</p>
<p>Notify financial institutions that if they receive messages from you, the messages could be fraudulent.</p>
<p>You might want to set up a new email address to use until you feel confident your old address is safe.</p>
<p>If you haven&#8217;t already, freeze your credit.</p>
<p>Monitor your financial accounts.</p>
<p>Before you send out notifications, you will want to talk to an advisor who can help you know what to say.</p>
<p>Please forward this to your friends so that, if someone appears to hack their email account, they will know what to do to.</p>
<p>Subscribe to maximize your executive potential with Foster Institute&#8217;s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>The post <a href="https://fosterinstitute.com/what-to-do-if-someone-hacks-your-email-account/">What to Do if Someone Hacks Your Email Account</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Three Essential Questions to Ask Your IT Team Today Because of the Massive Exchange Attack</title>
		<link>https://fosterinstitute.com/three-essential-questions-to-ask-your-it-team-today-because-of-the-massive-exchange-attack/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 08 Mar 2021 17:48:54 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3467</guid>

					<description><![CDATA[<p>So far, it appears that more than 30,000 organizations, including small businesses, are compromised. The US National Security Council urges organizations, including small businesses, to &#8220;take immediate measures&#8221; to detect compromise. &#8211;&#62; ONE: Ask your IT team, &#8220;Do we still have Microsoft Exchange Server email software installed anywhere?&#8221; If they answer affirmatively, even if they&#8217;re [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/three-essential-questions-to-ask-your-it-team-today-because-of-the-massive-exchange-attack/">Three Essential Questions to Ask Your IT Team Today Because of the Massive Exchange Attack</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>So far, it appears that more than 30,000 organizations, including small businesses, are compromised. The US National Security Council urges organizations, including small businesses, to &#8220;take immediate measures&#8221; to detect compromise.<span id="more-3467"></span></p>
<p>&#8211;&gt; <strong>ONE</strong>: Ask your IT team, &#8220;Do we still have Microsoft Exchange Server email software installed anywhere?&#8221;</p>
<p>If they answer affirmatively, even if they&#8217;re already moving to the cloud, you must continue:</p>
<p>&#8211;&gt; <strong>TWO</strong>: Ask them, &#8220;What can I take off your plate or postpone so that you can immediately test and deploy the patches to the Exchange Server right now?&#8221;</p>
<p>Essential: Applying security updates to your Exchange server does not resolve the issue if your organization is already compromised. There might be a small program on your system quietly waiting for an attacker&#8217;s commands.</p>
<p>To help determine if you are already compromised: <a href="https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/#scan-log" target="_blank" rel="noopener">https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/#scan-log</a></p>
<p>If your team cannot update immediately, send them here: <a href="https://github.com/microsoft/CSS-Exchange/tree/main/Security" target="_blank" rel="noopener">https://github.com/microsoft/CSS-Exchange/tree/main/Security</a></p>
<p>&#8211;&gt; <strong>THREE</strong>: Say, &#8220;The emergency is too great to postpone. Later, let&#8217;s discuss the pros and cons of moving email to the cloud.&#8221;</p>
<p>Pros include eliminating one server and associated headaches. Often, online email is better for remote workers too. But you could lose some integration features you have now, for example, an on-site phone system tied into Exchange. Because saving money and streamlining is essential, online Exchange is often less expensive.</p>
<p>The blog posting <a href="https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/#scan-log" target="_blank" rel="noopener">https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/#scan-log</a> has a plethora of other information and guidance for your team related to the updates. Some organizations are experiencing errors after applying the security updates. For example, some learned they must install the updates from an elevated command prompt window. Microsoft provides more guidance:</p>
<p><a href="https://msrc-blog.microsoft.com/2021/03/05/microsoft-exchange-server-vulnerabilities-mitigations-march-2021/" target="_blank" rel="noopener">https://msrc-blog.microsoft.com/2021/03/05/microsoft-exchange-server-vulnerabilities-mitigations-march-2021/</a></p>
<p><a href="https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2019-2016-and-2013-march-2-2021-kb5000871-9800a6bb-0a21-4ee7-b9da-fa85b3e1d23b" target="_blank" rel="noopener">https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2019-2016-and-2013-march-2-2021-kb5000871-9800a6bb-0a21-4ee7-b9da-fa85b3e1d23b</a></p>
<p><a href="https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2010-service-pack-3-march-2-2021-kb5000978-894f27bf-281e-44f8-b9ba-dad705534459" target="_blank" rel="noopener">https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2010-service-pack-3-march-2-2021-kb5000978-894f27bf-281e-44f8-b9ba-dad705534459</a></p>
<p>The post <a href="https://fosterinstitute.com/three-essential-questions-to-ask-your-it-team-today-because-of-the-massive-exchange-attack/">Three Essential Questions to Ask Your IT Team Today Because of the Massive Exchange Attack</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated Problems</title>
		<link>https://fosterinstitute.com/your-phone-tablet-and-computer-started-hiding-you-and-how-to-overcome-the-associated-problems/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 25 Feb 2021 14:50:39 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3453</guid>

					<description><![CDATA[<p>A friend contacted me a few days ago and said, “Every few weeks, I’ll go to a site, and it will say that this appears to be a new device? For example, I’ve looked at my Twitter account this morning, and it put up my username and asked me for my password again. Is this [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/your-phone-tablet-and-computer-started-hiding-you-and-how-to-overcome-the-associated-problems/">Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated Problems</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A friend contacted me a few days ago and said, “Every few weeks, I’ll go to a site, and it will say that this appears to be a new device? For example, I’ve looked at my Twitter account this morning, and it put up my username and asked me for my password again. Is this anything to be concerned about?” <span id="more-4514"></span></p>
<p>A little background information helps explain what is going on: Every device connected to a network has a serial number, called a MAC address. That address is how the network identifies the device and differentiates it from all the other devices on a network. As you can imagine, networks need to know what devices are connected. Think of what might happen if the network thought your computer was a printer. Printer paper might not come shooting out of your keyboard, knock over your coffee or smoothie, but you get the idea.</p>
<p>Because the MAC address uniquely identifies you for everyone else, think of the MAC address as a fingerprint for your device. Potentially, an advertiser, or someone in a public place, could use your fingerprint, in this case, your device’s MAC address, to track you, your activities, and what networks you use.</p>
<p>Apple, Google, and Microsoft want to help protect your privacy, so they might periodically change the MAC address on your computer to a different address. The new behavior strives to help keep you more anonymous on public networks at hotels and coffee shops. However, randomly changing MAC addresses can break essential security features, including:</p>
<p>1) As my friend did, you might start receiving alarming alerts that another person connected a new device to one of your websites or accounts. The warnings are concerning until you realize it is your computer reconnecting with a new unique index. After a time, you might ignore the alerts. But then you won&#8217;t know if a real attacker broke into your account with some other computer, tablet, or phone.</p>
<p>2) Parental controls at home fail if the safety restrictions are unique for each family device. When a youngster disconnects and reconnects to your network, sometimes they are no longer protected.</p>
<p>3) Your company keeps an inventory of your computers, tablets, and phones. It is challenging to keep the list current when your IT team must track three times as many devices as you have.</p>
<p>How do you solve this? It is possible to disable the randomization feature, but it takes time to reconfigure. Time is a precious commodity for you and your IT team too. An example of how to disable the behavior on iPhones, iPads, and Apple Watches: <a href="http://support.apple.com/en-us/HT211227" target="_blank" rel="noopener">support.apple.com/en-us/HT211227</a></p>
<p>However, your employees or kids could change the feature back again to help them hide on your networks.</p>
<p>The answer to my friend&#8217;s question is that if the website tells you a date, time, and location of that person&#8217;s login, and you know you weren&#8217;t logging in from there at that time, yes, you need to be concerned. Otherwise, your experience may be because your device is disguising itself from the website. Disable the randomization feature, and the problem might go away.</p>
<p>Please forward this to your friends so that if they, or their IT team, cannot figure out why some of your security features are breaking, they will know to suspect their devices are rotating through MAC addresses.</p>
<p>If you want more technical details, a network identifies your device with an index number called a MAC address when you connect. There are more than 280 trillion possibilities for a MAC address; the odds are that nobody you know has the same number as your device. The first half of the number identifies the manufacturer; that makes it easier to find unidentified devices on a network.</p>
<p>Other problems you&#8217;ll notice because of rotating MAC addresses include:</p>
<p>4) Security tools at the office fail to work if the security tools rely on associating users with their computers, tablets, or phones. This problem affects both BYOD and company-issued devices.</p>
<p>5) IT Professionals can configure necessary reservations for computers, tablets, and phones. Those reservations are based on index numbers. When the index changes, the reservation stops working, and systems can fail or lose security.</p>
<p>6) Your websites will forget you. Some sites have a feature to Remember This Computer, so you do not need to go through as many steps each time you log in. The sites identify your devices by their index numbers. Your device will need to be re-remembered when your index changes.</p>
<p>MAC addresses look like FF:FF:FF:FF:FF:FF:FF:FF where each value I listed as F can be a hexadecimal digit 0,1,2,3,4,5,6,7,8,9, A, B, C, D, E, or F. If you know where to look, your phone, tablet, and computer can tell you the MAC addresses of each network interface.</p>
<p>The new behavior is causing lots of frustration in the cybersecurity world. This battle isn&#8217;t over yet.</p>
<p>The post <a href="https://fosterinstitute.com/your-phone-tablet-and-computer-started-hiding-you-and-how-to-overcome-the-associated-problems/">Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated Problems</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them</title>
		<link>https://fosterinstitute.com/attackers-can-take-control-of-your-network-in-three-seconds-and-how-to-stop-them/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 23 Oct 2020 19:03:56 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Remote Worker Security]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3333</guid>

					<description><![CDATA[<p>An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network. The attacker does not need to know any passwords; they do not even need a username. They plug in a cable, and 3 seconds later, they&#8217;ve completely compromised your network. An attacker posing as [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/attackers-can-take-control-of-your-network-in-three-seconds-and-how-to-stop-them/">Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network.<span id="more-3333"></span></p>
<p>The attacker does not need to know any passwords; they do not even need a username. They plug in a cable, and 3 seconds later, they&#8217;ve completely compromised your network. An attacker posing as a visitor, a copier repair person, or a member of a cleaning crew can all compromise your organization. They can steal sensitive information, install ransomware, and can shut down operations entirely. They bypass the majority of, if not all, of your other protections because now they&#8217;re a Domain Administrator.</p>
<p>This exploit is so severe that the Department of Homeland Security directed all federal agencies to apply the patch in accordance with the Federal Emergency Directive 20-04.</p>
<p>Take these three steps ASAP:</p>
<p>First, ask your IT team if they&#8217;ve backed up your Domain Controller servers and applied Microsoft&#8217;s patches that address the Zerologon exploit CVE-2020-1472. They must do this immediately. Be compassionate if they&#8217;ve not. IMPORTANT: Realize that if an attacker already took over a network, the patch doesn&#8217;t help.</p>
<p>Second, if you have Domain Controllers using operating systems older than Windows Server 2008 R2, your IT professionals must shut them down for good. Be sure to migrate any mission-critical services to other servers.</p>
<p>Third, does your organization rely on third parties to support you? What if one of your major suppliers, a distributor, or your biggest customer falls prey to an attack? Prepare your organization now for an interruption of their operations. Be sure their executives know about this flaw and these three steps. You do not want a catastrophe at their organization to domino and cause a disaster for you, even though you&#8217;ve protected your systems.</p>
<p>Additional steps:</p>
<p>Inform your work-from-home team members that, in some cases, the attacker can take over your network using a VPN connection. Do you have an armed guard at every work-from-home user&#8217;s home to watch visitors? Of course not. But your entire organization might rely on their security. What if a teenager&#8217;s friend feels like playing around, experimenting, with this new cool exploit on a mom or dad&#8217;s computer?</p>
<p>The patches only protect you from attacks from Windows devices. If an attacker accesses a network port or cable with a non-Windows machine, the attacker can still take control of your network. Microsoft will release a second patch on February 9, 2021. Ask your IT team to configure alerts now to monitor security log events 5827 thru 5831 to see when connections are allowed or denied.</p>
<p>The average time for IT Professionals to apply critical security patches is five months, but you need to help yours be above average. Ask them what you can do to help them have time to test and install all critical security patches within 14 days or sooner. They might want to have a patch management tool. They might need more time to devote to applying updates.</p>
<p>Confirm that your IT Team disconnects or disables all unused Ethernet ports, including those in conference rooms. Lock doors to any offices and conference rooms that contain active Ethernet ports. Train everyone to be proactive and remove opportunities for anyone, including guests and repair people, to plug a device into a network port.</p>
<p>Keep in mind that 911 systems, airlines, governments, and every organization that you depend on are at risk for Zerologon exploit CVE-2020-1472 until they take action too.</p>
<p>Please forward this to fellow executives you care about so they can support their IT Professionals successfully backing up servers and applying the emergency patch.</p>
<p>The post <a href="https://fosterinstitute.com/attackers-can-take-control-of-your-network-in-three-seconds-and-how-to-stop-them/">Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zoom Security &#8211; Set Up Two-Step Login</title>
		<link>https://fosterinstitute.com/zoom-security-set-up-two-step-login/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 08 Apr 2020 16:50:45 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[two step login]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Zoom]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3094</guid>

					<description><![CDATA[<p>Protect your Zoom account. If someone discovers your username and password for Zoom, two-step login should block them from logging in as you. This video walks you through setting up the two step login feature of Zoom. To help protect your Zoom meetings, watch other videos that cover concerns about using Zoom: Zoom Security Settings [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/zoom-security-set-up-two-step-login/">Zoom Security &#8211; Set Up Two-Step Login</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Protect your Zoom account. If someone discovers your username and password for Zoom, two-step login should block them from logging in as you.<span id="more-3094"></span></p>
<p><iframe src="https://player.vimeo.com/video/405338737?dnt=1&amp;app_id=122963" width="384" height="234" frameborder="0" allow="autoplay; fullscreen" allowfullscreen></iframe></p>
<p>This video walks you through setting up the two step login feature of Zoom.</p>
<p>To help protect your Zoom meetings, watch other videos that cover concerns about using Zoom:</p>
<p><a href="https://fosterinstitute.com/?p=3099&amp;preview=true" target="_blank" rel="noopener noreferrer">Zoom Security Settings &#8211; The Concise Details</a></p>
<p><a href="https://fosterinstitute.com/blog/zoom-security-issues-protect-yourself/" target="_blank" rel="noopener noreferrer">Zoom Security Issues &#8211; Protect Yourself</a></p>
<p><a href="https://fosterinstitute.com/blog/follow-along-to-set-zoom-security-settings/" target="_blank" rel="noopener noreferrer">Zoom Security &#8211; Follow Along to Set Settings</a></p>
<p>The post <a href="https://fosterinstitute.com/zoom-security-set-up-two-step-login/">Zoom Security &#8211; Set Up Two-Step Login</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zoom Security Settings &#8211; The Concise Details</title>
		<link>https://fosterinstitute.com/zoom-security-settings-the-concise-details/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 08 Apr 2020 16:50:02 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Video Meeting Security]]></category>
		<category><![CDATA[Zoom]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Safe Network]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3099</guid>

					<description><![CDATA[<p>Zoom has many security settings. This is a detailed but concise guide to the settings and how they work. Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/zoom-security-settings-the-concise-details/">Zoom Security Settings &#8211; The Concise Details</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Zoom has many security settings. This is a detailed but concise guide to the settings and how they work.<br />
<span id="more-3099"></span><br />
Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings.</p>
<p><iframe loading="lazy" src="https://player.vimeo.com/video/405323511?dnt=1&amp;app_id=122963" width="384" height="216" frameborder="0" allow="autoplay; fullscreen" allowfullscreen></iframe></p>
<div>
<div>
<p>Fasten your seatbelt. There are lots of security settings in Zoom. You must change default settings to help close the doors to hackers.</p>
<p>To access the account settings, sign into the Zoom website, click on your account on the far right of the top bar. You can also select a link to Account Management, under which you can reach the Account Settings.</p>
<p>The free version of Zoom lacks some essential security controls. In the paid version, the best place to start is, in the left-hand column, under ADMIN, select Account Management &gt; Account Settings. By default, you&#8217;re already on the meeting tab.</p>
</div>
<div></div>
<div>
<p>One of the first things you&#8217;ll notice is that some settings have a lock symbol next to them. Zoom allows you to configure settings at an account level, group level, and user level. Here, at the account level, if you click the lock icon, that setting will override the group and user settings.</p>
<p>HOST VIDEO: Disable this setting so the host will start meetings with their video off. The host will be able to show their video when they choose.</p>
</div>
<div></div>
<div>
<p>JOIN BEFORE HOST: Disable and lock the setting that would allow others to join the meeting before the host arrives. Never let anyone start communicating until you join to moderate the conversation.</p>
<p>USE PERSONAL MEETING ID (PMI) WHEN SCHEDULING A MEETING: You may not know it yet, but Zoom sets up a private meeting room for you that runs all the time. Your Personal Meeting ID, abbreviated PMI, is the Zoom address to your room. You want your PMI address to be confidential. Disable this setting.</p>
<p>USE PERSONAL MEETING ID (PMI) WHEN STARTING AN INSTANT MEETING: Disable this too for the same reason.</p>
<p>ONLY AUTHENTICATED USERS CAN JOIN MEETINGS: Enable this to add more protection if you meet with coworkers and other people you know who have Zoom accounts. However, you might choose to disable the setting if you will meet with clients, prospects, or anyone else who might not have Zoom accounts.</p>
<p>REQUIRE A PASSWORD WHEN SCHEDULING MEETINGS. Enable this option for all meeting types. Jot down your PMI password.</p>
<p>Here&#8217;s a tip. In case you are ever in a meeting and need to know the password quickly, click on the icon to invite someone, then Zoom displays the meeting ID at the top and the meeting&#8217;s password on the lower right corner of your window.</p>
<p>EMBED PASSWORDS IN MEETING LINK FOR ONE-CLICK JOIN: Leaving the setting enabled means the invitation&#8217;s link to the meeting includes a built-in password. Invitees are not prompted for and do not need to know the password. That means you can require passwords, and your clientele doesn&#8217;t even need to know.</p>
<p>However, embedding the passphrase inside the invitation exposes you to risk. If an unauthorized person obtains the email message, then they, too, can authenticate to your meeting without needing to know the password. If you disable this setting, tell everyone in the meeting the password through some method other than email.</p>
</div>
<div></div>
<div>
<p>REQUIRE PASSWORD FOR PARTICIPANTS JOINING BY PHONE: Enable this if you want to protect against unauthorized callers.</p>
<p>MUTE PARTICIPANTS ON ENTRY: Enable this, not only for security but to protect the meeting from background noise near a participant.</p>
<p>CHAT: Disable this setting here.  If an unauthorized person joins the meeting, you don&#8217;t want them to send disturbing chat messages for all to see. If some sessions require chat, do not click the lock.</p>
</div>
<div></div>
<div>
<p>PRIVATE CHAT: Disable private chat. Protect your participants from unwelcome interruptions from others, perhaps uninvited participants.</p>
<p>PLAY SOUND WHEN PARTICIPANTS JOIN OR LEAVE: Enable this setting to avoid being surprised to find out someone joined, and you didn&#8217;t notice. Check the box if you want to require telephone participants to record their names for an announcement when they join.</p>
<p>FILE TRANSFER: Disable and lock this setting. Blocking file transfers helps stop the spread of malware and potentially offensive content.</p>
<p>FEEDBACK TO ZOOM: Disable this feature.</p>
</div>
<div></div>
<div>
<p>ALLOW HOST TO PUT ATTENDEE ON HOLD: Enable and lock this setting for when you need to have a conversation without everyone listening.</p>
<p>ALWAYS SHOW MEETING CONTROL TOOLBAR: Enable this setting to make your life easier.</p>
<p>SHOW ZOOM WINDOWS DURING SCREEN SHARE: Disable this setting. Unless you are training people to host Zoom, no one needs to see what the host sees.</p>
<p>SCREEN SHARING: Unless you need people to show what&#8217;s on their screens to everyone during the meeting, set sharing to host only. If participants can share, there is a risk that someone, perhaps an uninvited participant, could show unwelcome content.</p>
<p>DISABLE DESKTOP/SCREENSHARE FOR USERS: Zoom allows the sharing of an entire monitor or sharing just one program&#8217;s window. Enable this setting if you want Zoom only to show the program window. This setting helps protect your participants, and the host, from accidentally sharing sensitive information somewhere on their desktop.</p>
<p>If, however, someone plans to use PowerPoint in presenter mode, disable this feature so that the host can share the whole monitor for displaying the slides.</p>
<p>ANNOTATION: Unless annotation is essential for your meeting, disable it. Turning off annotation prevents an uninvited participant from interrupting the flow of the meeting by placing images all over the screen.</p>
</div>
<div></div>
<div>
<p>WHITEBOARD: Unless you need the Whiteboard, disable it for the same reason you disable annotation.</p>
<p>REMOTE CONTROL: Unless you need participants to let others remotely control the shared content, disable this feature.</p>
<p>ALLOW REMOVED PARTICIPANTS TO REJOIN: Unless you think you might accidentally remove someone from a meeting, disable this feature to tell Zoom to keep them out.</p>
<p>FAR END CAMERA CONTROL: Disable this setting unless you want someone else to take control of your camera during your meeting.</p>
</div>
<div></div>
<div>
<p>VIRTUAL BACKGROUND: For security and privacy, tell workers to hide what is in their home office. Your workers can use a green screen backdrop, some attach to the back of chairs, but Zoom can usually differentiate between them and their background either way.</p>
<p>ENABLE IDENTIFYING GUEST PARTICIPANTS: This setting makes it easier for people who belong to your account to identify a potential intruder.</p>
<p>ALLOW USERS TO SELECT ORIGINAL SOUND IN THEIR CLIENT SETTINGS: Enable this feature. It isn&#8217;t so much for security as for sanity. If a participant&#8217;s voice is garbled, they can select original sound. Then you may be able to hear them.</p>
</div>
<div></div>
<div>
<div>
<p>WAITING ROOM: This is one of the most important and useful security settings in Zoom. Enable and lock this setting so that when participants try to join the meeting, they are held in a waiting room until the host permits them to enter.</p>
<p>Go back up to the top of that very long page. You&#8217;ll notice three headings: Meeting, Recording, and Telephone. Click the word Recording to move to the recording tab.</p>
<p>LOCAL RECORDING: Local recording means a participant can save the meeting to their computer. Disable the setting for confidential meetings. Otherwise, an unauthorized person could access that recorded file. A security risk is that the user could store the data in the cloud without a password.</p>
<p>CLOUD RECORDING: Unless you need to have a recording of the meeting, disable cloud recording too. In theory, cloud recordings are more secure since the users don&#8217;t have a file they must protect.</p>
<p>You&#8217;ll find many additional options. You might want to involve your IT Professional to help you choose the settings.</p>
<p>Scroll back up. Look in the left-hand column under PERSONAL and click on the Profile settings:</p>
<p>PERSONAL MEETING ID: Leave the random number alone. Zoom sets up a private meeting room for you to use anytime, and that PMI is the address to your room. Don&#8217;t make it easy for someone to find your PMI address. It is tempting to make your PMI match your phone number, but don&#8217;t.</p>
<p>In the left-hand column on the screen, skip down to Personal &gt; Settings. On the Meeting tab, confirm that the host video is off and that Join before the host is disabled too.</p>
<p>Now go back up in the left-hand column to your Personal &gt; Meetings settings, click on the Personal Meeting Room tab at the top. Confirm the settings match what you configured already. Essential settings include a green checkmark for Mute participants upon entry and a green checkmark in front of the Enable waiting room setting.</p>
<p>If you have other users and groups, Zoom suggests you review their account to verify the settings took hold.</p>
<p>When you schedule a meeting: Meeting ID: Generate Automatically. By now, you know to keep your Personal Meeting ID private except for a few people you trust.</p>
<p>Last, you can check for Zoom updates. Open your account settings by clicking on your account icon. Then select the option to check for updates. Zoom makes updates that improve Zoom&#8217;s security, but the updates do not help you until you install them.</p>
<p>To help protect your Zoom meetings, watch other videos that cover concerns about using Zoom, configuring the two-step login feature, and a video run-through of settings for paid accounts so you can simply follow along.</p>
<p><a href="https://fosterinstitute.com/?p=3094&amp;preview=true" target="_blank" rel="noopener noreferrer">Zoom Security &#8211; Set Up Two-Step Login</a></p>
<p><a href="https://fosterinstitute.com/blog/zoom-security-issues-protect-yourself/" target="_blank" rel="noopener noreferrer">Zoom Security Issues &#8211; Protect Yourself</a></p>
<p><a href="https://fosterinstitute.com/blog/follow-along-to-set-zoom-security-settings/" target="_blank" rel="noopener noreferrer">Zoom Security &#8211; Follow Along to Set Settings</a></p>
</div>
</div>
</div>
<p>The post <a href="https://fosterinstitute.com/zoom-security-settings-the-concise-details/">Zoom Security Settings &#8211; The Concise Details</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zoom Security &#8211; Follow Along to Set Security Settings</title>
		<link>https://fosterinstitute.com/follow-along-to-set-zoom-security-settings/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 03 Apr 2020 15:11:58 +0000</pubDate>
				<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Zoom]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3071</guid>

					<description><![CDATA[<p>Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings. This video is [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/follow-along-to-set-zoom-security-settings/">Zoom Security &#8211; Follow Along to Set Security Settings</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings.</p>
<p>This video is for non-technical people who need to make Zoom more secure today. So, if that’s you, open up your zoom account settings on your screen, and keep this video where you can see it side-by-side. Pause the video when you need to.<span id="more-3071"></span></p>
<p>Some people say, &#8220;Mike, tell us what settings to change to increase our Zoom security.&#8221; If that&#8217;s you, then you are going to love this video. It walks you through your Zoom account settings so you can follow along.</p>
<p><iframe loading="lazy" title="Zoom Security - Follow Along to Set Settings" src="https://player.vimeo.com/video/403594987?dnt=1&amp;app_id=122963" width="384" height="235" frameborder="0" allow="autoplay; fullscreen" allowfullscreen></iframe></p>
<p>I know that some of you will want to fine tune the settings more than this. This video is not designed to replace your IT Pro; they know more about your specific system and requirements.</p>
<p>To help protect your Zoom meetings, watch other videos that cover concerns about using Zoom:</p>
<p><a href="https://fosterinstitute.com/?p=3094&amp;preview=true" target="_blank" rel="noopener noreferrer">Zoom Security &#8211; Set Up Two-Step Login</a></p>
<p><a href="https://fosterinstitute.com/?p=3099&amp;preview=true" target="_blank" rel="noopener noreferrer">Zoom Security Settings &#8211; The Concise Details</a></p>
<p><a href="https://fosterinstitute.com/blog/zoom-security-issues-protect-yourself/" target="_blank" rel="noopener noreferrer">Zoom Security Issues &#8211; Protect Yourself</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/follow-along-to-set-zoom-security-settings/">Zoom Security &#8211; Follow Along to Set Security Settings</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Make your Zoom Secure</title>
		<link>https://fosterinstitute.com/make-your-zoom-secure/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 02 Apr 2020 20:55:51 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Remote Workers]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Zoom]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[cyber security speaker]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[remote worker security]]></category>
		<category><![CDATA[Zoom Safety]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3067</guid>

					<description><![CDATA[<p>Tomorrow (Friday) morning, expect a completed guide that is quick for you to implement to lock down your Zoom security. Get started now on a few settings: To help prevent an attacker logging into your Zoom account, enable two-step login. Once activated, then when you log in, you&#8217;ll enter your password along with a separate [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/make-your-zoom-secure/">Make your Zoom Secure</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Tomorrow (Friday) morning, expect a completed guide that is quick for you to implement to lock down your Zoom security. Get started now on a few settings:<span id="more-3067"></span></p>
<p>To help prevent an attacker logging into your Zoom account, enable two-step login. Once activated, then when you log in, you&#8217;ll enter your password along with a separate numerical code. Rather than sending the code as a text message, Zoom uses a more secure approach and requires you to use a passcode generator app. To configure two-step login, go into your account settings. Scroll down until you see the word Admin in the left-hand column, click on Advanced and then click the security option. Scroll down the main window until you see Sign in with Two-Factor Authentication. Enable the option. Sign out of Zoom and sign back in to complete the installation. Follow the prompts to associate your authentication app with Zoom.</p>
<p>When you schedule a meeting, for Meeting ID setting, select Generate Automatically. I&#8217;ll explain why soon, know that you need to keep your Personal Meeting ID private except for a few people you trust.</p>
<p>Zoom permits you to choose whether or not to require passwords for your meetings. In most cases, you should require a password. As long as someone gets the meeting notice you send them, they won&#8217;t even need the password because the password gets imbedded into the meeting invitation. However, embedding the passphrase inside the invitation exposes you to a risk. If an unauthorized person obtains the invitation, they too can authenticate to your meeting without needing to know the password.</p>
<p>One of the best security features is a tool called Waiting Room. Tomorrow’s tool will show how to set it up quickly. Be sure to sign up for our newsletter to receive the links for a powerful experience tomorrow and a concise video on Monday morning.</p>
<p>The post <a href="https://fosterinstitute.com/make-your-zoom-secure/">Make your Zoom Secure</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Plan Now for Slow Internet and Dropped Phone Calls</title>
		<link>https://fosterinstitute.com/plan-now-for-slow-internet-and-dropped-phone-calls/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 20 Mar 2020 20:01:55 +0000</pubDate>
				<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Remote Worker]]></category>
		<category><![CDATA[Slow Internet]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3061</guid>

					<description><![CDATA[<p>Prepare now for slow Internet speeds and dropped mobile phone calls. Some customers report that their remote workers experience slow Internet speeds. The sheer number of people working from home, and others watching videos at home, is causing the Internet to experience slowdowns similar to traffic during rush hour. You may have heard that Netflix [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/plan-now-for-slow-internet-and-dropped-phone-calls/">Plan Now for Slow Internet and Dropped Phone Calls</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Prepare now for slow Internet speeds and dropped mobile phone calls. Some customers report that their remote workers experience slow Internet speeds. The sheer number of people working from home, and others watching videos at home, is causing the Internet to experience slowdowns similar to traffic during rush hour.<span id="more-3061"></span></p>
<p>You may have heard that Netflix agreed to reduce the picture quality of movies in the UK to reduce the load on the Internet. What&#8217;s that have to do with your company? Prepare a contingency plan now. Something easy to change is to instruct your workers to ask their family members to please download their movies at night rather than streaming the videos during work hours. That way, their family can watch their downloaded movies during the daytime without using up your workers&#8217; remote network speed.</p>
<p>If your remote workers use VPN connections, and they experience slow speeds, your IT team can enable something called split tunneling. Then, if they aren&#8217;t already, your workers&#8217; computers take a shortcut directly to the Internet without going a long way around through your primary office location&#8217;s firewall first. That trades speed for security, so executives have to make the decision, but the change might be worth it if your workers cannot work otherwise. There are other strategies too. Know that recorded video and audio conference calls will make it through even when a real-time conference is so slow it fails.</p>
<p>Other customers explain that the cellular towers in their area are so overloaded that phone calls get dropped, and voices are sometimes garbled beyond understandability. That&#8217;s when text messages, though less convenient, will be your plan B. At least text messages will usually go through even with weak or slow connections.</p>
<p>Please forward this message to your friends so they can have a plan in place at their company in case an Internet or cell phone traffic jam interferes with their business.</p>
<p>The post <a href="https://fosterinstitute.com/plan-now-for-slow-internet-and-dropped-phone-calls/">Plan Now for Slow Internet and Dropped Phone Calls</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Recommendations for Cybersecurity for Remote Workers During Coronavirus</title>
		<link>https://fosterinstitute.com/recommendations-for-cybersecurity-for-remote-workers-during-coronavirus/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 09 Mar 2020 14:36:14 +0000</pubDate>
				<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[remote worker security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3044</guid>

					<description><![CDATA[<p>The rapidly changing situation of potential school closures, self-quarantines, and public reaction to the coronavirus guarantees that at some point you will have employees who need to work from home. If the employee’s computer isn&#8217;t secure, your organization’s security is at risk. Attackers can compromise a home user’s device to gain a pathway into your [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/recommendations-for-cybersecurity-for-remote-workers-during-coronavirus/">Recommendations for Cybersecurity for Remote Workers During Coronavirus</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The rapidly changing situation of potential school closures, self-quarantines, and public reaction to the coronavirus guarantees that at some point you will have employees who need to work from home.<span id="more-3044"></span></p>
<p>If the employee’s computer isn&#8217;t secure, your organization’s security is at risk. Attackers can compromise a home user’s device to gain a pathway into your organization’s network and data. Whether the attacker installs ransomware, steals sensitive information, or shuts down your entire network, you can suffer greatly. Therefore, you need to take essential steps to protect yourself, your employees, and your organization. Here are some key suggestions to help you navigate this crisis.</p>
<p><strong>Remote Access Tools:</strong><br />
Your employees need to securely access email messages, applications, and data. You may need them to participate in secure meetings. They may need a phone that behaves as a secure extension as if they were at the office.</p>
<p>If you already have remote workers, your main concern will be to ensure your servers are powerful enough, your connections to the Internet fast enough, and that you have enough licenses to support the increased volume of activity.</p>
<p>There are so many choices of platforms and tools. Each has its own cybersecurity concerns. You might hear about remote access solutions such as Citrix, GoToMyPC, LogMeIn, Remote Desktop, Splashtop, Terminal Server, and VNC. For meetings you may use BlueJeans, GoToMeeting, Join.me, Microsoft Teams, Skype, and Zoom.* There are others too. Let your IT team use the one they are most familiar with so they can deploy and troubleshoot solutions much quicker. You might ask them to share the pros, cons, and expenses of different solutions, but act as quickly as your risk appetite allows. It is difficult to predict how quickly the reaction to the coronavirus will accelerate.</p>
<p><strong>A VPN Is Not Enough:</strong><br />
There is a worldwide misconception that VPNs provide security. By themselves, they do not. What VPNs do provide is privacy. Think of them as a tunnel that protects data from observation, deletion, and modification while the data travels inside the tunnel. But attacks can lurk at both ends of the tunnel. Therefore, both sides of the VPN connection must be secure. VPNs are useful to protect privacy, and there are other ways to help ensure privacy too.</p>
<p><strong>Connections to the Internet:</strong><br />
Your remote workers need secure connections to the Internet. When they are working from home, they may share their network with less secure family members or compromised IoT devices. That’s why connecting at home might be too risky. Connecting to a coffee shop, hotel, or another public place is reckless unless you mandate compensating controls.</p>
<p>Sometimes the best way to resolve many security risks associated with the remote computer&#8217;s connectivity to the Internet is to provide them with a mobile hot spot. All the major phone carriers provide hotspots and most smartphones have the capability of behaving as a hotspot, enabling employees to connect via mobile phone data plans. Beware that even unlimited data plans are limited; once the user goes over a certain amount of data, the phone provider can throttle the speed of the data to an unacceptably slow connection. If you need unlimited data without throttling, consider a solution such as calyxinstitute.org.* Bear in mind that as more people work from home during the outbreak, mobile data speeds may deteriorate due to congestion. Evening and late nights will usually be faster, not only due to a drop in demand, but also mobile phone providers often allocate more bandwidth to data at night and reallocate bandwidth back to voice calls during the daytime.</p>
<p><strong>Home Wireless Networks:</strong><br />
These days, it’s common that your users already have long wireless passwords and use at least WPA2 encryption on their Wi-Fi network. Disable a feature called WPS. WPS is designed to make it easy for people to connect new devices. Unfortunately, it also makes it easier for attackers to connect. If the user needs WPS to connect a new device, they can enable WPS temporarily. There is an option called MAC filtering that permits your user to specify what devices are allowed to connect to the access point so that, in theory, no unauthorized devices can connect. Beginner hackers know how to bypass MAC filtering, but you could use it to stop less savvy neighbors if you want.</p>
<p><strong>Firewalls:</strong><br />
If your team connects from home networks, the protection from the modem their Internet Service Provider gave them has limited security. Bear in mind that the ISP’s primary goal is to eliminate compatibility issues with anything home users connect, so they avoid tight security controls that could upset a customer or cause more support calls. If possible, it is a great idea to tell the firewall to block specific content. For example, you could tell it to block known malicious sites, sites known for phishing, and websites with content about drugs. You can block traffic from all countries except the ones you need. If you use cloud applications, you may be surprised which countries that software takes you to.</p>
<p>For a secure connection, your IT department might equip your remote employees with smaller SOHO firewalls for their homes that run behind the users’ own firewalls. This can effectively isolate your users from the rest of their home network. If your employee must use a public network such as a coffee shop, your IT team can set up a hardware bridge to help protect their connection. Avoid the temptation to ask your IT team to examine and update consumer firewalls at users&#8217; homes, as that can be enormously time-consuming depending on how many users you have.</p>
<p><strong>Passwords and Cloud Security:</strong><br />
It is essential that you implement two-step verification for all your users. In the most basic form, a person enters their username and password, and then their phone receives a text message with a code they enter to finish the login process. The idea is that even if a bad actor learns someone’s username and password, they will not have access to the person’s mobile phone. To save time and reduce frustration, some websites feature a checkbox to remember that device in the future. </p>
<p>It is essential that your user locks their phone and prevents an unauthorized coworker, family member, or any other person from gaining access to their phone. Use text messages if that is the only option, and know that, while difficult, attackers who know the password might gain access to the text message too. Other options for the second step include phone callbacks, physical USB hardware token keys, authentication apps on phones, and one-tap login solutions. Common choices include YubiKey, Authy, Duo, Google Authenticator, Microsoft Authenticator, and RSA SecurID.* There are many others.</p>
<p>Password managers are helpful; there are many pros and few cons. Ask your IT team their preference, and you may choose to allow your remote workers to use, or not use, password managers the way they do now.</p>
<p><strong>Computer Security Updates and Firewall Patches:</strong><br />
One of the best ways to increase security is to stay current with the most recent security updates for computer operating systems and programs. Security patches for firewalls are often overlooked with potentially devastating results. While at the office, your IT team can usually manage and deploy updates and patches. Your team might need extra tools to manage the updates on remote devices. </p>
<p>If your IT team won&#8217;t have time to manage the remote equipment, it is common to configure remote computers and firewalls to automatically install critical security updates. A big pro is that you can be more secure from known security threats. One con is a slight chance that patches that install automatically might cause a user&#8217;s device to malfunction. Security patches are so essential that you are probably better off applying them. Whether or not to apply updates automatically is a choice for executives to make depending on their risk appetite. Using golden images (see below) can reduce the potential negative impact of a misbehaved update.</p>
<p><strong>Golden Image:</strong><br />
What if it is the middle of the night, or what if your IT team is unavailable, and the user&#8217;s computer is malfunctioning? Ask your IT team to provide employees with an external USB hard drive containing a clean backup image of how their computer should be configured. If the worker’s computer malfunctions, show the users how they can reinstall the golden image the IT team created when the computer was new. When a user restores this &#8220;golden image,&#8221; it is, from a software and operating system perspective, as if the user just received a brand-new computer. Beware that users must backup any local data files prior to restoring an image because the reset is so thorough that existing data will be removed. Another benefit is that if the user suspects there may be a virus on their computer, they can restore the golden image to reset the computer to a clean, fresh start.</p>
<p><strong>Data File Backup to Local Removable Media:</strong><br />
Please do everything possible so that users do not need to store any local data on their computers. If they don&#8217;t need to carry files to and from the office, and if they don&#8217;t need data stored on their computer because it is on the network or in the cloud, that&#8217;s the best scenario. But you may want them to be able to work from home even if their Internet connection fails, or there may be another reason you need them to have files stored locally on their computer. If that&#8217;s the case, then the user should be able to back up their data files to local removable media. Examples include a USB memory stick or USB external hard drive. Your users need to save copies of their data files that are stored on their computer, if any, frequently. The duplicate copies of the files protect the user’s local data. If they need to apply a golden image, or if ransomware encrypts their local files, they need to have their important documents backed up.</p>
<p>It is essential that your IT team configure the backup drives so they are encrypted. It is too great a risk that one of the memory devices falls into the wrong hands and the data is compromised. Windows users can encrypt the devices with BitLocker. Note that if the user&#8217;s home version of Windows isn&#8217;t big enough to permit them to use BitLocker to encrypt their drives, IT can still encrypt the drives at work. Any version of Windows can access drives once they are encrypted with BitLocker. Mac users can use File Vault to encrypt an entire drive, but encrypting individual files is more secure on a Mac. There is another option for drive security that can be easier for your Windows and Mac users. Multiple vendors offer USB hard drives and memory sticks that have number keypads built into the device. Your users can literally type in a code to the device to lock and unlock the data.</p>
<p><strong>Local Account is Standard User:</strong><br />
This is a crucial setting to stop hackers. Your IT team has hopefully had time to fix this setting on the company-issued computers. But if the user will use their home computer, someone needs to make this change on their personal device. Your IT team can fix this for them, making changes in the &#8220;control panel&#8221; under “users.” If you want to try this at home, the steps are: 1) Create a new user as a local account. Name it something like “Superhero.” 2) Change that user’s account type to be a local administrator. 3) Change your account type to standard. Now use your standard account from now on. Login to the account you always do. In case you have Mac users, the process is similar.</p>
<p><strong>Reduce the Attack Surface:</strong><br />
Every program on a computer is a potential attack vector. The more programs you remove, the more secure a computer becomes. If the user is on their home computer, they probably have many non-essential programs. Attackers can exploit Flash and Java to execute malicious code, so it is best to remove both from all computers. Many people find that the websites that are essential work fine without Flash or Java. If they need Flash or Java again later, users can download fresh versions from <a href="https://get.adobe.com/flashplayer/" rel="noopener noreferrer" target="_blank">https://get.adobe.com/flashplayer/</a> or <a href="http://java.com" rel="noopener noreferrer" target="_blank">java.com</a>.</p>
<p><strong>Computer Anti-Virus and Software Firewall Settings:</strong><br />
If your employees have company-issued devices, chances are that your IT team configures and maintains their anti-malware solution. If employees will use their home computers, they must be sure their anti-virus is working properly and is up-to-date.</p>
<p>It is essential that they configure the software firewall program component of their anti-virus product, or the software firewall built into their computer&#8217;s operating system, to refuse all incoming connections. Some firewalls and Macs provide an option called “stealth mode.” When you activate this, you may get a scary warning that if you configure the computer to hide, it becomes difficult for outside parties to connect to the computer. Yes, that&#8217;s the point! Block everyone. Nobody needs in except your IT professionals, and they already have a way in.</p>
<p><strong>Physical Security:</strong><br />
If an attacker gains physical access to a user&#8217;s laptop, computer, phone, tablet, or other devices, compromising the security is magnitudes easier. Calculate the impact if a user’s device is compromised, allowing attackers access into your network. The repercussions to your organization might be devastating. If necessary, provide your users with pick-proof locks for their doors. You can ask them to take photos of their home locks to send to you, and you might want to send a member of your facilities team, or a specialist, to examine their home&#8217;s security.</p>
<p>Sometimes companies issue outside security cameras and inexpensive alarm systems to their employees. While those sound like a good idea, they primarily detect, not prevent, break-ins. Deterrents are certainly good, including alarm stickers on doors and windows. But remember to implement preventative controls including high-quality deadbolt locks, reinforced door jambs, and sliding door security bars. Exterior motion-sensing flood lights can be very effective too. Having tight security can even enhance your employees&#8217; and their family&#8217;s personal safety. Giving them added peace-of-mind during this crisis is helpful.</p>
<p><strong>UPS Battery Backup:</strong><br />
If the coronavirus response becomes very serious, it is possible users might experience loss of power. If there is a loss, hopefully it will be short. Consider providing battery backup devices to users with desktop computers, printers, and home modems. If the user has a charged laptop and a charged battery-powered hotspot, and no printer, the battery backup is often unnecessary.</p>
<p><strong>Special Security Training about Coronavirus:</strong><br />
Warn your workers that there will be an increase in spam and phishing as bad actors prey on their worries of the virus. They must be vigilant to spam and fake news. Recent hacks provided attackers with detailed information about families and histories, so that phishing can be more convincing than ever. Manually visiting, rather than clicking links to, <a href="https://www.ready.gov/" rel="noopener noreferrer" target="_blank">ready.gov</a> and <a href="https://www.cdc.gov/" rel="noopener noreferrer" target="_blank">CDC.gov</a> contain information about how to prepare and find status updates. </p>
<p><strong>Test Remote Access: </strong><br />
All of your users need to engage in a “pretend it is real” run through. Once they are configured, they need to test performing all of their job functions working from home to be sure everything performs as expected. Solve problems that come up. If one user has an issue, take preemptive action to be sure it doesn&#8217;t happen with the others. This is too important to not test out ahead of time. Your workers may wake up one morning and find out they have to stay at home that day. Every night they need to take what they&#8217;ll need to work from home just in case. If they are able to come to work the next day, they&#8217;ll need to haul all that stuff back and forth. Minimize as much as possible what they&#8217;ll need to take.</p>
<p>Additionally, give your employees guidelines on what to do if they lose connectivity to the office, and what to do if they feel like their remote computer might be under attack. Consider that, if your IT team is busy tackling bigger challenges, they may not be available to help that user right then.</p>
<p><strong>Show Extra Gratitude to IT:</strong><br />
Finally, throw a big party for your IT team that made all of this happen. Chances are they&#8217;ve invested more energy and patience than you know because they make it look so easy. Tell them that you recognize the amount of expertise they needed to get you to the point of accomplishing this list. A little gratitude goes a long way.</p>
<p>All your preparations are worth it. The World Health Organization is already saying there will be more viruses in Earth&#8217;s future. You are preparing for the future too. Good job implementing these recommendations now. The increase in the number of people who must work from home because of coronavirus could accelerate quickly at any time.</p>
<p>Please forward this to your friends so they can prepare their organizations too.</p>
<p>*The Foster Institute, Inc. does not receive any compensation from, nor does it endorse, any products or companies mentioned in this article.</p>
<p>The post <a href="https://fosterinstitute.com/recommendations-for-cybersecurity-for-remote-workers-during-coronavirus/">Recommendations for Cybersecurity for Remote Workers During Coronavirus</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
