<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>risk management Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/risk-management/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/risk-management/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Tue, 05 Apr 2022 16:32:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>risk management Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/risk-management/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Protect Sensitive Data on USB Drives and Memory Sticks if they are Lost or Stolen</title>
		<link>https://fosterinstitute.com/easily-lock-the-data-on-usb-drives/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 18 Feb 2022 00:00:38 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[BitLocker]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security assessment]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[encrypt USB drives]]></category>
		<category><![CDATA[it audit]]></category>
		<category><![CDATA[IT review]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[memory stick safety]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[risk management audit]]></category>
		<category><![CDATA[risk management expert]]></category>
		<category><![CDATA[risk management report]]></category>
		<category><![CDATA[USB Drives]]></category>
		<category><![CDATA[usingi bitlocker]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1970</guid>

					<description><![CDATA[<p>People sometimes lose or misplace USB memory sticks, SD Cards, External USB hard drives, and other external storage media. Help protect your data from prying eyes and cyber thieves by encrypting the drive. On Macs and Windows, encrypting an external drive can be as simple as right-clicking on the external drive’s icon and selecting the [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/easily-lock-the-data-on-usb-drives/">Protect Sensitive Data on USB Drives and Memory Sticks if they are Lost or Stolen</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>People sometimes lose or misplace USB memory sticks, SD Cards, External USB hard drives, and other external storage media. Help protect your data from prying eyes and cyber thieves by encrypting the drive.</p>
<p>On Macs and Windows, encrypting an external drive can be as simple as right-clicking on the external drive’s icon and selecting the encryption option.</p>
<p>Two golden rules:</p>
<p>1) Be sure your files are backed up elsewhere before encrypting a drive.</p>
<p>2) Be sure to save the recovery key in case you forget the password.</p>
<p>Encrypting individual files is helpful to protect your data, but attackers can still read the filenames and deduce information. One advantage to encrypting an entire external drive is bad actors cannot see the filenames when you encrypt an entire external drive or memory stick.</p>
<p>I intend to make you aware of the importance of encrypting external drives and not go into technical details. So, you’re welcome to skip the following information. If you encounter errors encrypting drives in the simple method above, there are many details. For example:</p>
<p>Windows: One way to encrypt drives is using BitLocker. If you have Windows Home edition instead of Pro, you cannot encrypt drives, but you can unlock and use encrypted drives. All editions of Windows support the “device encryption” feature.</p>
<p>Macs: You can use an encryption utility called Filevault2. Alternatively, you can encrypt drives when you format them. If you have a Mac with an Apple CPU, some users experience losing access to the data on the drive after encryption. Apple will fix that soon if they haven’t already.</p>
<p>Hopefully, you won&#8217;t encounter any issues when you encrypt your external drives and help protect the data from anyone who steals or discovers a misplaced drive.</p>


<p></p>
<p>The post <a href="https://fosterinstitute.com/easily-lock-the-data-on-usb-drives/">Protect Sensitive Data on USB Drives and Memory Sticks if they are Lost or Stolen</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Three Essential Questions to Ask Your IT Team Today Because of the Massive Exchange Attack</title>
		<link>https://fosterinstitute.com/three-essential-questions-to-ask-your-it-team-today-because-of-the-massive-exchange-attack/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 08 Mar 2021 17:48:54 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3467</guid>

					<description><![CDATA[<p>So far, it appears that more than 30,000 organizations, including small businesses, are compromised. The US National Security Council urges organizations, including small businesses, to &#8220;take immediate measures&#8221; to detect compromise. &#8211;&#62; ONE: Ask your IT team, &#8220;Do we still have Microsoft Exchange Server email software installed anywhere?&#8221; If they answer affirmatively, even if they&#8217;re [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/three-essential-questions-to-ask-your-it-team-today-because-of-the-massive-exchange-attack/">Three Essential Questions to Ask Your IT Team Today Because of the Massive Exchange Attack</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>So far, it appears that more than 30,000 organizations, including small businesses, are compromised. The US National Security Council urges organizations, including small businesses, to &#8220;take immediate measures&#8221; to detect compromise.<span id="more-3467"></span></p>
<p>&#8211;&gt; <strong>ONE</strong>: Ask your IT team, &#8220;Do we still have Microsoft Exchange Server email software installed anywhere?&#8221;</p>
<p>If they answer affirmatively, even if they&#8217;re already moving to the cloud, you must continue:</p>
<p>&#8211;&gt; <strong>TWO</strong>: Ask them, &#8220;What can I take off your plate or postpone so that you can immediately test and deploy the patches to the Exchange Server right now?&#8221;</p>
<p>Essential: Applying security updates to your Exchange server does not resolve the issue if your organization is already compromised. There might be a small program on your system quietly waiting for an attacker&#8217;s commands.</p>
<p>To help determine if you are already compromised: <a href="https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/#scan-log" target="_blank" rel="noopener">https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/#scan-log</a></p>
<p>If your team cannot update immediately, send them here: <a href="https://github.com/microsoft/CSS-Exchange/tree/main/Security" target="_blank" rel="noopener">https://github.com/microsoft/CSS-Exchange/tree/main/Security</a></p>
<p>&#8211;&gt; <strong>THREE</strong>: Say, &#8220;The emergency is too great to postpone. Later, let&#8217;s discuss the pros and cons of moving email to the cloud.&#8221;</p>
<p>Pros include eliminating one server and associated headaches. Often, online email is better for remote workers too. But you could lose some integration features you have now, for example, an on-site phone system tied into Exchange. Because saving money and streamlining is essential, online Exchange is often less expensive.</p>
<p>The blog posting <a href="https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/#scan-log" target="_blank" rel="noopener">https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/#scan-log</a> has a plethora of other information and guidance for your team related to the updates. Some organizations are experiencing errors after applying the security updates. For example, some learned they must install the updates from an elevated command prompt window. Microsoft provides more guidance:</p>
<p><a href="https://msrc-blog.microsoft.com/2021/03/05/microsoft-exchange-server-vulnerabilities-mitigations-march-2021/" target="_blank" rel="noopener">https://msrc-blog.microsoft.com/2021/03/05/microsoft-exchange-server-vulnerabilities-mitigations-march-2021/</a></p>
<p><a href="https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2019-2016-and-2013-march-2-2021-kb5000871-9800a6bb-0a21-4ee7-b9da-fa85b3e1d23b" target="_blank" rel="noopener">https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2019-2016-and-2013-march-2-2021-kb5000871-9800a6bb-0a21-4ee7-b9da-fa85b3e1d23b</a></p>
<p><a href="https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2010-service-pack-3-march-2-2021-kb5000978-894f27bf-281e-44f8-b9ba-dad705534459" target="_blank" rel="noopener">https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2010-service-pack-3-march-2-2021-kb5000978-894f27bf-281e-44f8-b9ba-dad705534459</a></p>
<p>The post <a href="https://fosterinstitute.com/three-essential-questions-to-ask-your-it-team-today-because-of-the-massive-exchange-attack/">Three Essential Questions to Ask Your IT Team Today Because of the Massive Exchange Attack</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them</title>
		<link>https://fosterinstitute.com/attackers-can-take-control-of-your-network-in-three-seconds-and-how-to-stop-them/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 23 Oct 2020 19:03:56 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Remote Worker Security]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3333</guid>

					<description><![CDATA[<p>An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network. The attacker does not need to know any passwords; they do not even need a username. They plug in a cable, and 3 seconds later, they&#8217;ve completely compromised your network. An attacker posing as [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/attackers-can-take-control-of-your-network-in-three-seconds-and-how-to-stop-them/">Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network.<span id="more-3333"></span></p>
<p>The attacker does not need to know any passwords; they do not even need a username. They plug in a cable, and 3 seconds later, they&#8217;ve completely compromised your network. An attacker posing as a visitor, a copier repair person, or a member of a cleaning crew can all compromise your organization. They can steal sensitive information, install ransomware, and can shut down operations entirely. They bypass the majority of, if not all, of your other protections because now they&#8217;re a Domain Administrator.</p>
<p>This exploit is so severe that the Department of Homeland Security directed all federal agencies to apply the patch in accordance with the Federal Emergency Directive 20-04.</p>
<p>Take these three steps ASAP:</p>
<p>First, ask your IT team if they&#8217;ve backed up your Domain Controller servers and applied Microsoft&#8217;s patches that address the Zerologon exploit CVE-2020-1472. They must do this immediately. Be compassionate if they&#8217;ve not. IMPORTANT: Realize that if an attacker already took over a network, the patch doesn&#8217;t help.</p>
<p>Second, if you have Domain Controllers using operating systems older than Windows Server 2008 R2, your IT professionals must shut them down for good. Be sure to migrate any mission-critical services to other servers.</p>
<p>Third, does your organization rely on third parties to support you? What if one of your major suppliers, a distributor, or your biggest customer falls prey to an attack? Prepare your organization now for an interruption of their operations. Be sure their executives know about this flaw and these three steps. You do not want a catastrophe at their organization to domino and cause a disaster for you, even though you&#8217;ve protected your systems.</p>
<p>Additional steps:</p>
<p>Inform your work-from-home team members that, in some cases, the attacker can take over your network using a VPN connection. Do you have an armed guard at every work-from-home user&#8217;s home to watch visitors? Of course not. But your entire organization might rely on their security. What if a teenager&#8217;s friend feels like playing around, experimenting, with this new cool exploit on a mom or dad&#8217;s computer?</p>
<p>The patches only protect you from attacks from Windows devices. If an attacker accesses a network port or cable with a non-Windows machine, the attacker can still take control of your network. Microsoft will release a second patch on February 9, 2021. Ask your IT team to configure alerts now to monitor security log events 5827 thru 5831 to see when connections are allowed or denied.</p>
<p>The average time for IT Professionals to apply critical security patches is five months, but you need to help yours be above average. Ask them what you can do to help them have time to test and install all critical security patches within 14 days or sooner. They might want to have a patch management tool. They might need more time to devote to applying updates.</p>
<p>Confirm that your IT Team disconnects or disables all unused Ethernet ports, including those in conference rooms. Lock doors to any offices and conference rooms that contain active Ethernet ports. Train everyone to be proactive and remove opportunities for anyone, including guests and repair people, to plug a device into a network port.</p>
<p>Keep in mind that 911 systems, airlines, governments, and every organization that you depend on are at risk for Zerologon exploit CVE-2020-1472 until they take action too.</p>
<p>Please forward this to fellow executives you care about so they can support their IT Professionals successfully backing up servers and applying the emergency patch.</p>
<p>The post <a href="https://fosterinstitute.com/attackers-can-take-control-of-your-network-in-three-seconds-and-how-to-stop-them/">Attackers Can Take Control of Your Network in Three Seconds, and How to Stop Them</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Your Work From Home Users are Like a Box of Chocolates</title>
		<link>https://fosterinstitute.com/your-work-from-home-users-are-like-a-box-of-chocolates/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 11 Sep 2020 16:37:51 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Remote Worker Security]]></category>
		<category><![CDATA[Remote Workers]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3293</guid>

					<description><![CDATA[<p>Because of so many work from home users, the Internet is like a box of chocolates for attackers. Step 1: Attackers compromise work-from-home users. Step 2: They gain access to their company. Step 3: They bite into the company to discover what&#8217;s inside. There are so many work from home users; this is a target-rich [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/your-work-from-home-users-are-like-a-box-of-chocolates/">Your Work From Home Users are Like a Box of Chocolates</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Because of so many work from home users, the Internet is like a box of chocolates for attackers.<span id="more-3293"></span></p>
<p>Step 1: Attackers compromise work-from-home users.<br />
Step 2: They gain access to their company.<br />
Step 3: They bite into the company to discover what&#8217;s inside.</p>
<p>There are so many work from home users; this is a target-rich environment.</p>
<p>1. You must harden remote users&#8217; systems against attacks. Secure their connections.<br />
2. When possible, issue laptops, so your IT team has more control over your remote users&#8217; security.<br />
3. Implement user training and phish testing. Please say if you&#8217;d like us to provide phish testing and online training for your users. We do all the work so your IT teams can focus on their other tasks.</p>
<p>Please forward this to your friends so they realize their remote users must be more secure than ever, and attackers target them indiscriminately.</p>
<p>The post <a href="https://fosterinstitute.com/your-work-from-home-users-are-like-a-box-of-chocolates/">Your Work From Home Users are Like a Box of Chocolates</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zoom Security &#8211; Follow Along to Set Security Settings</title>
		<link>https://fosterinstitute.com/follow-along-to-set-zoom-security-settings/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 03 Apr 2020 15:11:58 +0000</pubDate>
				<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Zoom]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3071</guid>

					<description><![CDATA[<p>Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings. This video is [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/follow-along-to-set-zoom-security-settings/">Zoom Security &#8211; Follow Along to Set Security Settings</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings.</p>
<p>This video is for non-technical people who need to make Zoom more secure today. So, if that’s you, open up your zoom account settings on your screen, and keep this video where you can see it side-by-side. Pause the video when you need to.<span id="more-3071"></span></p>
<p>Some people say, &#8220;Mike, tell us what settings to change to increase our Zoom security.&#8221; If that&#8217;s you, then you are going to love this video. It walks you through your Zoom account settings so you can follow along.</p>
<p><iframe title="Zoom Security - Follow Along to Set Settings" src="https://player.vimeo.com/video/403594987?dnt=1&amp;app_id=122963" width="384" height="235" frameborder="0" allow="autoplay; fullscreen" allowfullscreen></iframe></p>
<p>I know that some of you will want to fine tune the settings more than this. This video is not designed to replace your IT Pro; they know more about your specific system and requirements.</p>
<p>To help protect your Zoom meetings, watch other videos that cover concerns about using Zoom:</p>
<p><a href="https://fosterinstitute.com/?p=3094&amp;preview=true" target="_blank" rel="noopener noreferrer">Zoom Security &#8211; Set Up Two-Step Login</a></p>
<p><a href="https://fosterinstitute.com/?p=3099&amp;preview=true" target="_blank" rel="noopener noreferrer">Zoom Security Settings &#8211; The Concise Details</a></p>
<p><a href="https://fosterinstitute.com/blog/zoom-security-issues-protect-yourself/" target="_blank" rel="noopener noreferrer">Zoom Security Issues &#8211; Protect Yourself</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/follow-along-to-set-zoom-security-settings/">Zoom Security &#8211; Follow Along to Set Security Settings</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Warn Your Workers about Attacker Decoy Tactics</title>
		<link>https://fosterinstitute.com/warn-your-workers-about-attacker-decoy-tactics/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 18 Mar 2020 20:43:39 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Decoy Website]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3057</guid>

					<description><![CDATA[<p>Alert your workers to be on guard looking for fake, decoy websites about coronavirus, even closings, and related alerts. Attackers design the content to be frightening or otherwise enticing so users click without thinking. Warn them that there are hundreds of new websites that hackers created to lure unsuspecting victims. Decoy websites look legitimate but [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/warn-your-workers-about-attacker-decoy-tactics/">Warn Your Workers about Attacker Decoy Tactics</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Alert your workers to be on guard looking for fake, decoy websites about coronavirus, <span id="more-3057"></span>even closings, and related alerts. Attackers design the content to be frightening or otherwise enticing so users click without thinking.  Warn them that there are hundreds of new websites that hackers created to lure unsuspecting victims. Decoy websites look legitimate but are loaded with malicious content. Attackers can access one unsuspecting user’s computer session and then use it to gain full access to your organization’s network. Official websites include <a href="http://cdc.gov" rel="noopener noreferrer" target="_blank">cdc.gov</a>, <a href="http://nih.gov" rel="noopener noreferrer" target="_blank">nih.gov</a> and <a href="http://who.int" rel="noopener noreferrer" target="_blank">who.int</a>. It is better for users to manually type those addresses into their browser instead of clicking links.</p>
<p>The post <a href="https://fosterinstitute.com/warn-your-workers-about-attacker-decoy-tactics/">Warn Your Workers about Attacker Decoy Tactics</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Information that You Need to Know About the California Consumer Privacy Act</title>
		<link>https://fosterinstitute.com/information-that-you-need-to-know-about-the-california-consumer-privacy-act/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 21 Jan 2020 15:48:32 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[CCPA]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3025</guid>

					<description><![CDATA[<p>California&#8217;s CCPA act went into effect on January 1, but you have until July 1, 2020 when it is enforced. Get started now. First, you need to Add a footer to all of your web pages to the effect of &#8220;The CCPA requires us to notify you that we could sell your data unless you [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/information-that-you-need-to-know-about-the-california-consumer-privacy-act/">Information that You Need to Know About the California Consumer Privacy Act</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>California&#8217;s CCPA act went into effect on January 1, but you have until July 1, 2020 when it is enforced. Get started now. First, you need to<span id="more-3025"></span></p>
<p>Add a footer to all of your web pages to the effect of &#8220;The CCPA requires us to notify you that we could sell your data unless you opt-out here&#8221; and provide them a link. Do it even if you don&#8217;t sell data.</p>
<p>CCPA applies to you if:</p>
<ul>
<li>At least half of your organization&#8217;s revenue is from the sale of personal data, or</li>
<li>Your organization stores personal data of fifty thousand people or more, or</li>
<li>Your organization has at least twenty-five million dollars annual revenue</li>
</ul>
<p>If one of those applies, then:</p>
<ul>
<li>If a consumer in California asks, you must be able to give them copies of all of the data you collected about them.</li>
<li>You must be able to tell them if you sold their data and to whom.</li>
<li>Consumers can demand that you delete their data. Scouring their information from all of your applications and tools can be difficult because you have to remove them from your contact list, accounts receivable, order history, and everywhere else you store any information about them or their activities.</li>
</ul>
<p>Protected data includes contact information and anything that can identify a household, including GPS locations.</p>
<p>Confusion abounds in the CCPA. For example, if consumers choose to opt-out, an organization cannot discriminate against them by blocking or offering a lower level of service. But some companies provide services based on their consumers&#8217; data, so how can they give the same level of service to consumers who do not provide data? Another example is that employers need to keep some data on employees. What if an employee asks to have all their data, including their social security number, erased everywhere, but want to continue their employment? There are extensive attempts to address these issues, but the rules are confusing.</p>
<p>You’ll need to involve your lawyer to help wade through the issues, and that leads to the obligatory disclaimer: Do not misconstrue this to be legal advice. Check with your lawyer.</p>
<p>The CCPA is only the beginning. Expect to see similar laws in other states and at a national level too. Please forward this to your friends and associates, so they know they only have until July 1, 2020, to prepare.</p>
<p>The post <a href="https://fosterinstitute.com/information-that-you-need-to-know-about-the-california-consumer-privacy-act/">Information that You Need to Know About the California Consumer Privacy Act</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Mac Vulnerability Permits Unauthorized Login</title>
		<link>https://fosterinstitute.com/mac-vulnerability-permits-unauthorized-login/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 29 Nov 2017 16:25:29 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[High Sierra]]></category>
		<category><![CDATA[Mac Protection]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[Apple operating system]]></category>
		<category><![CDATA[apple risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[enable root user]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[High Sierra Vulnerability]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Mac security]]></category>
		<category><![CDATA[MacOS High Sierra risk]]></category>
		<category><![CDATA[OS Vulnerability]]></category>
		<category><![CDATA[reset root password]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[unauthorized]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2578</guid>

					<description><![CDATA[<p>Apple’s newest operating system has a serious vulnerability that can allow someone else to logon to your Mac. Here’s what to do:  First, see if you are vulnerable. Click on the apple symbol on the top left of your screen, then choose About This Mac. If you have macOS High Sierra, you are probably vulnerable. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/mac-vulnerability-permits-unauthorized-login/">Mac Vulnerability Permits Unauthorized Login</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Apple’s newest operating system has a serious vulnerability that can allow someone else to logon to your Mac. Here’s what to do: <span id="more-2578"></span></p>
<p>First, see if you are vulnerable. Click on the apple symbol on the top left of your screen, then choose About This Mac. If you have macOS High Sierra, you are probably vulnerable. If you have anything else, stop here.</p>
<p>Second, you can protect yourself by making sure nobody other than you can get to your computer. So far, though theoretically possible, the vulnerability has not been exploited remotely unless you have enabled “Share my Screen.” If you feel confident that no bad actors will have access to your computer, you can stop here.</p>
<p>Third, reset the root password. Apple provides the 8 necessary steps at <a href="http://support.apple.com/en-us/HT204012">support.apple.com/en-us/HT204012</a> , Scroll down to the section entitled: Change the Root Password. In their step 7, if the option Edit &gt; Change Root Password is grayed out on your Mac, then instead click the option Edit &gt; Enable Root User and continue with step 8.</p>
<p>Please forward this to everyone you care about that has a Mac.</p>
<p>The post <a href="https://fosterinstitute.com/mac-vulnerability-permits-unauthorized-login/">Mac Vulnerability Permits Unauthorized Login</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Secret Operating System is Running Inside Your Computers</title>
		<link>https://fosterinstitute.com/a-secret-operating-system-is-running-inside-your-computers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 28 Nov 2017 17:04:01 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[MINIX]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[Ring Potential Three]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[minix]]></category>
		<category><![CDATA[os]]></category>
		<category><![CDATA[ring negative three]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[second operating system]]></category>
		<category><![CDATA[secret operating system]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2570</guid>

					<description><![CDATA[<p>If this gives you a sinking feeling, it should. What most people don’t know is that, if your computer uses an Intel brand CPU, there is a hidden microprocessor dedicated to running a second operating system called MINIX. And MINIX is running right now. That’s right. You have a second computer running inside each of [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/a-secret-operating-system-is-running-inside-your-computers/">A Secret Operating System is Running Inside Your Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If this gives you a sinking feeling, it should. What most people don’t know is that, if your computer uses an Intel brand CPU, there is a hidden microprocessor dedicated to running a second operating system called MINIX. And MINIX is running right now.<span id="more-2570"></span></p>
<p>That’s right. You have a second computer running inside each of your organization’s existing computers. And probably don’t know it.</p>
<p>An attacker’s dream come true:<br />
-A scarcely known operating system<br />
-Hidden in millions of computers<br />
-Using a secret microprocessor<br />
-With priority over everything else on the computer. Something IT Pros refer to as ring negative three.<br />
-With network access<br />
-Patching security flaws are a nightmare<br />
-And there is no anti-virus</p>
<p>Even if the attackers don’t soon find a quick way to access sensitive information, they might find a way to shut down all of your servers. And keep them shut down.</p>
<p>Intel has great intentions. MINIX is part of Intel’s ME Management Engine that has desirable features. MINIX runs on, coexists with, Windows, Linux, or whatever you thought was the only operating system.</p>
<p>The most important thing for you, as an executive, to do is to make sure your IT Team is aware of MINIX. They can read more at <a href="http://www.zdnet.com/article/intel-weve-found-severe-bugs-in-secretive-management-engine-affecting-millions/">www.zdnet.com/article/intel-weve-found-severe-bugs-in-secretive-management-engine-affecting-millions/</a></p>
<p>The race is on: Attackers are looking for ways to use MINIX to their advantage. Intel, Google, and others are working to find ways to make MINIX more secure.</p>
<p>Forward this message to any organizations that you care about, especially organizations upon which you rely to perform services and provide products to your own organization. If they get shut down, or infiltrated, that will affect you too.</p>
<p>The post <a href="https://fosterinstitute.com/a-secret-operating-system-is-running-inside-your-computers/">A Secret Operating System is Running Inside Your Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Portable Radios Can Replace Family Phones</title>
		<link>https://fosterinstitute.com/portable-radios-can-replace-family-phones/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 21 Nov 2017 16:31:05 +0000</pubDate>
				<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[alternative cell phone]]></category>
		<category><![CDATA[Cell Phone Alternative]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[family radio service]]></category>
		<category><![CDATA[family radios]]></category>
		<category><![CDATA[family safety]]></category>
		<category><![CDATA[FCC]]></category>
		<category><![CDATA[FRS]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[radios]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[wireless options]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2567</guid>

					<description><![CDATA[<p>This is the time of the year when youngsters remind parents that all of their friends have phones, the latest model is out, and everyone is getting one! Some parents ask if there is an alternative. Yes. If you want to be able to reach them when they are off playing around the neighborhood, or [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/portable-radios-can-replace-family-phones/">Portable Radios Can Replace Family Phones</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This is the time of the year when youngsters remind parents that all of their friends have phones, the latest model is out, and everyone is getting one! Some parents ask if there is an alternative. Yes.<span id="more-2567"></span></p>
<p>If you want to be able to reach them when they are off playing around the neighborhood, or stay in contact when you all go to holiday festivities, the amusement parks, or about anywhere else, consider the wonderful radios that can be purchased for a fraction of the price of phones.</p>
<p>The FCC set aside frequencies for family radio service (FRS) for free, and for a FCC registration fee, members of the same household can use the more powerful GMRS radios.</p>
<p>Someone loses, or breaks, a radio? Easy to replace. No monthly fees.</p>
<p>We keep several radios right next to the front door. Someone leaves to go play? Grab a radio. The whole family headed for an indoor or outdoor adventure, grab all the radios. The range isn’t unlimited, but we can reach each other easily within a two-mile radius, and usually, since our family travels, and howls, in packs, it is more than enough. Need more range? That’s an option too.</p>
<p>If you want more details, please ask.</p>
<p>The post <a href="https://fosterinstitute.com/portable-radios-can-replace-family-phones/">Portable Radios Can Replace Family Phones</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
