<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>network security Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/network-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/network-security/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Wed, 24 Jul 2019 19:37:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>network security Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/network-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Find Out if You Can Collect a Bundle from the Equifax Breach</title>
		<link>https://fosterinstitute.com/find-out-if-you-can-collect-a-bundle-from-the-equifax-breach/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 24 Jul 2019 19:37:52 +0000</pubDate>
				<category><![CDATA[Credit Freeze]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT review]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[Security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2981</guid>

					<description><![CDATA[<p>There is a strong chance that hackers obtained your identity information in the Equifax breach. It exposed 148 million American&#8217;s sensitive information, and that sets you and your family up for identity theft. If you already suffered identity theft and can prove Equifax was the source, you might get up to twenty thousand dollars. Beware [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/find-out-if-you-can-collect-a-bundle-from-the-equifax-breach/">Find Out if You Can Collect a Bundle from the Equifax Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There is a strong chance that hackers obtained your identity information in the Equifax breach. It exposed 148 million American&#8217;s sensitive information, and that sets you and your family up for identity theft. If you already suffered identity theft and can prove Equifax was the source, you might get up to twenty thousand dollars.<span id="more-2981"></span></p>
<p>Beware of additional fraud. Several sites are claiming to help you find out if you were part of the breach, but of course, the sites ask for personal information. Be safe: Use the contact information provided by <a href="https://www.equifax.com" target="_blank" rel="noopener noreferrer">Equifax</a>. The Equifax FAQ says to visit: <a href="https://www.equifaxsecurity2017.com/" target="_blank" rel="noopener noreferrer">https://www.equifaxsecurity2017.com/</a></p>
<p>To find out if you are affected, that site points you to: <a href="https://www.equifaxbreachsettlement.com/" target="_blank" rel="noopener noreferrer">https://www.equifaxbreachsettlement.com/</a></p>
<p>For identity theft, credit monitoring is helpful, so you know you are a victim, but by then, it is too late.</p>
<p>Placing credit freezes are a critical step in preventing your identity from being stolen.&#8221;</p>
<p>Freeze your credit, everyone in your family&#8217;s, at all major credit bureaus. To save you time, here are four and how to reach them:</p>
<p>Experian (888) 397-3742<br />
<a href="https://www.experian.com/freeze/center.html" target="_blank" rel="noopener noreferrer">https://www.experian.com/freeze/center.html</a></p>
<p>TransUnion LLC – To Freeze: (888) 909-8872<br />
<a href="https://www.transunion.com/credit-freeze" target="_blank" rel="noopener noreferrer">https://www.transunion.com/credit-freeze</a></p>
<p>Equifax Information Services, LLC (800) 685-1111<br />
<a href="https://www.equifax.com/personal/credit-report-services/" target="_blank" rel="noopener noreferrer">https://www.equifax.com/personal/credit-report-services/</a></p>
<p>Innovis – To Freeze: (800) 540-2505<br />
<a href="https://www.innovis.com/personal/securityFreeze" target="_blank" rel="noopener noreferrer">https://www.innovis.com/personal/securityFreeze</a></p>
<p>Please forward this to your friends. If they don&#8217;t understand the importance of a credit freeze, The FTC provides more information at <a href="https://www.consumer.ftc.gov/articles/0497-credit-freeze-faqs" target="_blank" rel="noopener noreferrer">https://www.consumer.ftc.gov/articles/0497-credit-freeze-faqs</a></p>
<p>The post <a href="https://fosterinstitute.com/find-out-if-you-can-collect-a-bundle-from-the-equifax-breach/">Find Out if You Can Collect a Bundle from the Equifax Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Patching – 10 Steps to Seal the Holes in Your Armor</title>
		<link>https://fosterinstitute.com/patching-10-steps-to-seal-the-holes-in-your-armor/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 15 May 2017 15:42:19 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Patch Updates]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[applying patches]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[ipad security]]></category>
		<category><![CDATA[iphone Security]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Microsoft patch]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[patch deployment]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[patches]]></category>
		<category><![CDATA[ransomware attack]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[updating patches]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2482</guid>

					<description><![CDATA[<p>You’ve likely heard of the massive ransomware attack that has taken down so many organizations, including hospitals, around the world. The ransomware appears to have exploited a bug for which Microsoft released a fix a little over a month ago. Follow these 10 steps to help protect your organization from this, and from future attacks: [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/patching-10-steps-to-seal-the-holes-in-your-armor/">Patching – 10 Steps to Seal the Holes in Your Armor</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You’ve likely heard of the massive ransomware attack that has taken down so many organizations, including hospitals, around the world. The ransomware appears to have exploited a bug for which Microsoft released a fix a little over a month ago. Follow these 10 steps to help protect your organization from this, and from future attacks:<span id="more-2482"></span></p>
<p>Instructions for Windows and Apple home users are listed below the numbers. For organizations, here are 10 Steps To Avoid Incidents Including the Massive Ransomware Attack:</p>
<p>1. The reality is that most organizations are missing critical security patches and there is a very strong likelihood that yours is too.</p>
<p>2. Provide your team with extra time, and perhaps additional personnel, to test and then deploy patches ASAP. Some organizations are adding a new IT professional to their team whose sole responsibility is to manage patches. If the patch fails testing, then time must be invested to resolve the issue or implement compensating controls.</p>
<p>3. Prioritize critical security patches for the operating system, all the browsers, Flash, Java, your PDF Reader, and Microsoft Office. They are usually the easiest to attack and form your first line of defense.</p>
<p>4. Many IT teams are very reluctant to apply patches for fear of breaking your systems that are already running. Help remove their fears by reassuring them that you take on responsibility if the patch causes a problem. Encourage them to follow a procedure that mitigates risks:</p>
<p>5. Test Patches in a test environment that uses the same applications as the rest of your network. For very small companies, your test environment might be a single computer. For larger organizations, and organizations that stand to lose a great deal in the event of an attack, create a separate testing environment that is isolated from the production environment.</p>
<p>6. Have a pre-tested rollback plan so that, if the patch does cause a problem, your IT team will already know what they need to do right away to roll back a patch that causes an unexpected problem. They will then go back to the testing phase.</p>
<p>7. Deploy the patches in stages rather than patching all machines simultaneously. That way, even if the patch does cause a problem, not all your machines will be affected.</p>
<p>8. You may decide to empower your IT team with a patch management tool such as Ninite, LANGuard, Shavlik, or others. Allow them to test and choose a tool, and provide them with the means and time to do so, ASAP.</p>
<p>9. Ask IT, perhaps weekly and at least monthly, to provide you with a list of missing patches, not a pie chart.</p>
<p>10. You must upgrade from older operating systems, any of the ones that Microsoft no longer supports. If some machines cannot be upgraded, then they must be isolated or some other compensating control put into place. Microsoft clearly states when they stop producing patches for old operating systems.  So, there was no patch available for Windows XP and others.</p>
<p>Call me if they are not able to apply patches. Let’s team up to help prevent this.</p>
<p>At home, or if your organization is so small that you do not have an IT team or have an outsourced IT company that takes care of your patches, be sure that the option that provides automatic updates to Microsoft is enabled. The instructions are easy to find – just google the phrase: configure automatic updates site:Microsoft.com</p>
<p>Apple computer users, google: Automatic security updates os x site:apple.com</p>
<p>iPhone and iPad users, google: Automatic security downloads ios site:apple.com</p>
<p>Additionally, manually check for updates in Microsoft Office to be sure those are applied. Be sure that automatic updates are enabled in your browsers. Regularly download and apply patches to, or new versions of, Flash, Java, and your PDF reader.</p>
<p>Please forward this to everyone you care about and want to help stay secure.</p>
<p>The post <a href="https://fosterinstitute.com/patching-10-steps-to-seal-the-holes-in-your-armor/">Patching – 10 Steps to Seal the Holes in Your Armor</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Heartbleed Hack Impacts You Too</title>
		<link>https://fosterinstitute.com/heartbleed-hack-impacts-you-too/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 10 Apr 2014 17:30:04 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[heartbleed hack]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[last pass]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[openssl]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1870</guid>

					<description><![CDATA[<p>There is a zero-day attack (meaning there was no patch) that allows attackers to bypass your encryption. Attackers can bypass your website&#8217;s security, as well as access all of the information you thought was &#8220;secure&#8221; at the websites you use &#8211; like banking sites. What to do: First: Ask your web application designer to patch [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/heartbleed-hack-impacts-you-too/">Heartbleed Hack Impacts You Too</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There is a zero-day attack (meaning there was no patch) that allows attackers to bypass your encryption. Attackers can bypass your website&#8217;s security, as well as access all of the information you thought was &#8220;secure&#8221; at the websites you use &#8211; like banking sites.<span id="more-1870"></span></p>
<p>What to do: </p>
<p>First: Ask your web application designer to patch OpenSSL if your site uses OpenSSL (about 85% do). Consider telling them to &#8220;get new keys&#8221; for your site in case your old keys are already stolen.</p>
<p>Second: Reset your passwords on the websites on which you care to keep your information secure. Know that the web site&#8217;s you&#8217;ve been visiting may have already been compromised, and will remain compromised until those sites fix the problem. Once they fix the problem, you need to reset your password again.</p>
<p>LastPass created a tool that will allow you to see if a site is susceptible to Heartbleed. Visit: <a href="https://lastpass.com/heartbleed/">LastPass</a></p>
<p>Websites, perhaps including yours, that use encryption, may be completely vulnerable. Attackers can access the &#8220;keys&#8221; that are used to securely lock your data during transit. Once the attacker has the keys, they can read sensitive data from your site and use the keys to bypass your protection. Without getting technical, this relates to sites that use the &#8220;s&#8221; as in https:\\websitename.com vs. sites that aren&#8217;t encrypted http:\\websitename.com</p>
<p>Additionally, until the websites that you visit apply their fixes too, your information will be vulnerable too. This includes shopping sites, banking sites, and other sites that you trust. Not only do the sites need to patch the security holes, they need to register for brand new &#8220;keys.&#8221;</p>
<p>Please post your comments below &#8230;.</p>
<p>The post <a href="https://fosterinstitute.com/heartbleed-hack-impacts-you-too/">Heartbleed Hack Impacts You Too</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Bank Tells Us To Disable Security!</title>
		<link>https://fosterinstitute.com/the-bank-tells-us-to-disable-security/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 13 Feb 2014 17:05:35 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT network safety]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[reducing security levels]]></category>
		<category><![CDATA[Working With IT People]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1817</guid>

					<description><![CDATA[<p>Ask your IT Professionals, “Has any vendor, even the bank, asked us to reduce security levels on any of our machines or the network?” Counterintuitively, the bank often tells your IT professionals to disable important security protection. This happens when your bank gives you a program or web site in order for your users to [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/the-bank-tells-us-to-disable-security/">The Bank Tells Us To Disable Security!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Ask your IT Professionals, “Has any vendor, even the bank, asked us to reduce security levels on any of our machines or the network?” Counterintuitively, the bank often tells your IT professionals to disable important security protection. This happens when your bank gives you a program or web site in order for your users to make online deposits, pay bills, calculate payroll, or do anything else related to banking.<span id="more-1817"></span></p>
<p>By the way, here is a short 2 minutes and 40 seconds video that explains this: </p>
<p><iframe width="560" height="315" src="//www.youtube.com/embed/KRsN2wzeYQQ?rel=0" frameborder="0" allowfullscreen></iframe></p>
<p>Is the bank kidding? Reduce security? Really? One of the reasons you have security is to protect against attackers gaining access to your online banking!</p>
<p>Often, banks tell IT to disable protections so you don’t experience technical difficulties. If your security measures mistakenly identify the bank as an attacker, the online banking may not work right.</p>
<p>Two key points:</p>
<ol>
<li>The bank is simply passing along instructions from the company that provides the electronic banking services to the bank. This isn’t the bank’s idea.</li>
<li>It isn’t just banks. Some of our customers have insurance software providers, medical applications, voice enabled tools, etc, telling our customers to reduce security on some of the customer’s machines.</li>
</ol>
<p>So what do you do when a vendor tells your IT Pros to lower your defenses? You tell your IT person to keep security in place and to open up the bare minimum that the banking functions need in order to operate properly.</p>
<p>Tight restrictions are the key. Your IT Professionals know that they can still protect users when the users visit other web sites, and still set a browser exception just for the bank’s site. Your IT Professionals understand about reducing security only on source and destination locations (in this case, between your network and the bank) in order to provide more leeway during online banking communications but still restrict other communications.</p>
<p>Sometimes banks recommend that you set up a separate computer to use only for banking. See: <a href="https://fosterinstitute.com/blog/banking-computer/">Should Executives Buy a Second Computer for Banking? </a></p>
<p>There is a chance your IT Professional may elect to configure a “virtual computer” inside one of the workstations so you don’t need to buy another machine. The same posting, <a href="https://fosterinstitute.com/blog/banking-computer/">Should Executives Buy a Second Computer for Banking?</a>, includes information about a third strategy too.</p>
<p>In a perfect world, 100% of the companies that provide software applications to banks (and elsewhere) will invest the time to make their applications function properly with strong security still in place.</p>
<p>But vendors are incentivized to produce “inexpensive” software. Things will get better when enough Executives, like you, start understanding this problem, and demanding better service!</p>
<p>If you haven’t already, ask your IT professionals if your banking applications mandated any kind of reduced security settings. Your IT Pros will be happy you started this discussion. They want to keep your network secure and sometimes don&#8217;t want to interrupt you and respect your dedication to your own tasks.</p>
<p>Please forward this to your friends and post your comments below…</p>
<p>The post <a href="https://fosterinstitute.com/the-bank-tells-us-to-disable-security/">The Bank Tells Us To Disable Security!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Three tips for using Wi-Fi in public places</title>
		<link>https://fosterinstitute.com/three-tips-for-using-wi-fi-in-public-places/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 07 Jun 2012 04:00:51 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[Wi-Fi]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1356</guid>

					<description><![CDATA[<p>When you want to check email in the coffee shop, the airport, or the hotel, how do you help protect yourself and your computer? Three tips: First of all, realize that someone may be watching your data go back and forth to the web sites you visit. Behave accordingly. Second, know that when you visit [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/three-tips-for-using-wi-fi-in-public-places/">Three tips for using Wi-Fi in public places</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>When you want to check email in the coffee shop, the airport, or the hotel, how do you help protect yourself and your computer?<br />
<span id="more-1356"></span><br />
<strong>Three tips:</strong></p>
<p>First of all, realize that someone may be watching your data go back and forth to the web sites you visit. Behave accordingly.</p>
<p>Second, know that when you visit a web site with an address that starts with HTTPS://, rather than HTTP:// without the S, the attack process becomes much more difficult. Using your bank web site is more secure than looking up nearby restaurants on yelp.com.</p>
<p>Third, accessing your email from a public place? It depends on how your IT professionals configured the connection. Not always, but usually accessing email is secure. Check with a qualified IT professional to be sure. If they use Outlook Web Access OWA or Outlook Anywhere, there are built-in mechanisms to help keep your data secure.</p>
<p>And, a bonus tip is to know that one of the best ways to protect yourself is to not use Wi-Fi at all. Instead, sign up for a data plan from ATT, Verizon, Sprint or other carrier. And, if you have tethering on your phone&mdash;guess what, the connection from the phone to your computer may very well be, you guessed it, Wi-Fi!</p>
<p>Post your comments on this blog.</p>
<p>The post <a href="https://fosterinstitute.com/three-tips-for-using-wi-fi-in-public-places/">Three tips for using Wi-Fi in public places</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Single Biggest Way to Repel IT Attacks</title>
		<link>https://fosterinstitute.com/repel-it-attacks/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 12 Apr 2012 04:00:20 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[recommendations]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1278</guid>

					<description><![CDATA[<p>Attackers have learned that one of the easiest and most successful ways to successfully take control of a network is to launch attacks against vulnerable programs on your systems. It is almost certain that you are not protected against these attacks&#8212;at least not until you take important steps. Many viruses and other malware exploit vulnerabilities [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/repel-it-attacks/">Single Biggest Way to Repel IT Attacks</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Attackers have learned that one of the easiest and most successful ways to successfully take control of a network is to launch attacks against vulnerable programs on your systems. It is almost certain that you are not protected against these attacks&mdash;at least not until you take important steps.<br />
<span id="more-1278"></span><br />
Many viruses and other malware exploit vulnerabilities in applications. Are all of your patches current for applications such as Adobe Acrobat, Flash, Java, Microsoft Office, etc.?</p>
<p>In some cases, the application patches are even more important than OS patches&mdash;although both are important.</p>
<p>Attackers often exploit applications before the vendor has issued a patch to prevent the exploit. These attacks are referred to as zero-day exploits. </p>
<p>Your organization&#8217;s IT professionals need to create a list of applications in order to apply patches ASAP because, unless they identify all of your applications, they will not be able to patch all of them.</p>
<p>Ensure that new application patches get tested first on non-production machines. The test needs to be instituted immediately after the patch is released. Desktop and server virtualization can help IT with the testing process by providing a method to run server and workstation configurations on a single piece of hardware for testing.</p>
<p>Please post your comments on this blog.</p>
<p>The post <a href="https://fosterinstitute.com/repel-it-attacks/">Single Biggest Way to Repel IT Attacks</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Executives – what vendor wants to connect?</title>
		<link>https://fosterinstitute.com/vendor/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 20 May 2010 04:00:12 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[secure]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=497</guid>

					<description><![CDATA[<p>More and more executives tell me, “We are moving to a new vendor to provide a service to us and they want to connect to our internal network.” Do you realize the dangers? Some IT professionals tell me that their “boss” came down and said, “Give company such and such access into our network to [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/vendor/">Executives – what vendor wants to connect?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>More and more executives tell me, “We are moving to a new vendor to provide a service to us and they want to connect to our internal network.” Do you realize the dangers?</p>
<p><span id="more-2739"></span>Some IT professionals tell me that their “boss” came down and said, “Give company such and such access into our network to access our data files so they can provide such and such service.” If the IT professional was brave enough to object to the “order,” they often got shot down.</p>
<p>If your IT professional knows anything about security, they get some pretty sweaty palms when opening up access to other companies. Their nights of restful sleep are probably over at that point too. And so should the executives be terrified!</p>
<p>Please do NOT open up your network for access by third party companies. I run into this at four or five companies a month and it has to stop!  Do you realize that:</p>
<ul>
<li>If the other company catches a virus, you probably will too?</li>
<li>If an employee at the other company wants to steal your data, destroy your information, and even store illegal information at your office, they can?</li>
<li>If you have a security problem, the other company may come after you for damages you cause on their network?</li>
</ul>
<p>Indeed, it is feasible to outsource some of your services and functions into the “cloud.” More and more organizations are doing this.</p>
<p>The important part is to connect to the other entity in a responsible way!  Allowing them unfettered access into your network is often a reckless choice.</p>
<p>The post <a href="https://fosterinstitute.com/vendor/">Executives – what vendor wants to connect?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Are vulnerability scans of your network helpful?</title>
		<link>https://fosterinstitute.com/scans/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 22 Apr 2010 04:00:12 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Keep viruses out of your network]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<category><![CDATA[network security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=478</guid>

					<description><![CDATA[<p>As part of the Foster Institute IT Security Assessments, we always offer to perform vulnerability assessments and they are indeed very helpful.  Executives can help IT professionals overcome the negative effect to the results of a vulnerability scan&#8230; The primary reason we perform vulnerability assessments as parts of security assessments is to generate an inventory [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/scans/">Are vulnerability scans of your network helpful?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As part of the Foster Institute IT Security Assessments, we always offer to perform vulnerability assessments and they are indeed very helpful.  Executives can help IT professionals overcome the negative effect to the results of a vulnerability scan&#8230;</p>
<p><span id="more-478"></span></p>
<p>The primary reason we perform vulnerability assessments as parts of security assessments is to generate an inventory of all the computers currently alive on the network and a list of vulnerabilities those computers have.</p>
<p>The challenge is that the human brain loves a &#8220;list of what&#8217;s wrong.&#8221;  Most of the IT professionals at organizations go immediately to work solving the identified problems thereby “killing alligators.”</p>
<p>We always implore executives and IT professionals alike to focus on “draining the swamp” in addition to, and sometimes instead of, “killing alligators.”</p>
<p>In our ongoing effort to help IT professionals and organizations focus on strategic, as well as tactical, plans to take IT to the next level, I sometimes feel like a dentist who hands out new toothbrushes as well as a gift certificate to the local candy store in the same visit.</p>
<p>Vulnerability assessments are wonderful—just remember to focus on the one or two strategic changes that can fix one hundred or more tactical issues.</p>
<p>The post <a href="https://fosterinstitute.com/scans/">Are vulnerability scans of your network helpful?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Do we need more government regulation?</title>
		<link>https://fosterinstitute.com/regulation/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 04 Feb 2010 04:00:29 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<category><![CDATA[network security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=410</guid>

					<description><![CDATA[<p>I was giving a presentation in 2009, and a CEO of a successful corporation talked about how he received one of those letters saying, &#8220;Your data may have been obtained by hackers due to a data breach.&#8221; He asked, &#8220;What can we do to get the other businesses in the world to keep our data [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/regulation/">Do we need more government regulation?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="line-height: 18px;">I was giving a presentation in 2009, and a CEO of a successful corporation talked about how he received one of those letters saying, &#8220;Your data may have been obtained by hackers due to a data breach.&#8221; He asked, &#8220;What can we do to get the other businesses in the world to keep our data safe?&#8221;</p>
<p><span id="more-2730"></span>Before I could catch them, these words spewed out of my mouth: &#8220;We need more government regulation of businesses.&#8221;  I immediately stopped, appalled at what I had just said, and stood there in disbelief.</p>
<p>The fact is, due to a number of problems in organizations, IT security too often gets pushed to the back burner. Next week&#8217;s blog entry will deal with those reasons. Do we need more laws to force companies to be secure? For the responsible companies I work with, I say &#8220;No! Enough regulation already!&#8221; I know they are taking steps to be more secure. But for those companies that send the rest of us letters notifying us of breaches, I think we all would have been happy if some regulation forced them to be more careful with private information. PCI-DSS standards for companies that accept payment cards is still a regulation—except in Nevada where it is now a law. Minnesota also has laws around the core requirements of PCI-DSS.</p>
<p>I used to be totally against some government regulations, but as I see some organizations being careless with your private data, I wonder if a little regulation might go a long way? Please respond with your comments on this blog.</p></div>
<p>The post <a href="https://fosterinstitute.com/regulation/">Do we need more government regulation?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Banks suggest you dedicate one PC for online banking</title>
		<link>https://fosterinstitute.com/online-banking/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 21 Jan 2010 04:00:54 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Save time]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[professionals]]></category>
		<category><![CDATA[recommendations]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=391</guid>

					<description><![CDATA[<p>USA Today reports that the American Bankers Association (ABA) recommends small and mid-sized businesses dedicate a computer to use only for online banking, and avoid using any other computers for online banking. While this may sound good, it can create headaches in practice. The theory is that, if the &#8220;online banking only&#8221; computer is only [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/online-banking/">Banks suggest you dedicate one PC for online banking</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="line-height: 18px;">USA Today reports that the American Bankers Association (ABA) recommends small and mid-sized businesses dedicate a computer to use only for online banking, and avoid using any other computers for online banking.  While this may sound good, it can create headaches in practice.</p>
<p><span id="more-2728"></span>The theory is that, if the &#8220;online banking only&#8221; computer is only used for online banking and nothing else, the computer is less likely to be infected with viruses, key loggers, and other malicious software.</p>
<p>Having two computers comes at a huge cost to convenience for the people in your office that need to perform online banking. That means they need to have two computers at their desk. They could use a KVM switch to use their same keyboard, monitor, and mouse to switch back and forth between the computers.</p>
<p>Your IT professional might be willing to set up a virtual machine on the regular machine to use for online banking, but IT will still need to keep that virtual machine current with patches and protected with anti-virus. The end-user may become confused using the virtual machine and reject the idea completely.</p>
<p>Controls would probably need to be put in place to limit access to banking web sites to the single machine so no employees ever &#8220;cheat&#8221; and use their own workstation to access online banking.</p>
<p>On a positive note, an inexpensive computer would be more than enough to handle the online banking, and there are tools like Microsoft&#8217;s Microsoft Steady State and Deep Freeze (<a href="http://www.faronics.com/html/deepfreeze.asp" target="_blank" rel="noopener">http://www.faronics.com/html/deepfreeze.asp</a>) that can help lock the machine down to a single purpose and help protect from infections.</p>
<p>Do you dedicate a single computer for your online banking tasks? What is your response to the ABA&#8217;s advice? Please add your comments to the blog.</p></div>
<p>The post <a href="https://fosterinstitute.com/online-banking/">Banks suggest you dedicate one PC for online banking</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
