Foster Institute
  • What Keeps You
    Up At Night?
  • Cybersecurity Services
  • Professional Speaking
  • FAQs
  • Testimonials
  • Blog
  • Contact
  • 800-657-7107
Select Page

Mike Foster’s IT Security & Best Practices Blog

  • How to Find Out if Your Password Might Have Been Hacked

    You hear in the news that Yahoo, or some other company, got hacked and your username and password may be in the hands of attackers. There is a way to find out if your credentials were exposed.

    Continue Reading
  • “This is Your Captain Speaking – No Samsung Phones Allowed”

    Yesterday afternoon, I and some of the more than 100 other passengers on our jet were paying attention to the safety demo. Unexpectedly, the announcement included a statement that prohibited the use of a Samsung Galaxy Note 7 phone. Additionally, charging such a device is prohibited too. Now that’s harsh… or is it?

    Continue Reading
  • A Way to Control Consultant Access – Every Time

    What if you’d like to know each and every time a consultant attempted to access your systems? And would you like the ability to approve or deny each attempt?

    Continue Reading
  • Delta Airlines Believes their Epic Technology Failure is like Painting a Bridge

    On August 8, Delta had to cancel 2,000 flights due to a major technology malfunction. It could have been prevented.

    Continue Reading
  • E-Savvy Newsletter Sign-Up

    Plain English IT Security Solutions and Best Practices for Executives

Recent Blog Post

  • The Next Time You’re Bored or Waiting, Delete Some Unused Apps from your Android or iPhone
  • Anatomy of a Password Attack, and How to Prevent Them
  • Vacationing? Use Safer Internet Connections
  • Tell People about Covering Cameras, and You Might Save a Life

Categories

  • Cybersecurity
  • Family Security
  • Hacking
  • Alerts
  • Mobile security
  • Cybersecurity Audits
  • Supporting IT Professionals
  • Password Security
  • Wireless Security
  • Ransomware
  • Cloud Security
  • Email security

Popular Tags

apple computer computer security cyber security Cyber Security Best Practices Cyber Security Breach Cyber Security Consultant cyber security expert Cyber Security Tips hackers Internet Internet Safety Tips iPad IT it best practices IT network safety IT network security IT pros it risk management IT Security it security audit IT security consultant it security expert IT security procedures it security review IT security training Keep viruses out of your network Keep Your Network Safe Managing IT Professionals network security professionals protect Ransomware recommendations Relating to IT Professionals risk management Safe Network secure security Security expert Security Measures Strong Security tech support Working with executives Working With IT People
The Foster Institute
PO Box 11030
Bozeman, MT, 59719

USA / Canada:  1-800-657-7107

International: 707-200-2095

Fax: 1-800-657-8564

International Fax: 1-305-503-9500

Contact

About

  • About Mike Foster
  • What Keeps You Up At Night?
  • Speaking and Training
  • Testimonials
  • Schedule a Consultation

Services

  • IT Vital Systems Security Review and Audit
  • Cybersecurity for Small Businesses
  • Cloud Security
  • Website/Web Application Security
  • Mobile Device Security
  • Penetration Testing
  • Training and Phishing
  • NIST CMMC Compliance
  • Physical Security Evaluation and Red Team Exercises

Resources

  • Help! I’ve Been Hacked
  • Message for CEOs and Executives
  • Message for IT Professionals
  • Blog
  • E-Savvy Newsletter
  • FAQs

Contact

The Foster Institute
PO Box 11030
Bozeman, MT, 59719

USA / Canada:  1-800-657-7107

International: 707-200-2095

Fax: 1-800-657-8564

International Fax: 1-305-503-9500

Contact
  • Follow
  • Follow

Subscribe to the E-Savvy Newsletter

Plain English IT Security Solutions and Best Practices for Executives

Proudly Serving the Entire USA

©MMXX The Foster Institute Inc. All Rights Reserved. Legal Forms. Sitemap.Web design & SEO by Prime Concepts Group, Inc.