<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Preventing IT network theft Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/preventing-it-network-theft/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/preventing-it-network-theft/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Thu, 21 Oct 2010 04:00:30 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Preventing IT network theft Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/preventing-it-network-theft/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>For traveling users, wireless 3G is better than hotels</title>
		<link>https://fosterinstitute.com/wireless-3g/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 21 Oct 2010 04:00:30 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[connectivity]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<category><![CDATA[Preventing IT network theft]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[recommendations]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=665</guid>

					<description><![CDATA[<p>From the standpoints of speed, cost, and security, you may find that providing a Sprint, AT&#38;T, Verizon, or T-Mobile wireless connection will be much better than using hotel provided Internet services. It is common for hotels to charge almost ten dollars a night for Internet access. If your traveler stays in at least six hotels [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/wireless-3g/">For traveling users, wireless 3G is better than hotels</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>From the standpoints of speed, cost, and security, you may find that providing a Sprint, AT&amp;T, Verizon, or T-Mobile wireless connection will be much better than using hotel provided Internet services.<br />
<span id="more-665"></span><br />
It is common for hotels to charge almost ten dollars a night for Internet access. If your traveler stays in at least six hotels a month, then it is about the same  price to have a wireless card that uses the mobile phone towers.</p>
<p>There are easy to access tools that allow even unsophisticated criminals to monitor your traffic if you go through a hotel’s network. When you use one of the 3G services, this equipment doesn’t work anymore. Not to say that the 3G connection is totally secure, but all things being equal, it is almost always more secure than a WiFi or plug-in Ethernet port at a hotel.</p>
<p>Then there is speed. So many hotels have very limited bandwidth, and when the hotel is full of hotel guests using the Internet service, everything slows to a crawl.  When your traveler whips out their 3G card, they may find that the access is much faster—especially if they are not in a fringe coverage area, and not in a very congested city.</p>
<p>Please share your experiences and post your comments on this blog.</p>
<p>The post <a href="https://fosterinstitute.com/wireless-3g/">For traveling users, wireless 3G is better than hotels</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Easily steal the information from a computer</title>
		<link>https://fosterinstitute.com/steal-information/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 06 Aug 2009 04:00:45 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[danger]]></category>
		<category><![CDATA[IT network safety]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<category><![CDATA[Preventing IT network theft]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=245</guid>

					<description><![CDATA[<p>I am in the business of helping you keep your computers safe. You need to know how easy it is for someone to take your data from you. Here is a video. There is a wonderful product on the market that will make backups of your computer quickly and easily. The problem is, a criminal [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/steal-information/">Easily steal the information from a computer</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I am in the business of helping you keep your computers safe. You need to know how easy it is for someone to take your data from you. Here is a video.</p>
<p><span id="more-2710"></span>There is a wonderful product on the market that will make backups of your computer quickly and easily. The problem is, a criminal can use this product to steal your information. This is supposed to be a short sales video, and I want you to consider how you would feel about the video if a criminal used this to steal your computer’s information: <a href="http://www.youtube.com/watch?v=S-aHtWOYGvg" target="_blank" rel="noopener">http://www.youtube.com/watch?v=S-aHtWOYGvg</a></p>
<p>And, in their support, I see this as a very useful tool for home users who never back up their computers – and risk losing years of precious photos of their family. I bought one for myself to show to executives and recommend for people who do not make backups because they feel backups are too much trouble. This is a great tool in your hands for use on your own computer.</p>
<p>There are other ways cyber criminals can steal your data, but you can slow them down if you never leave your computer unattended and logged in if you store any private information such as credit card numbers, banking information, social security numbers, etc.  In Windows, you can use the key combination “windows-L” to lock your screen. You need a secure password.  That makes it more difficult, though not impossible, to steal your data.</p>
<p>Summary: Great tool in your hands; horrible tool for hackers to use against you.</p>
<p>The post <a href="https://fosterinstitute.com/steal-information/">Easily steal the information from a computer</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Are You Prepared for an IT Security Breach?</title>
		<link>https://fosterinstitute.com/it-security-breach/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sun, 14 Oct 2007 15:55:57 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<category><![CDATA[Network security review]]></category>
		<category><![CDATA[Preventing IT network theft]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//create-a-security-incident-management-plan-for-possible-it-security-breaches.html</guid>

					<description><![CDATA[<p>In 2006, the FBI partnered with 313 companies who agreed to be in a study about IT security. The companies came from various sectors, such as medical, education, transportation, manufacturing, and many more. Combined, these companies lost over $52 million due to various types of security breaches, including viruses, theft of proprietary information, network abuse, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/it-security-breach/">Are You Prepared for an IT Security Breach?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In 2006, the FBI partnered with 313 companies who agreed to be in a study about IT security. The companies came from various sectors, such as medical, education, transportation, manufacturing, and many more. Combined, these companies lost over $52 million due to various types of security breaches, including viruses, theft of proprietary information, network abuse, and data sabotage. That&#8217;s $167,000 plus per company! You certainly don&#8217;t want to be part of that loss.</p>
<p><span id="more-87"></span></p>
<p>The FBI asked these 313 companies why they believe more companies don&#8217;t report their security losses. Well, 48 percent of the companies in the study said that negative publicity would hurt their stock or image. Another 36 percent said their competitors could use the information to their advantage. I&#8217;m sure you could think of many more reasons.</p>
<p>So the costs of IT security breaches are real and devastating to many companies. But realize that there&#8217;s power in knowledge. That&#8217;s why you need to know what your potential losses are. Only then can you take the proper steps to protect your company.</p>
<p>To that end, I recommend that every company create a Security Incident Management Plan. In this plan you will write exactly how you will:</p>
<blockquote><p>* Identify security incidents<br />
* Contact law enforcement if appropriate<br />
* Notify anyone whose personal information may have been exposed<br />
* Protect and gather appropriate evidence<br />
* Clean up the problems<br />
* Put appropriate monitoring in place<br />
* Identify lessons learned to better protect the system</p></blockquote>
<p>Find out more information at:<br />
<a href="http://www.csrc.nist.gov/publications/nistpubs/800-61/sp800-61.pdf">www.csrc.nist.gov/publications/nistpubs/800-61/sp800-61.pdf</a>.</p>
<p><strong>What are your thoughts on this topic?</strong></p>
<p>The post <a href="https://fosterinstitute.com/it-security-breach/">Are You Prepared for an IT Security Breach?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
