<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Safe Network Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/safe-network/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/safe-network/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Wed, 08 Apr 2020 16:50:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Safe Network Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/safe-network/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Zoom Security Settings &#8211; The Concise Details</title>
		<link>https://fosterinstitute.com/zoom-security-settings-the-concise-details/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 08 Apr 2020 16:50:02 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Video Meeting Security]]></category>
		<category><![CDATA[Zoom]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Safe Network]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3099</guid>

					<description><![CDATA[<p>Zoom has many security settings. This is a detailed but concise guide to the settings and how they work. Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/zoom-security-settings-the-concise-details/">Zoom Security Settings &#8211; The Concise Details</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Zoom has many security settings. This is a detailed but concise guide to the settings and how they work.<br />
<span id="more-3099"></span><br />
Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings.</p>
<p><iframe src="https://player.vimeo.com/video/405323511?dnt=1&amp;app_id=122963" width="384" height="216" frameborder="0" allow="autoplay; fullscreen" allowfullscreen></iframe></p>
<div>
<div>
<p>Fasten your seatbelt. There are lots of security settings in Zoom. You must change default settings to help close the doors to hackers.</p>
<p>To access the account settings, sign into the Zoom website, click on your account on the far right of the top bar. You can also select a link to Account Management, under which you can reach the Account Settings.</p>
<p>The free version of Zoom lacks some essential security controls. In the paid version, the best place to start is, in the left-hand column, under ADMIN, select Account Management &gt; Account Settings. By default, you&#8217;re already on the meeting tab.</p>
</div>
<div></div>
<div>
<p>One of the first things you&#8217;ll notice is that some settings have a lock symbol next to them. Zoom allows you to configure settings at an account level, group level, and user level. Here, at the account level, if you click the lock icon, that setting will override the group and user settings.</p>
<p>HOST VIDEO: Disable this setting so the host will start meetings with their video off. The host will be able to show their video when they choose.</p>
</div>
<div></div>
<div>
<p>JOIN BEFORE HOST: Disable and lock the setting that would allow others to join the meeting before the host arrives. Never let anyone start communicating until you join to moderate the conversation.</p>
<p>USE PERSONAL MEETING ID (PMI) WHEN SCHEDULING A MEETING: You may not know it yet, but Zoom sets up a private meeting room for you that runs all the time. Your Personal Meeting ID, abbreviated PMI, is the Zoom address to your room. You want your PMI address to be confidential. Disable this setting.</p>
<p>USE PERSONAL MEETING ID (PMI) WHEN STARTING AN INSTANT MEETING: Disable this too for the same reason.</p>
<p>ONLY AUTHENTICATED USERS CAN JOIN MEETINGS: Enable this to add more protection if you meet with coworkers and other people you know who have Zoom accounts. However, you might choose to disable the setting if you will meet with clients, prospects, or anyone else who might not have Zoom accounts.</p>
<p>REQUIRE A PASSWORD WHEN SCHEDULING MEETINGS. Enable this option for all meeting types. Jot down your PMI password.</p>
<p>Here&#8217;s a tip. In case you are ever in a meeting and need to know the password quickly, click on the icon to invite someone, then Zoom displays the meeting ID at the top and the meeting&#8217;s password on the lower right corner of your window.</p>
<p>EMBED PASSWORDS IN MEETING LINK FOR ONE-CLICK JOIN: Leaving the setting enabled means the invitation&#8217;s link to the meeting includes a built-in password. Invitees are not prompted for and do not need to know the password. That means you can require passwords, and your clientele doesn&#8217;t even need to know.</p>
<p>However, embedding the passphrase inside the invitation exposes you to risk. If an unauthorized person obtains the email message, then they, too, can authenticate to your meeting without needing to know the password. If you disable this setting, tell everyone in the meeting the password through some method other than email.</p>
</div>
<div></div>
<div>
<p>REQUIRE PASSWORD FOR PARTICIPANTS JOINING BY PHONE: Enable this if you want to protect against unauthorized callers.</p>
<p>MUTE PARTICIPANTS ON ENTRY: Enable this, not only for security but to protect the meeting from background noise near a participant.</p>
<p>CHAT: Disable this setting here.  If an unauthorized person joins the meeting, you don&#8217;t want them to send disturbing chat messages for all to see. If some sessions require chat, do not click the lock.</p>
</div>
<div></div>
<div>
<p>PRIVATE CHAT: Disable private chat. Protect your participants from unwelcome interruptions from others, perhaps uninvited participants.</p>
<p>PLAY SOUND WHEN PARTICIPANTS JOIN OR LEAVE: Enable this setting to avoid being surprised to find out someone joined, and you didn&#8217;t notice. Check the box if you want to require telephone participants to record their names for an announcement when they join.</p>
<p>FILE TRANSFER: Disable and lock this setting. Blocking file transfers helps stop the spread of malware and potentially offensive content.</p>
<p>FEEDBACK TO ZOOM: Disable this feature.</p>
</div>
<div></div>
<div>
<p>ALLOW HOST TO PUT ATTENDEE ON HOLD: Enable and lock this setting for when you need to have a conversation without everyone listening.</p>
<p>ALWAYS SHOW MEETING CONTROL TOOLBAR: Enable this setting to make your life easier.</p>
<p>SHOW ZOOM WINDOWS DURING SCREEN SHARE: Disable this setting. Unless you are training people to host Zoom, no one needs to see what the host sees.</p>
<p>SCREEN SHARING: Unless you need people to show what&#8217;s on their screens to everyone during the meeting, set sharing to host only. If participants can share, there is a risk that someone, perhaps an uninvited participant, could show unwelcome content.</p>
<p>DISABLE DESKTOP/SCREENSHARE FOR USERS: Zoom allows the sharing of an entire monitor or sharing just one program&#8217;s window. Enable this setting if you want Zoom only to show the program window. This setting helps protect your participants, and the host, from accidentally sharing sensitive information somewhere on their desktop.</p>
<p>If, however, someone plans to use PowerPoint in presenter mode, disable this feature so that the host can share the whole monitor for displaying the slides.</p>
<p>ANNOTATION: Unless annotation is essential for your meeting, disable it. Turning off annotation prevents an uninvited participant from interrupting the flow of the meeting by placing images all over the screen.</p>
</div>
<div></div>
<div>
<p>WHITEBOARD: Unless you need the Whiteboard, disable it for the same reason you disable annotation.</p>
<p>REMOTE CONTROL: Unless you need participants to let others remotely control the shared content, disable this feature.</p>
<p>ALLOW REMOVED PARTICIPANTS TO REJOIN: Unless you think you might accidentally remove someone from a meeting, disable this feature to tell Zoom to keep them out.</p>
<p>FAR END CAMERA CONTROL: Disable this setting unless you want someone else to take control of your camera during your meeting.</p>
</div>
<div></div>
<div>
<p>VIRTUAL BACKGROUND: For security and privacy, tell workers to hide what is in their home office. Your workers can use a green screen backdrop, some attach to the back of chairs, but Zoom can usually differentiate between them and their background either way.</p>
<p>ENABLE IDENTIFYING GUEST PARTICIPANTS: This setting makes it easier for people who belong to your account to identify a potential intruder.</p>
<p>ALLOW USERS TO SELECT ORIGINAL SOUND IN THEIR CLIENT SETTINGS: Enable this feature. It isn&#8217;t so much for security as for sanity. If a participant&#8217;s voice is garbled, they can select original sound. Then you may be able to hear them.</p>
</div>
<div></div>
<div>
<div>
<p>WAITING ROOM: This is one of the most important and useful security settings in Zoom. Enable and lock this setting so that when participants try to join the meeting, they are held in a waiting room until the host permits them to enter.</p>
<p>Go back up to the top of that very long page. You&#8217;ll notice three headings: Meeting, Recording, and Telephone. Click the word Recording to move to the recording tab.</p>
<p>LOCAL RECORDING: Local recording means a participant can save the meeting to their computer. Disable the setting for confidential meetings. Otherwise, an unauthorized person could access that recorded file. A security risk is that the user could store the data in the cloud without a password.</p>
<p>CLOUD RECORDING: Unless you need to have a recording of the meeting, disable cloud recording too. In theory, cloud recordings are more secure since the users don&#8217;t have a file they must protect.</p>
<p>You&#8217;ll find many additional options. You might want to involve your IT Professional to help you choose the settings.</p>
<p>Scroll back up. Look in the left-hand column under PERSONAL and click on the Profile settings:</p>
<p>PERSONAL MEETING ID: Leave the random number alone. Zoom sets up a private meeting room for you to use anytime, and that PMI is the address to your room. Don&#8217;t make it easy for someone to find your PMI address. It is tempting to make your PMI match your phone number, but don&#8217;t.</p>
<p>In the left-hand column on the screen, skip down to Personal &gt; Settings. On the Meeting tab, confirm that the host video is off and that Join before the host is disabled too.</p>
<p>Now go back up in the left-hand column to your Personal &gt; Meetings settings, click on the Personal Meeting Room tab at the top. Confirm the settings match what you configured already. Essential settings include a green checkmark for Mute participants upon entry and a green checkmark in front of the Enable waiting room setting.</p>
<p>If you have other users and groups, Zoom suggests you review their account to verify the settings took hold.</p>
<p>When you schedule a meeting: Meeting ID: Generate Automatically. By now, you know to keep your Personal Meeting ID private except for a few people you trust.</p>
<p>Last, you can check for Zoom updates. Open your account settings by clicking on your account icon. Then select the option to check for updates. Zoom makes updates that improve Zoom&#8217;s security, but the updates do not help you until you install them.</p>
<p>To help protect your Zoom meetings, watch other videos that cover concerns about using Zoom, configuring the two-step login feature, and a video run-through of settings for paid accounts so you can simply follow along.</p>
<p><a href="https://fosterinstitute.com/?p=3094&amp;preview=true" target="_blank" rel="noopener noreferrer">Zoom Security &#8211; Set Up Two-Step Login</a></p>
<p><a href="https://fosterinstitute.com/blog/zoom-security-issues-protect-yourself/" target="_blank" rel="noopener noreferrer">Zoom Security Issues &#8211; Protect Yourself</a></p>
<p><a href="https://fosterinstitute.com/blog/follow-along-to-set-zoom-security-settings/" target="_blank" rel="noopener noreferrer">Zoom Security &#8211; Follow Along to Set Settings</a></p>
</div>
</div>
</div>
<p>The post <a href="https://fosterinstitute.com/zoom-security-settings-the-concise-details/">Zoom Security Settings &#8211; The Concise Details</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Your Software, such as CCleaner, May Have Backdoors</title>
		<link>https://fosterinstitute.com/your-software-such-as-ccleaner-may-have-backdoors/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 19 Sep 2017 15:12:28 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[CCleaner]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Uninstall]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[malicious code]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Software Breach]]></category>
		<category><![CDATA[software risks]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[uninstall]]></category>
		<category><![CDATA[unsafe program]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2543</guid>

					<description><![CDATA[<p>Can you trust programs you download? Millions of users, including outsourced computer firms, use a program called CCleaner on their own and on customers’ computers. CCleaner just announced that some of its software was compromised and has been stealing data from users’ computers. Every program that you install on your computer is a potential security [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/your-software-such-as-ccleaner-may-have-backdoors/">Your Software, such as CCleaner, May Have Backdoors</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Can you trust programs you download? Millions of users, including outsourced computer firms, use a program called CCleaner on their own and on customers’ computers. CCleaner just announced that some of its software was compromised and has been stealing data from users’ computers.<span id="more-2543"></span></p>
<p>Every program that you install on your computer is a potential security risk.</p>
<p>CCleaner may be installed on your computers, right now, by well meaning, qualified, IT professionals who care about you and your organization. It is a powerful tool with many beneficial features. Yet it has been hacked.</p>
<p>It will not help you to invest energy being angry at your in-house, or outsourced, IT professionals, or to be angry at the developer of CCleaner. They mean well and are using their skills to protect you and your company. CCleaner has undoubtedly added a great deal of value to the world by speeding up computers and removing malware. At some point, IT professionals have to trust that some programs are secure.</p>
<p>But their trust is exactly what attackers are counting on.</p>
<p>What you, as an executive, must do is to ask your IT team for a list of all programs installed on your network. Ask IT to uninstall all programs, that you, with their input, decide are not absolutely essential for you to use to serve your employees and customers. Do not burden them with making that decision on their own.</p>
<p>You owe that to your customers who trust you with their information.</p>
<p>You may decide to stick to using programs from well known and vetted companies, although that is no guarantee that the program is safe. Any program that is installed by millions of users becomes a target for attackers to use as a vector into your organization’s computers.</p>
<p>If you use CCleaner, uninstall it. Know that some of your data, perhaps whole computers, have been compromised. You can read their official announcement here: <a href="https://forum.piriform.com/index.php?showtopic=48869">https://forum.piriform.com/index.php?showtopic=48869</a></p>
<p>Know that uninstalling software does not remove the malicious code imbedded in your computer. And don’t count on your anti-virus to find the code. Attackers know how to hide malware from anti-virus programs. The best thing to do would be to rebuild the computers from scratch. Hackers are counting on the fact that your IT Pros do not have time to reload each computer. Ask your IT Pros if they have time. Either free up some of their time so they can perform the reload, or bring in an outsourced company to help, or choose to accept the risk and go on. That’s a decision for the executives to make. Using a technology called VDI makes the reinstallation process much easier.</p>
<p>If you want to continue to use CCleaner, if there is an executive level decision that the risk is worth the benefit, then you can ask IT to re-install the newest version.</p>
<p>Forward this to every executive you know. Tell them about this crisis, and how they must be involved in identifying all non-essential programs, so that IT can uninstall them.</p>
<p>The post <a href="https://fosterinstitute.com/your-software-such-as-ccleaner-may-have-backdoors/">Your Software, such as CCleaner, May Have Backdoors</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Credit Monitoring is Not Enough &#8211; You Must Place Credit Freezes to Protect Yourself</title>
		<link>https://fosterinstitute.com/credit-monitoring-is-not-enough-you-must-place-credit-freezes-to-protect-yourself/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 18 Sep 2017 16:10:26 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Credit Bureaus]]></category>
		<category><![CDATA[Credit Freeze]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Equifax]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Credit Hack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Dwell Time]]></category>
		<category><![CDATA[Equifax Breach]]></category>
		<category><![CDATA[Experian]]></category>
		<category><![CDATA[FTC]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity Theft Tips]]></category>
		<category><![CDATA[Innovis]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Credit]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Freeze]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Stolen Data]]></category>
		<category><![CDATA[Stolen Identity]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Trans Union]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2538</guid>

					<description><![CDATA[<p>Regarding the Equifax breach, the breach affects about half of America’s population, so take action. Experts agree that one of the best things you can do to protect yourself is to place a credit freeze on your credit reports.Credit monitoring is nice because it can tell you something bad has already happened, but prevention is [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/credit-monitoring-is-not-enough-you-must-place-credit-freezes-to-protect-yourself/">Credit Monitoring is Not Enough &#8211; You Must Place Credit Freezes to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Regarding the Equifax breach, the breach affects about half of America’s population, so take action. Experts agree that one of the best things you can do to protect yourself is to place a credit freeze on your credit reports.<span id="more-2538"></span>Credit monitoring is nice because it can tell you something bad has already happened, but prevention is important too. The FTC provides more info to you about credit freezes and why they help so much: <a href="https://www.consumer.ftc.gov/articles/0497-credit-freeze-faqs" target="_blank" rel="noopener noreferrer">https://www.consumer.ftc.gov/articles/0497-credit-freeze-faqs</a></p>
<p>To save you time, below are shortcuts that worked on Saturday. Freeze all 4; go to all 4 sites:</p>
<p>Experian (888) 397-3742<br />
<a href="https://www.experian.com/freeze/center.html" target="_blank" rel="noopener noreferrer">https://www.experian.com/freeze/center.html</a></p>
<p>TransUnion LLC &#8211; To Freeze: (888) 909-8872<br />
<a href="https://www.transunion.com/credit-freeze" target="_blank" rel="noopener noreferrer">https://www.transunion.com/credit-freeze</a></p>
<p>Equifax Information Services, LLC (800) 685-1111<br />
<a href="https://www.equifax.com/personal/credit-report-services/" target="_blank" rel="noopener noreferrer">https://www.equifax.com/personal/credit-report-services/</a></p>
<p>Innovis &#8211; To Freeze: (800) 540-2505<br />
<a href="https://www.innovis.com/personal/securityFreeze" target="_blank" rel="noopener noreferrer">https://www.innovis.com/personal/securityFreeze</a></p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/credit-monitoring-is-not-enough-you-must-place-credit-freezes-to-protect-yourself/">Credit Monitoring is Not Enough &#8211; You Must Place Credit Freezes to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What You Need to Do to Protect Yourself after the Equifax Breach</title>
		<link>https://fosterinstitute.com/what-you-need-to-do-to-protect-yourself-after-the-equifax-breach/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 08 Sep 2017 20:09:08 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Credit Freeze]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Equifax]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[FTC]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Stolen Data]]></category>
		<category><![CDATA[Website Security]]></category>
		<category><![CDATA[Credit Hack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Dwell Time]]></category>
		<category><![CDATA[Equifax Breach]]></category>
		<category><![CDATA[Experian]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity Theft Tips]]></category>
		<category><![CDATA[Innovis]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Credit]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Freeze]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Stolen Identity]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Trans Union]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2535</guid>

					<description><![CDATA[<p>You may be one of the 143 million people affected by the Equifax hacking breach that was announced yesterday. Data stolen may include contact information, dates of birth, driver’s license information, and Social Security numbers. Attackers can make money selling the information to people who could steal your identity and take out loans in your [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/what-you-need-to-do-to-protect-yourself-after-the-equifax-breach/">What You Need to Do to Protect Yourself after the Equifax Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You may be one of the 143 million people affected by the Equifax hacking breach that was announced yesterday.</p>
<p>Data stolen may include contact information, dates of birth, driver’s license information, and Social Security numbers. Attackers can make money selling the information to people who could steal your identity and take out loans in your name.</p>
<p>Place a credit freeze on your credit report. To do so, contact all four: Experian, Innovis, Trans Union, and, you guessed it, Equifax. In total, you’ll spend less than $75 to place the freeze.</p>
<p>A credit freeze stops people for gaining access to your credit report. It is difficult for an imposter to borrow money if a lender cannot check a credit report first.</p>
<p>Remember, credit monitoring, though good, sometimes only catches bad things when it is too late.</p>
<p>A security freeze is more effective, and lasts longer, than a fraud alert.</p>
<p>Additionally, watch out for anything odd or abnormal on your bank statements. Download your credit reports every quarter to see what is on them. One way to see your credit reports is to use a service such as annualcreditreport dot com</p>
<p>The FTC gives suggestions about avoiding and handling identity theft at consumer.ftc dot gov/features/feature-0014-identity-theft</p>
<p>Equifax has set up a website equifaxsecurity2017 dot com for people to see if their information was part of the breach. However, many people have been experiencing problems with that website.</p>
<p>Executives – FYI: Reports say that the attack did not result from social engineering. In other words, nobody clicked a bad link in an email. The attackers got in because an Equifax website was insecure. Have you had someone check the security of your website lately? If your site simply displays static information, you are at a much lower risk than if your site has a place for someone to login and/or look up information via your site.</p>
<p>Reports say that the breach may have happened as early as May, and Equifax discovered the breach on July 29. The time between when attackers compromise a system, and when it is discovered, is called dwell time. The best thing to do is to stop hackers from getting in to begin with. Keep security a top priority at your organization! The attackers are counting on you to overlook important steps.</p>
<p>Please forward this to anyone you care about…</p>
<p>The post <a href="https://fosterinstitute.com/what-you-need-to-do-to-protect-yourself-after-the-equifax-breach/">What You Need to Do to Protect Yourself after the Equifax Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Make Life Easier &#8211; Go Back to Easy Passwords</title>
		<link>https://fosterinstitute.com/make-life-easier-go-back-to-easy-passwords/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 05 Sep 2017 16:09:08 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST Recommendations]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[NIST passwords]]></category>
		<category><![CDATA[password length]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[password suggestions]]></category>
		<category><![CDATA[pw safety]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2530</guid>

					<description><![CDATA[<p>NIST, the National Institute of Standards and Technology in the US, is releasing new password standards that make passwords so much easier… Using plain letters is enough; numbers and symbols are optional. Passwords need to be long, at least 8 characters. 16 or more is better. You don’t have to reset passwords unless you suspect [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/make-life-easier-go-back-to-easy-passwords/">Make Life Easier &#8211; Go Back to Easy Passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>NIST, the National Institute of Standards and Technology in the US, is releasing new password standards that make passwords so much easier…<span id="more-2530"></span></p>
<p>Using plain letters is enough; numbers and symbols are optional.</p>
<p>Passwords need to be long, at least 8 characters. 16 or more is better.</p>
<p>You don’t have to reset passwords unless you suspect a data breach. Wow!</p>
<p>However, passwords cannot match a database of stolen or easy to guess passwords. And, your login mechanism has to have a way to verify that.</p>
<p>That’s the basic gist. You can read the details in the NIST Special Publication 800-63 at https://pages.nist dot gov/800-63-3/sp800-63-3.html It covers secret questions, two step login, etc.</p>
<p>Now, hopefully PCI and other standards will update their rules too.</p>
<p>Please forward this to anyone who is sick of complicated passwords and having to change them every 90 days.</p>
<p>The post <a href="https://fosterinstitute.com/make-life-easier-go-back-to-easy-passwords/">Make Life Easier &#8211; Go Back to Easy Passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Moms, Dads, and Friends: Take 7 Steps to Secure Your Students’ Computers</title>
		<link>https://fosterinstitute.com/moms-dads-and-friends-take-7-steps-to-secure-your-students-computers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 29 Aug 2017 15:58:37 +0000</pubDate>
				<category><![CDATA[Adobe Flash]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[hotspot safety]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[Student Cyber Security]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[coffee shop wi-fi]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Flash]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[parent cyber safety tips]]></category>
		<category><![CDATA[program safety]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[sandard users]]></category>
		<category><![CDATA[School computers]]></category>
		<category><![CDATA[school laptop]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[Stucent Computers]]></category>
		<category><![CDATA[student cyber-security]]></category>
		<category><![CDATA[Student Safety]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2528</guid>

					<description><![CDATA[<p>School is starting again and many students need computers. Take these important steps to help make them more secure:In addition to how they back up now, they also need to perform image backups that will back up everything, even programs, so that restore operations can go quickly and not interfere with schoolwork. Image backup tools [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/moms-dads-and-friends-take-7-steps-to-secure-your-students-computers/">Moms, Dads, and Friends: Take 7 Steps to Secure Your Students’ Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>School is starting again and many students need computers. Take these important steps to help make them more secure:<span id="more-2528"></span>In addition to how they back up now, they also need to perform image backups that will back up everything, even programs, so that restore operations can go quickly and not interfere with schoolwork. Image backup tools include Shadow Protect Desktop from Storage Craft, and Acronis True Image. For Macs, use Carbon Copy Cloner.</p>
<p>Be sure the “automatic update” feature is turned on in Windows and in Mac OS. Students must have the critical security patches installed to dramatically increase security. They’ll need to patch their browsers separately.</p>
<p>Uninstall all programs that they don’t think they will use. Start with the programs that are easy to recognize and skip the rest for now. Each program is a potential toe-hold for an attacker to gain access to a system. Worst case, if they delete something now that they need later, they can re-install it. In particular, remove Java and Flash. These are two tools that are frequently hacked and may be unnecessary. If a student finds they need either, he or she can reinstall them with the newest version. Make sure they get Java only from java dot com and Flash from get.adobe dot com/flashplayer/</p>
<p>Make sure they make their user account a “standard user” on their computer. This helps block attackers. Steps for Windows and Mac: 1) Create a new user 2) promote that user to be a local administrator 3) Demote your account to a standard user and use your own account.</p>
<p>Turn on two-step verifications on all the websites they visit. The setting is usually in the security settings of the website.</p>
<p>They need to keep their computer physically secure. Someone could access their files, social media, and e-mail accounts easily and without their knowledge. Passwords aren’t that helpful. It is usually trivial to bypass passwords on computers once an attacker gains physical access to a computer.</p>
<p>And though they may not heed this last step, it is a really good idea to avoid connoting to Wi-Fi services at school, coffee shops, etc. It is better if they use their phone or personal hot-spot to connect their computer to the Internet when they need to. The phone charges may be lower than you expect, especially if you call your phone provider and check about new data plan options.</p>
<p>Please forward this to your friends who have students; it can help prevent some big heartaches.</p>
<p>The post <a href="https://fosterinstitute.com/moms-dads-and-friends-take-7-steps-to-secure-your-students-computers/">Moms, Dads, and Friends: Take 7 Steps to Secure Your Students’ Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hacker Convention Starts Later This Week</title>
		<link>https://fosterinstitute.com/hacker-convention-starts-later-this-week/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 24 Jul 2017 13:00:02 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DEF CON]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Hacking Competition]]></category>
		<category><![CDATA[Big Hacker Convention]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Hacker Convention]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hackers in Vegas]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Strong Network]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2523</guid>

					<description><![CDATA[<p>Expect to see an increase in interesting news stories about what can be hacked this week. The big hacker convention DEFCON starts this week and lots of new announcements will be made as part of the program. If you will be in Vegas, leave your laptop and phone at home – lest you end up [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/hacker-convention-starts-later-this-week/">Hacker Convention Starts Later This Week</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Expect to see an increase in interesting news stories about what can be hacked this week. The big hacker convention DEFCON starts this week and lots of new announcements will be made as part of the program.<span id="more-2523"></span></p>
<p>If you will be in Vegas, leave your laptop and phone at home – lest you end up on the infamous wall of shame for being hacked. The website is defcon dot org</p>
<p>The post <a href="https://fosterinstitute.com/hacker-convention-starts-later-this-week/">Hacker Convention Starts Later This Week</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fix A Computer in Minutes and It Works Almost Every Time</title>
		<link>https://fosterinstitute.com/fix-a-computer-in-minutes-and-it-works-almost-every-time/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 21 Jul 2017 15:43:56 +0000</pubDate>
				<category><![CDATA[Acronis True Image]]></category>
		<category><![CDATA[Carbon Copy Cloner]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Restoring]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Shadow Protect Desktop]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[Troubleshooting]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Image backup tools]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Ransomware recovery]]></category>
		<category><![CDATA[restoring computers]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Storeage Craft]]></category>
		<category><![CDATA[Strong Network]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2518</guid>

					<description><![CDATA[<p>I was stranded in the Portland airport last night because of a mechanical failure on the first flight. You’ve had similar situations for sure. What would your travel experience be like if the airlines could immediately reset a plane to be brand new if it breaks? With computers, you can be up and running ASAP. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/fix-a-computer-in-minutes-and-it-works-almost-every-time/">Fix A Computer in Minutes and It Works Almost Every Time</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I was stranded in the Portland airport last night because of a mechanical failure on the first flight. You’ve had similar situations for sure. What would your travel experience be like if the airlines could immediately reset a plane to be brand new if it breaks?<span id="more-2518"></span></p>
<p>With computers, you can be up and running ASAP. Unless there is something broken with the computer’s hardware, a broken computer can be revived in just a few minutes.</p>
<p>In order for this to happen, ask your IT department (if they haven’t already) to create a golden image.</p>
<p>First they will set up a computer and configure it exactly the way it needs to be for your business – and you could do this for home computers too. Second, make an image backup of the computer. Recommended tools are below.</p>
<p>Now, you have a golden image, configured in the way you like with all the right software installed, etc., that can be restored to a computer to reset the computer to be like new again.</p>
<p>From now on, whenever you suspect that a computer is infected with a virus, has been hacked, or is just malfunctioning in general, do not troubleshoot it. Dump a golden image back onto the computer and refresh it to be like new.</p>
<p>Note: All the data will be overwritten when you restore the image. So, for personal computers, be sure to back up the data prior to restoring an image. At the office, all users store their data files on servers, not on workstations, right?</p>
<p>You may find that your IT team can create a single golden image that can be used on different models of computers, or they may need to make separate images for each model. If you use a technology called VDI, this is even easier. VDI is a different topic though.</p>
<p>Image backup tools include Shadow Protect Desktop from Storage Craft, and Acronis True Image. For Macs, use Carbon Copy Cloner.</p>
<p>Please forward this to everyone you know who troubleshoots a computer if it is acting up. There is another way, and troubleshooting may not be able to completely remove a virus if the computer is infected anyway.</p>
<p>The post <a href="https://fosterinstitute.com/fix-a-computer-in-minutes-and-it-works-almost-every-time/">Fix A Computer in Minutes and It Works Almost Every Time</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Recover Quickly if Ransomware Attacks at Remote Worker and Home Computers</title>
		<link>https://fosterinstitute.com/recover-quickly-if-ransomware-attacks-at-remote-worker-and-home-computers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 14 Jul 2017 21:19:21 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Home Computers]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Remote Workers]]></category>
		<category><![CDATA[Acronis True Image]]></category>
		<category><![CDATA[backups]]></category>
		<category><![CDATA[Carbon Copy Cloner]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Image backup tools]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Ransomware recovery]]></category>
		<category><![CDATA[Regular backups]]></category>
		<category><![CDATA[remote worker security]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Shadow Protect Desktop]]></category>
		<category><![CDATA[Storeage Craft]]></category>
		<category><![CDATA[Strong Network]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2512</guid>

					<description><![CDATA[<p>Ransomware is a common problem. If an attacker encrypts all your files and demands that you pay ransom to unlock your files, you will want to be able to recover quickly. Regular backups are not enough. Regular backups, including file backups, can do a great job of protecting your documents, pictures, and other files. But [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/recover-quickly-if-ransomware-attacks-at-remote-worker-and-home-computers/">Recover Quickly if Ransomware Attacks at Remote Worker and Home Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Ransomware is a common problem. If an attacker encrypts all your files and demands that you pay ransom to unlock your files, you will want to be able to recover quickly. Regular backups are not enough.<span id="more-2512"></span></p>
<p>Regular backups, including file backups, can do a great job of protecting your documents, pictures, and other files. But a full restore of a computer after an attack can take a very long time, and often requires you to reset the computer to factory defaults and spend hours reloading your programs.</p>
<p>If you need to restore after an attack, restoring an entire image is much faster than starting a re-installation from scratch. Disk images are a one-to-one copy of everything on your computer&#8217;s internal hard drive. Most often, you will replicate your drives to an external USB hard drive.</p>
<p>Image backup tools include Shadow Protect Desktop from Storage Craft, and Acronis True Image. For Macs, use Carbon Copy Cloner.</p>
<p>Keep using whatever backup method you already use for backup too. Image backup is an addition, not a replacement.</p>
<p>Please forward this to everyone you know who would like to be able to recover their computer quickly in the event of a ransomware attack.</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/recover-quickly-if-ransomware-attacks-at-remote-worker-and-home-computers/">Recover Quickly if Ransomware Attacks at Remote Worker and Home Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The UK Is Preparing to Attack Hackers with Army, Navy and Air Force.</title>
		<link>https://fosterinstitute.com/the-uk-is-preparing-to-attack-hackers-with-army-navy-and-air-force/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 03 Jul 2017 19:09:58 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[Sir Michael Fallon]]></category>
		<category><![CDATA[UK]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Cyber-Criminals]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Strong Network]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[UK Defense]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2514</guid>

					<description><![CDATA[<p>The UK is preparing to attack hackers with Army, Navy and Air Force. Sir Michael Fallon, the UK’s defense secretary, warned attackers that the UK will hunt them down, and respond not just in cyber-space, but also using air, land, and sea forces. Imagine soldiers, drones, and even missiles directed at anyone the UK identifies [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/the-uk-is-preparing-to-attack-hackers-with-army-navy-and-air-force/">The UK Is Preparing to Attack Hackers with Army, Navy and Air Force.</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The UK is preparing to attack hackers with Army, Navy and Air Force.<span id="more-2514"></span></p>
<p>Sir Michael Fallon, the UK’s defense secretary, warned attackers that the UK will hunt them down, and respond not just in cyber-space, but also using air, land, and sea forces.</p>
<p>Imagine soldiers, drones, and even missiles directed at anyone the UK identifies as a cyber-criminal.</p>
<p>Will attackers receive this as a deterrent? Or will attackers respond: &#8220;You realize, of course&#8230; This means war!&#8221; (Bugs Bunny cartoons).</p>
<p>You can read more details at www.bbc dot com/news/uk-politics-40423164</p>
<p>The post <a href="https://fosterinstitute.com/the-uk-is-preparing-to-attack-hackers-with-army-navy-and-air-force/">The UK Is Preparing to Attack Hackers with Army, Navy and Air Force.</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
