<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>recommendations Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/recommendations/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/recommendations/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Fri, 06 Sep 2024 05:25:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>recommendations Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/recommendations/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>An Executive&#8217;s Handbook to Securing Modern Manufacturing Networks and Robots, AI or Not</title>
		<link>https://fosterinstitute.com/ai-advancements-meet-security-ceos-handbook-to-securing-robotics-and-manufacturing-networks/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 02 Sep 2024 17:05:18 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[recommendations]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5643</guid>

					<description><![CDATA[<p>Sadly, as reckless as it seems, some companies that create applications to control machinery will no longer provide technical support to your IT team if the operating system on the workstations is upgraded or has security patches.</p>
<p>The post <a href="https://fosterinstitute.com/ai-advancements-meet-security-ceos-handbook-to-securing-robotics-and-manufacturing-networks/">An Executive&#8217;s Handbook to Securing Modern Manufacturing Networks and Robots, AI or Not</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>While we&#8217;ll discuss AI, the security principles outlined here are equally crucial for all computer-controlled manufacturing systems, whether they incorporate AI or not.</p>
<p><strong>AI&#8217;s Growing Role in Controlling Devices:</strong></p>
<p>As AI starts entering more workplaces, it is crucial to recognize that AI will become more interconnected with hardware devices in your organization. You might want AI to control room lighting and air conditioning to make it voice-controlled or adapt to the changing activities in the room. AI can also control massive machinery, including robots and high-powered lasers for cutting steel. We&#8217;ll all be surprised at how many real-world tangible controls AI can assist. For AI to control devices, computers must drive the machines. Threat actors could exploit weaknesses to disrupt companies, damage equipment, cause expensive delays, and worse.</p>
<p><strong>Machines Driven by Computers, Including Those Running AI and Traditional Computer Control Systems, Introduce a Security Threat:</strong></p>
<p>As AI becomes integral to your operations, remember: Everything from climate control and identity detection to robots and laser cutters hinges on computer systems. AI&#8217;s potential is vast, and its growing adoption means more devices linked to our networks.</p>
<p>However, this surge in AI adoption produces an often-overlooked danger that all organizations with industrial controls must consider. The computer systems hosting your AI and traditional solutions can become obsolete faster than the devices they control. Neglecting to update operating systems and using other security controls exposes your organization to cybersecurity threats. While devices might seem to run smoothly, the escalating sophistication of cyber attackers can&#8217;t be underestimated.</p>
<p><strong>Executives: Unchain Your IT Pros from the Security Limitations:</strong></p>
<p>Is your IT Team prohibited from applying critical cybersecurity updates to operating systems or upgrading to supported operating systems on workstations that control instruments, lasers, robots, and other machinery? If they are, those workstations <strong>pose a security threat to your organization.</strong></p>
<p>Executives must understand that using workstations with old operating systems or without the most recent critical security updates is a significant security risk. <strong>In some cases, executives must ask the IT Team if they have encountered this situation.</strong> Sometimes, executives are inclined to delegate decision-making to the IT Pros. Instead, the IT team must alert the executives of the pros, cons, and expenses. The executives need to decide if it makes sense to pay to upgrade the applications that control robotics, manufacturing, or other equipment on a network.</p>
<p><strong>Three Definitions:</strong></p>
<p>In case nobody&#8217;s explained these terms, it is essential to differentiate between upgrades and updates:</p>
<ol>
<li><strong>Operating System <em>Upgrades</em>:</strong> An example is upgrading from Windows 10 to Windows 11. Newer operating systems often have more security features. Microsoft and Apple will naturally be tempted to assign their best and brightest people to develop and update the newest operating systems, so they eventually drop support for old operating systems. Unsupported operating systems are designated EOL (End of Life.) Using an operating system after it is no longer supported is a significant security risk.</li>
<li><strong>Operating System <em>Updates</em>, a.k.a. Patches:</strong> Security updates are rated by the severity of the security risk and how likely an attacker will exploit the weakness. Critical security updates are the most important to apply. Staying up to date with patches can be a significant struggle in many situations.</li>
<li><strong><em>Application</em> Upgrades:</strong> Upgrades to new versions of the software that controls devices such as CNC machines, robotics, lasers, laboratory equipment, instruments, or any other hardware that connects to a computer.</li>
</ol>
<p><strong>The Shocking Reality:</strong></p>
<p>Some applications that control devices may prohibit operating system upgrades and security patches. The applications might break if the IT team deploys the patches or upgrades the operating systems. Sadly, as reckless as it seems, some companies that create applications to control machinery will no longer provide technical support to your IT team if the operating system on the workstations is upgraded or has security patches. Their software developers may be too busy to create flexible, secure applications and are forced to focus strictly on functionality.</p>
<p>Depending on the application vendor, paying for an upgraded version of a controller application can be very expensive. Fortunately, sometimes, the upgrade charge is reasonable or free. Sometimes, no upgrade is available to permit operating system upgrades or critical security updates.</p>
<p>Another consideration is the risk that upgrading might interrupt manufacturing flow if the upgrading process requires extensive troubleshooting or potentially interrupt production. When equipment operates 24/7, the IT Team is under more pressure since there is no downtime for maintenance.</p>
<p>If the new application&#8217;s user interface significantly differs, shop floor personnel might require additional training. Inadequate training can lead to costly mistakes and safety issues. Scheduling training will affect the timing of deploying the new applications.</p>
<p>So, as you can see, when robotics, scientific instruments, lasers, manufacturing, or other equipment works just fine, upgrading the application offers no valuable benefits, and the IT team is busy, we find during audits and security assessments that many manufacturing organizations have outdated operating systems or need critical cybersecurity updates.</p>
<p>The organization&#8217;s executives might accept the risk, especially if compensating controls are in place.</p>
<p><strong>Alternative Tactics Increase Security:</strong></p>
<p>Using compensating controls in networks is essential because systems sometimes have significant vulnerabilities before updates are released or installed. Compensating controls are even more essential to help protect workstations if patches are missing.</p>
<p>Compensating controls include, and are not limited to, isolating the machines that control robotics, manufacturing equipment and scientific instruments on a separate network away from your network. That separate network must have limited connectivity to only allow traffic to and from the specific devices necessary and limit the kind of data and how it traverses the network to reduce the attack surface and make it more difficult for a malicious program or third party to access that instance or device. I sometimes refer to this tactic in keynote presentations as creating filtered subnets.</p>
<p>Another compensating control is to harden the unpatched or EOL machines by removing all applications except those essential for the equipment&#8217;s operation. Examples of applications that must be removed include browsers and email clients since they are common vectors for successful attacks. If the employees operating those devices require internet and email access, consider adding a separate workstation that is patchable for email and web access.</p>
<p>EDR/XDR (Endpoint Detection and Response / Extended Detection and Response) technology is another helpful control. It involves installing a small program called an agent on each computer. The EDR/XDR agent monitors the system&#8217;s software, services, and behavior for any signs that threat actors might have already compromised the computer. If the EDR/XDR tool detects an IoC (Indicator of Compromise), it can respond by interrupting the process. When tuned to avoid false alarms, the best response is to allow the agent to effectively quarantine the workstation from the rest of the network until the IT team can investigate. This helps prevent attackers from spreading to more hosts.</p>
<p>However, it is common for IT teams to succumb to the danger of relying too heavily on EDR/XDR to protect their organization and, therefore, neglect implementing other industry best practices to protect systems. Threat actors often set up EDR/XDR tools on their test networks to find ways to circumvent the protections. So, even if your EDR/XDR tool says everything is safe, it doesn&#8217;t necessarily mean threat actors aren&#8217;t active in your network.</p>
<p>To combat this, companies commonly conduct yearly red-team exercises, performed by exceptionally skilled IT teams that regularly perform these exercises and know the tricks and practices real-world threat actors use. These exercises are designed to test the effectiveness of the detection and response process. These exercises look for weaknesses in EDR/XDR and help keep the IT team in practice, ensuring they&#8217;re better prepared in the case of an attack.</p>
<p>Depending on your budget, if $20/user/month for EDR/XDR is not feasible, know that the other cybersecurity controls in this article, such as careful hardening and segmentation with very restrictive filtering, are much less expensive than EDR/XDR and have little if any ongoing expense. I don’t want to diminish the usefulness of EDR/XDR tools. If you are on a tight budget, unless your cybersecurity policy requires EDR/XDR, you might choose to focus on other compensating controls.</p>
<p>The IT Team must alert the executives about the expense of upgrading applications, isolating the shop floor instances on a separate network, deploying an additional network for web and email access, training users and operators, implementing EDR/XDR tools, and other expenses. Include time estimates along with financial estimates. Then, the executives can make an informed decision, and IT can follow their instructions and ask for support as necessary.</p>
<p><strong>Step-by-Step Guidance for IT Teams:</strong></p>
<p>Acknowledge that it can be a significant challenge and sometimes practically impossible to ensure that all workstations run with a current OS and that all critical security updates are applied. But keep applying updates if possible.</p>
<p>Inform your executives whether your team has time to make these changes. IT teams must alert executives of the time and expense involved. The executives will have options such as adding more IT professionals to augment the team, postponing other projects, or accepting the risk of continuing with unpatched systems or EOL OSs with the compensating controls listed below.</p>
<p>Explore all technical, training, and expense changes before upgrading applications.</p>
<p>Ask your supervisor to delegate the price checking to someone outside the IT department if feasible. Your IT team is very busy, so checking the prices might cause the upgrade to be delayed. It can be time-consuming to check with the robotic, manufacturing, and scientific equipment vendors to find the pricing for upgrades to their applications that control machinery.</p>
<p>Investigate more than the pricing. Ask about changes in the upgraded applications affecting the user interface and user experience. Ideally, the upgraded application software operates similarly and has the same interface. Unfortunately, some manufacturers significantly change the user experience when they upgrade their applications.</p>
<p>If users will need training, identify a trainer.</p>
<p>Determine how scheduling the training will affect the deployment timing.</p>
<p>Involve executives in decision-making and send them regular reports about the project&#8217;s progress.</p>
<p>Implement compensating controls on the workstations because of the high cybersecurity risk of missing critical patches or using EOL OSs. Compensating controls aren&#8217;t a replacement for missing patches, but the controls can help tremendously.</p>
<p>Remember that attackers can exploit security risks long before they are discovered. Only when the vulnerability is discovered will the operating system and application developers know to create or release patches to seal that security hole. Refrain from relying on patches as your sole security control for application software and operating systems.</p>
<p>Strongly consider isolating shop floor machines on a separate subnet, especially those you are prohibited from patching and those using EOL OSs. Isolate that subnet completely with an air gap or utilize aggressive filtering at the switch or router to limit traffic to only the required source, destination, ports, and protocols.</p>
<p>Additionally, hardening the workstations against attacks is strongly recommended.</p>
<p>Remove or restrict web and email access. This is one of the most effective ways to harden workstations, as web and email are two of the most common vectors for malware.</p>
<p>If the workers at those devices need access to the web and email, consider deploying a separate workstation to their station they can use for web and email. If feasible, that workstation should not be on the shop floor network. If you put those workstations on the equipment network, you would need to allow email and web traffic, and modifying access control lists to allow more sources, destinations, ports, and protocols can significantly reduce the security you would otherwise introduce to the equipment control network. Strive to exclude TCP ports 80 and 443 on the AI device network while allowing full functionality of the AI and other computer-controlled devices.</p>
<p>Be sure you limit the sources of inbound and destinations of outbound network traffic to the absolute minimum. If you need to run new cables to facilitate the additional workstations for web and email at the workers&#8217; stations, then running new cables might be a significant investment. Deploying a WiFi network for email and web access might be more economical. Keep the key secret. If you share the WiFi password, workers might connect other devices to the equipment network and compromise security. Completely blocking email and web access and access to external IP addresses will hamper the workers on the manufacturing network from exposing the hosts to many threats.</p>
<p>Strongly consider using EDR/XDR tools, along with the Red Team Exercises, to help ensure the configurations&#8217; effectiveness and allow your IT team to prepare for actual emergencies.</p>
<p><strong>Summary:</strong></p>
<p>Protect workstations that control hardware such as robotics, pharmaceuticals, lasers, and scientific instruments, regardless of whether they utilize AI. This helps ensure the safety and operability of your systems, protecting your organization and workers.</p>
<p>Subscribe to maximize your executive potential with Foster Institute&#8217;s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>(Image source: Bing. Learn more at [Bing.com].)</p>
<p>The post <a href="https://fosterinstitute.com/ai-advancements-meet-security-ceos-handbook-to-securing-robotics-and-manufacturing-networks/">An Executive&#8217;s Handbook to Securing Modern Manufacturing Networks and Robots, AI or Not</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Three Essential Questions to Ask Your IT Team Today Because of the Massive Exchange Attack</title>
		<link>https://fosterinstitute.com/three-essential-questions-to-ask-your-it-team-today-because-of-the-massive-exchange-attack/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 08 Mar 2021 17:48:54 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3467</guid>

					<description><![CDATA[<p>So far, it appears that more than 30,000 organizations, including small businesses, are compromised. The US National Security Council urges organizations, including small businesses, to &#8220;take immediate measures&#8221; to detect compromise. &#8211;&#62; ONE: Ask your IT team, &#8220;Do we still have Microsoft Exchange Server email software installed anywhere?&#8221; If they answer affirmatively, even if they&#8217;re [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/three-essential-questions-to-ask-your-it-team-today-because-of-the-massive-exchange-attack/">Three Essential Questions to Ask Your IT Team Today Because of the Massive Exchange Attack</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>So far, it appears that more than 30,000 organizations, including small businesses, are compromised. The US National Security Council urges organizations, including small businesses, to &#8220;take immediate measures&#8221; to detect compromise.<span id="more-3467"></span></p>
<p>&#8211;&gt; <strong>ONE</strong>: Ask your IT team, &#8220;Do we still have Microsoft Exchange Server email software installed anywhere?&#8221;</p>
<p>If they answer affirmatively, even if they&#8217;re already moving to the cloud, you must continue:</p>
<p>&#8211;&gt; <strong>TWO</strong>: Ask them, &#8220;What can I take off your plate or postpone so that you can immediately test and deploy the patches to the Exchange Server right now?&#8221;</p>
<p>Essential: Applying security updates to your Exchange server does not resolve the issue if your organization is already compromised. There might be a small program on your system quietly waiting for an attacker&#8217;s commands.</p>
<p>To help determine if you are already compromised: <a href="https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/#scan-log" target="_blank" rel="noopener">https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/#scan-log</a></p>
<p>If your team cannot update immediately, send them here: <a href="https://github.com/microsoft/CSS-Exchange/tree/main/Security" target="_blank" rel="noopener">https://github.com/microsoft/CSS-Exchange/tree/main/Security</a></p>
<p>&#8211;&gt; <strong>THREE</strong>: Say, &#8220;The emergency is too great to postpone. Later, let&#8217;s discuss the pros and cons of moving email to the cloud.&#8221;</p>
<p>Pros include eliminating one server and associated headaches. Often, online email is better for remote workers too. But you could lose some integration features you have now, for example, an on-site phone system tied into Exchange. Because saving money and streamlining is essential, online Exchange is often less expensive.</p>
<p>The blog posting <a href="https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/#scan-log" target="_blank" rel="noopener">https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/#scan-log</a> has a plethora of other information and guidance for your team related to the updates. Some organizations are experiencing errors after applying the security updates. For example, some learned they must install the updates from an elevated command prompt window. Microsoft provides more guidance:</p>
<p><a href="https://msrc-blog.microsoft.com/2021/03/05/microsoft-exchange-server-vulnerabilities-mitigations-march-2021/" target="_blank" rel="noopener">https://msrc-blog.microsoft.com/2021/03/05/microsoft-exchange-server-vulnerabilities-mitigations-march-2021/</a></p>
<p><a href="https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2019-2016-and-2013-march-2-2021-kb5000871-9800a6bb-0a21-4ee7-b9da-fa85b3e1d23b" target="_blank" rel="noopener">https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2019-2016-and-2013-march-2-2021-kb5000871-9800a6bb-0a21-4ee7-b9da-fa85b3e1d23b</a></p>
<p><a href="https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2010-service-pack-3-march-2-2021-kb5000978-894f27bf-281e-44f8-b9ba-dad705534459" target="_blank" rel="noopener">https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2010-service-pack-3-march-2-2021-kb5000978-894f27bf-281e-44f8-b9ba-dad705534459</a></p>
<p>The post <a href="https://fosterinstitute.com/three-essential-questions-to-ask-your-it-team-today-because-of-the-massive-exchange-attack/">Three Essential Questions to Ask Your IT Team Today Because of the Massive Exchange Attack</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Alert Your Team &#8211; USB Devices, Login Prompts, and Apps</title>
		<link>https://fosterinstitute.com/alert-your-team-usb-devices-login-prompts-and-apps/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 27 Mar 2020 20:56:16 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[recommendations]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3065</guid>

					<description><![CDATA[<p>Warn your users about three ways attackers continue to exploit the COVID-19 crisis: USB: A new ploy is bad actors mailing USB devices, appearing to be from your company to your users. Once plugged in, they can open up a channel that permits unauthorized remote control and capturing keystrokes, including passwords. Fake Login Prompts: Remind [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/alert-your-team-usb-devices-login-prompts-and-apps/">Alert Your Team &#8211; USB Devices, Login Prompts, and Apps</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Warn your users about three ways attackers continue to exploit the COVID-19 crisis:<span id="more-3065"></span></p>
<p>USB: A new ploy is bad actors mailing USB devices, appearing to be from your company to your users. Once plugged in, they can open up a channel that permits unauthorized remote control and capturing keystrokes, including passwords.</p>
<p>Fake Login Prompts: Remind your users to beware of login screens when they don&#8217;t expect them. Attackers create persuasive prompts that ask your users passwords for their logon, VPN, or Microsoft Office 365 login, and more. Sometimes the windows tell the user that their connection dropped, and to provide credentials to reestablish their link. Your Users must ignore those prompts and notify your IT team immediately.</p>
<p>Fraudulent websites and apps: Sites may have useful coronavirus information, but they also contain malicious attack software that strives to infect computers. Attackers create bad apps offering online statistics, tracking of the virus spread, and more.</p>
<p>Please forward this to your friends so they can alert their users too.</p>
<p>The post <a href="https://fosterinstitute.com/alert-your-team-usb-devices-login-prompts-and-apps/">Alert Your Team &#8211; USB Devices, Login Prompts, and Apps</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Information that You Need to Know About the California Consumer Privacy Act</title>
		<link>https://fosterinstitute.com/information-that-you-need-to-know-about-the-california-consumer-privacy-act/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 21 Jan 2020 15:48:32 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[CCPA]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3025</guid>

					<description><![CDATA[<p>California&#8217;s CCPA act went into effect on January 1, but you have until July 1, 2020 when it is enforced. Get started now. First, you need to Add a footer to all of your web pages to the effect of &#8220;The CCPA requires us to notify you that we could sell your data unless you [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/information-that-you-need-to-know-about-the-california-consumer-privacy-act/">Information that You Need to Know About the California Consumer Privacy Act</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>California&#8217;s CCPA act went into effect on January 1, but you have until July 1, 2020 when it is enforced. Get started now. First, you need to<span id="more-3025"></span></p>
<p>Add a footer to all of your web pages to the effect of &#8220;The CCPA requires us to notify you that we could sell your data unless you opt-out here&#8221; and provide them a link. Do it even if you don&#8217;t sell data.</p>
<p>CCPA applies to you if:</p>
<ul>
<li>At least half of your organization&#8217;s revenue is from the sale of personal data, or</li>
<li>Your organization stores personal data of fifty thousand people or more, or</li>
<li>Your organization has at least twenty-five million dollars annual revenue</li>
</ul>
<p>If one of those applies, then:</p>
<ul>
<li>If a consumer in California asks, you must be able to give them copies of all of the data you collected about them.</li>
<li>You must be able to tell them if you sold their data and to whom.</li>
<li>Consumers can demand that you delete their data. Scouring their information from all of your applications and tools can be difficult because you have to remove them from your contact list, accounts receivable, order history, and everywhere else you store any information about them or their activities.</li>
</ul>
<p>Protected data includes contact information and anything that can identify a household, including GPS locations.</p>
<p>Confusion abounds in the CCPA. For example, if consumers choose to opt-out, an organization cannot discriminate against them by blocking or offering a lower level of service. But some companies provide services based on their consumers&#8217; data, so how can they give the same level of service to consumers who do not provide data? Another example is that employers need to keep some data on employees. What if an employee asks to have all their data, including their social security number, erased everywhere, but want to continue their employment? There are extensive attempts to address these issues, but the rules are confusing.</p>
<p>You’ll need to involve your lawyer to help wade through the issues, and that leads to the obligatory disclaimer: Do not misconstrue this to be legal advice. Check with your lawyer.</p>
<p>The CCPA is only the beginning. Expect to see similar laws in other states and at a national level too. Please forward this to your friends and associates, so they know they only have until July 1, 2020, to prepare.</p>
<p>The post <a href="https://fosterinstitute.com/information-that-you-need-to-know-about-the-california-consumer-privacy-act/">Information that You Need to Know About the California Consumer Privacy Act</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Executives Give Clues Before Firing IT Firms</title>
		<link>https://fosterinstitute.com/executives-give-clues-before-firing-it-firms/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 29 Jul 2014 06:00:30 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Firing IT Firms]]></category>
		<category><![CDATA[IT Professionals]]></category>
		<category><![CDATA[Outsourced IT Firms]]></category>
		<category><![CDATA[Outsourcing IT]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network safety]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[Managing IT Professionals]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[Working with executives]]></category>
		<category><![CDATA[Working With IT People]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1935</guid>

					<description><![CDATA[<p>Not all top-level executives, owners, and other decision makers are pleased with their outsourced IT firm. What signs should a service provider notice? The Wall Street Journal released an enlightening article entitled “Six Subtle Signs You&#8217;re About to Lose Your Job &#8211; For Busy and Confident Executives, These Warnings Are Easy to Miss” by Joann [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/executives-give-clues-before-firing-it-firms/">Executives Give Clues Before Firing IT Firms</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Not all top-level executives, owners, and other decision makers are pleased with their outsourced IT firm. What signs should a service provider notice?<span id="more-1935"></span></p>
<p>The Wall Street Journal released an enlightening article entitled “<a href="http://online.wsj.com/news/article_email/six-subtle-signs-youre-about-to-lose-your-job-1405959180-lMyQjAxMTA0MDIwMjEyNDIyWj" title="Six Subtle Signs You're About to Lose Your Job - For Busy and Confident Executives, These Warnings Are Easy to Miss">Six Subtle Signs You&#8217;re About to Lose Your Job &#8211; For Busy and Confident Executives, These Warnings Are Easy to Miss</a>” by Joann S. Lublin.</p>
<p>Like executives, many outsourced IT firms are so incredibly busy that they do not catch the hints that they are about to lose a customer. </p>
<p>Many executives loathe considering the fallout of changing outsourced IT support companies. Sometimes they say, “I don’t want to fire our outsourced IT firm &#8211; it is so helpful that they’ve learned how our business works.” </p>
<p>Because outsourced IT firms have their finger on the jugular vein of your business, executives prefer to wait until the last possible moment, after making all the preparations, and sever the relationship without warning. </p>
<p>There are many wonderful outsourced IT firms out there. If you have one, keep them. </p>
<p>Technology is an essential component for most companies, and you must feel confident that you have excellent IT service providers. Moreover, most service providers want to be excellent. As Stephen Covey said, it is a win-win when your service providers exceed your expectations.</p>
<p>Next week, expect 3 questions to ask your service providers in order to see how well they are delivering.</p>
<p>Would you advise every executive you know to tell their outsourced IT firm what they do and do not appreciate about their experiences while working together?  Please post your comments below&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/executives-give-clues-before-firing-it-firms/">Executives Give Clues Before Firing IT Firms</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fire Phone at Work</title>
		<link>https://fosterinstitute.com/fire-phone-at-work/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 19 Jun 2014 16:10:54 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Fire Phone]]></category>
		<category><![CDATA[IT Professionals]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Save time]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[amazon]]></category>
		<category><![CDATA[amazon fire phone]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[fire phone]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[mobile devices]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[Relating to IT Professionals]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1922</guid>

					<description><![CDATA[<p>Amazon just announced the new Amazon Fire phone. The first thing I wanted to know was about BYOD (Bring Your Own Device) features. How will your business utilize this great new device? The news is good… The Fire Phone, scheduled to be available the end of July from AT&#038;T, tracks your face for “sort of [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/fire-phone-at-work/">Fire Phone at Work</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Amazon just announced the new Amazon Fire phone. The first thing I wanted to know was about BYOD (Bring Your Own Device) features. How will your business utilize this great new device? The news is good…<span id="more-1922"></span></p>
<p>The Fire Phone, scheduled to be available the end of July from AT&#038;T, tracks your face for “sort of 3D,” sports an amazing camera, can recognize almost everything it sees or hears, but what about features for your company?</p>
<p>You will have the ability to view MS Word, Excel, and PowerPoint files. The phone provides Outlook and uses your Exchange server for messages, contacts, calendar, tasks, etc. The device supports encryption and is supposed to support VPN connectivity soon. Then, of course, there are so many apps available in Amazon’s own Fire Phone Apps in Amazon’s store. See details by googling: &#8220;Fire Phone for Work site:amazon.com” or click here: <a href="http://www.amazon.com/gp/feature.html?ie=UTF8&#038;docId=1002658251" title="Fire Phone for Work">Fire Phone for Work</a></p>
<p>For IT Pros, they will be happy that the phone supports their ability to remote-wipe a lost or stolen phone and control the installation of applications. A notable tool is <a href="https://whispercast.amazon.com/" title="Amazon's Whispercast">Amazon’s Whispercast</a>.  </p>
<p>Whispercast is a stable platform that schools and businesses use already. It provides an easy interface for your IT professionals to manage these devices including limiting Wi-Fi connectivity and provide content restriction (such as blocking access to social media sites). IT Pros can configure users into “groups,” with each group receiving different content and restrictions. </p>
<p>Soon other MDM (Mobile Device Management) tools will add robust features that your IT Pros need in order to enhance security and productivity for devices using your network.</p>
<p>Is there a Fire Phone in your future? Can your IT manage the BYOD features? At least you know it can “do business.”</p>
<p>Please post your comments below&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/fire-phone-at-work/">Fire Phone at Work</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5 More Things to Love about Apple</title>
		<link>https://fosterinstitute.com/5-more-things-to-love-about-apple/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 26 Dec 2013 06:00:59 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[apple]]></category>
		<category><![CDATA[recommendations]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1771</guid>

					<description><![CDATA[<p>Apple has wonderful traits. Last week were the first 5 of 10, and here are the remaining 5 things Apple does so well… And before you label me as a Microsoft hater, know that is incorrect. I enjoy products and services from both companies very much. 6. Similarly to the hardware, think about the “Apps.” [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/5-more-things-to-love-about-apple/">5 More Things to Love about Apple</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Apple has wonderful traits. Last week were the first 5 of 10, and here are the remaining 5 things Apple does so well…<span id="more-1771"></span></p>
<p>And before you label me as a Microsoft hater, know that is incorrect. I enjoy products and services from both companies very much. </p>
<p>6. Similarly to the hardware, think about the “Apps.” Even when Apple applications don’t claim to have so many features, Apple products work as advertised. Though they’ve gotten so much better, in the past: if a Microsoft application’s feature doesn’t work properly, why do they publish that the feature “works?”</p>
<p>7. Most Apple customers have nothing bad to say about Apple’s tech support experience. One reason is that most Apple customers never need to use support at all. My experience with Microsoft is that they don’t know the answer to problems, and they seem to think that I’m willing to become part of their troubleshooting team, “try this, try that, what does this do, what if you do this? Ok, reinstall Windows and call me in the morning.” No thank you.<br />
It is important to note: My experience with the Surface, Windows 8.1, and the latest version of MS Office has (so far) been spectacular. Microsoft sure got that one right!</p>
<p>8. There are always features in Apple products that make people say, “Oh wow! I never thought about having that feature and it is so cool!” For example, the “Burst Mode” of their camera feature is amazing. If you haven’t experienced it yet, you can point the camera at a scene, such as your kid doing something fun, and hold down the camera’s “take a picture” button. The camera takes many photos every second until you let go. Then, whenever you have time, you can go back to see all the pictures a simply select the one (or more) you like best and tell the device to “keep” those and throw the rest away. Makes it a ton easier to catch those otherwise tough shots.</p>
<p>9. Apple is willing to “change the world.” They sure did that with the original idea of really cool fonts (remember those days?), portable music players, and then with iPhones and iPads. What is their next big success going to be? To further promote “put all of your applications in the cloud?”</p>
<p>10. Apple provides competition in the marketplace. When “nobody does it better” than Microsoft, then Microsoft won’t be driven to step up too. Android is in the mix now. Of all 10 the best things, this is the benefit I like the most. </p>
<p>Please post your comments below&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/5-more-things-to-love-about-apple/">5 More Things to Love about Apple</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5 Things to Love about Apple</title>
		<link>https://fosterinstitute.com/5-things-to-love-about-apple/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 19 Dec 2013 06:00:53 +0000</pubDate>
				<category><![CDATA[Customer Service]]></category>
		<category><![CDATA[laptops]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[surface pro]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[apple]]></category>
		<category><![CDATA[macbook]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1763</guid>

					<description><![CDATA[<p>Apple has a lot of great things going for it. Here are 5 of the biggest ones: 1. Apple Stores! Isn’t it so neat that someone can walk into a store, experiment with the products, have workers who are very familiar with the products, and – if you decide to – you can buy a [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/5-things-to-love-about-apple/">5 Things to Love about Apple</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Apple has a lot of great things going for it. Here are 5 of the biggest ones:<span id="more-1763"></span></p>
<p>1.  Apple Stores!  Isn’t it so neat that someone can walk into a store, experiment with the products, have workers who are very familiar with the products, and – if you decide to – you can buy a device right then and there.</p>
<p>2. Apples have a “cool” factor that is tough (though perhaps not impossible) to match. And many Apple users know how cool it is.</p>
<p>My wife phoned me immediately after last week’s newsletter, about Apple computers not having touchscreens, and announced, “You were way too harsh about Apple this time!”<br />
“But Honey,” I explained, “We get the most responses on the blogs when I’m controversial about Apple.” She replied, “There is a difference between being controversial and adversarial!”</p>
<p>As usual, she is right. My wife said to tell you about her Apple Tattoo. That was a surprise to me too. </p>
<p>I do enjoy Apple, own and use two MacBook Airs that are a big part of every week for work. On the road, I carry two Airs and one Surface.  I do use the Surface the most but don’t make up your mind until you’ve tried them both.</p>
<p>Bottom line: I respect Apple and enjoy their products. In fact, in many cases working with top level executives, I recommend to them the Apple (especially the Air) after finding out what their wants and needs are. Some dearest friends, and my lovely wife, are total Mac people too.</p>
<p>3. Apple’s “No-questions asked” 14 day return policy. Where else can you go buy a piece of hardware that you can use, including reloading the operating system with a new one such as Windows, connect every peripheral imaginable to test compatibility, and then can return it if it doesn’t suit your needs? After 14 productive days, you are likely to ask yourself how you ever lived without it. Or not. Isn’t it great for you to be able to find out? </p>
<p>4. Apple is a leader in the marketplace. Not just by selling so much hardware, but in the past, they’ve been “first to market” with features that none of their competitors had even thought of yet. Often, Apple defines the cutting edge. Though there is controversy, many Apple fans will tell you how the Macintosh was the first computer to even have a mouse – and then everyone else copied Apple.</p>
<p>5. Apple products actually work when you get them out of the box. Even “first releases.” Thank goodness, users of Windows products can now enjoy the same experience, but Apple was the first. Apple has the longest running record. Having confidence in the products you purchase is a huge buying factor for most people. </p>
<p>Keep an eye out: Next week will be the 5 more of 10 things to love about Apple.</p>
<p>The post <a href="https://fosterinstitute.com/5-things-to-love-about-apple/">5 Things to Love about Apple</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Keeping Hackers from Stealing Your Online Identity</title>
		<link>https://fosterinstitute.com/keeping-hackers-from-stealing-your-online-identity/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 31 Oct 2013 06:00:11 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[recommendations]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1730</guid>

					<description><![CDATA[<p>Too often you visit a website, after you place an order, transfer money, or update a profile, you just close the window when you are finished. You just skipped one of the most important parts for security… Logout. To help keep unauthorized users from having access to the websites you protect with a password, you [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/keeping-hackers-from-stealing-your-online-identity/">Keeping Hackers from Stealing Your Online Identity</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Too often you visit a website, after you place an order, transfer money, or update a profile, you just close the window when you are finished. You just skipped one of the most important parts for security…<br />
<span id="more-1730"></span></p>
<p>Logout.</p>
<p>To help keep unauthorized users from having access to the websites you protect with a password, you need to logout of the website. </p>
<p>Unbeknownst to many, it is a very bad habit to just “close the browser” when you finish at a web site. </p>
<p>For example, if you go to your banking web site, or Amazon, or LinkedIn, or any other site that asks for your username and password, do your business and choose the option to log out, sign out, or the similar function they provide.  Yes, the next time you come to the site, it will ask you for your password again, but many sites do that already.</p>
<p>If you just close Chrome, Firefox, Internet Explorer, Safari or whatever browser you are using without logging out, it is much easier for an unauthorized person to impersonate you if you skip the logout process.  That person could be in your office who sits at your computer when you aren’t in your chair, or it could be someone on the other side of the planet.</p>
<p>Make logging out of web sites a habit!</p>
<p>The post <a href="https://fosterinstitute.com/keeping-hackers-from-stealing-your-online-identity/">Keeping Hackers from Stealing Your Online Identity</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>These Short and Fun IT Videos Can Protect You!</title>
		<link>https://fosterinstitute.com/these-short-and-fun-it-videos-can-protect-you/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 24 Oct 2013 06:00:18 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[recommendations]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1725</guid>

					<description><![CDATA[<p>Always remember: The best IT security controls can be thwarted by human ignorance. Here are fun videos to help you train your users in an enjoyable way. One of our training videos currently holds the #1 spot on a major university’s “Our Favorite Security Videos.” As of now, 50,022 users have viewed the video. To [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/these-short-and-fun-it-videos-can-protect-you/">These Short and Fun IT Videos Can Protect You!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Always remember: The best IT security controls can be thwarted by human ignorance. Here are fun videos to help you train your users in an enjoyable way. One of our training videos currently holds the #1 spot <span id="more-1725"></span>on a major university’s “Our Favorite Security Videos.” As of now, 50,022 users have viewed the video. To see the video, you can visit http://www.youtube.com/watch?v=cb_LosUE7uc Or you can Google: Wireless hacking demo Mike Foster </p>
<p>Additionally, this topic is so important to communicate to users, that we hired a professional video production company a few years ago to create a “humorous” video that they “guaranteed” would go viral. Well, it didn’t go viral, and we feel it is still pretty clever: http://www.youtube.com/watch?v=-BIucJi7juI Or Google search for: Office romance goes wrong when someone gets a hold of your personal information. Facebook Identity Theft</p>
<p>The following videos are short, professional, and entertaining:   http://www.consumerfed.org/issues/consumer-protection-and-privacy/fraud/665/#phishing<br />
Or you can Google: Consumerfed.org Fraud Videos and Audio</p>
<p>The video at the bottom of the page is particularly entertaining. </p>
<p>Post some of your favorite video sources in the comments below.</p>
<p>The post <a href="https://fosterinstitute.com/these-short-and-fun-it-videos-can-protect-you/">These Short and Fun IT Videos Can Protect You!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
