<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security expert Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/security-expert/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/security-expert/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Mon, 08 Mar 2021 17:48:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Security expert Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/security-expert/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Three Essential Questions to Ask Your IT Team Today Because of the Massive Exchange Attack</title>
		<link>https://fosterinstitute.com/three-essential-questions-to-ask-your-it-team-today-because-of-the-massive-exchange-attack/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 08 Mar 2021 17:48:54 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3467</guid>

					<description><![CDATA[<p>So far, it appears that more than 30,000 organizations, including small businesses, are compromised. The US National Security Council urges organizations, including small businesses, to &#8220;take immediate measures&#8221; to detect compromise. &#8211;&#62; ONE: Ask your IT team, &#8220;Do we still have Microsoft Exchange Server email software installed anywhere?&#8221; If they answer affirmatively, even if they&#8217;re [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/three-essential-questions-to-ask-your-it-team-today-because-of-the-massive-exchange-attack/">Three Essential Questions to Ask Your IT Team Today Because of the Massive Exchange Attack</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>So far, it appears that more than 30,000 organizations, including small businesses, are compromised. The US National Security Council urges organizations, including small businesses, to &#8220;take immediate measures&#8221; to detect compromise.<span id="more-3467"></span></p>
<p>&#8211;&gt; <strong>ONE</strong>: Ask your IT team, &#8220;Do we still have Microsoft Exchange Server email software installed anywhere?&#8221;</p>
<p>If they answer affirmatively, even if they&#8217;re already moving to the cloud, you must continue:</p>
<p>&#8211;&gt; <strong>TWO</strong>: Ask them, &#8220;What can I take off your plate or postpone so that you can immediately test and deploy the patches to the Exchange Server right now?&#8221;</p>
<p>Essential: Applying security updates to your Exchange server does not resolve the issue if your organization is already compromised. There might be a small program on your system quietly waiting for an attacker&#8217;s commands.</p>
<p>To help determine if you are already compromised: <a href="https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/#scan-log" target="_blank" rel="noopener">https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/#scan-log</a></p>
<p>If your team cannot update immediately, send them here: <a href="https://github.com/microsoft/CSS-Exchange/tree/main/Security" target="_blank" rel="noopener">https://github.com/microsoft/CSS-Exchange/tree/main/Security</a></p>
<p>&#8211;&gt; <strong>THREE</strong>: Say, &#8220;The emergency is too great to postpone. Later, let&#8217;s discuss the pros and cons of moving email to the cloud.&#8221;</p>
<p>Pros include eliminating one server and associated headaches. Often, online email is better for remote workers too. But you could lose some integration features you have now, for example, an on-site phone system tied into Exchange. Because saving money and streamlining is essential, online Exchange is often less expensive.</p>
<p>The blog posting <a href="https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/#scan-log" target="_blank" rel="noopener">https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/#scan-log</a> has a plethora of other information and guidance for your team related to the updates. Some organizations are experiencing errors after applying the security updates. For example, some learned they must install the updates from an elevated command prompt window. Microsoft provides more guidance:</p>
<p><a href="https://msrc-blog.microsoft.com/2021/03/05/microsoft-exchange-server-vulnerabilities-mitigations-march-2021/" target="_blank" rel="noopener">https://msrc-blog.microsoft.com/2021/03/05/microsoft-exchange-server-vulnerabilities-mitigations-march-2021/</a></p>
<p><a href="https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2019-2016-and-2013-march-2-2021-kb5000871-9800a6bb-0a21-4ee7-b9da-fa85b3e1d23b" target="_blank" rel="noopener">https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2019-2016-and-2013-march-2-2021-kb5000871-9800a6bb-0a21-4ee7-b9da-fa85b3e1d23b</a></p>
<p><a href="https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2010-service-pack-3-march-2-2021-kb5000978-894f27bf-281e-44f8-b9ba-dad705534459" target="_blank" rel="noopener">https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2010-service-pack-3-march-2-2021-kb5000978-894f27bf-281e-44f8-b9ba-dad705534459</a></p>
<p>The post <a href="https://fosterinstitute.com/three-essential-questions-to-ask-your-it-team-today-because-of-the-massive-exchange-attack/">Three Essential Questions to Ask Your IT Team Today Because of the Massive Exchange Attack</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Warn Your Workers about Attacker Decoy Tactics</title>
		<link>https://fosterinstitute.com/warn-your-workers-about-attacker-decoy-tactics/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 18 Mar 2020 20:43:39 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Decoy Website]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3057</guid>

					<description><![CDATA[<p>Alert your workers to be on guard looking for fake, decoy websites about coronavirus, even closings, and related alerts. Attackers design the content to be frightening or otherwise enticing so users click without thinking. Warn them that there are hundreds of new websites that hackers created to lure unsuspecting victims. Decoy websites look legitimate but [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/warn-your-workers-about-attacker-decoy-tactics/">Warn Your Workers about Attacker Decoy Tactics</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Alert your workers to be on guard looking for fake, decoy websites about coronavirus, <span id="more-3057"></span>even closings, and related alerts. Attackers design the content to be frightening or otherwise enticing so users click without thinking.  Warn them that there are hundreds of new websites that hackers created to lure unsuspecting victims. Decoy websites look legitimate but are loaded with malicious content. Attackers can access one unsuspecting user’s computer session and then use it to gain full access to your organization’s network. Official websites include <a href="http://cdc.gov" rel="noopener noreferrer" target="_blank">cdc.gov</a>, <a href="http://nih.gov" rel="noopener noreferrer" target="_blank">nih.gov</a> and <a href="http://who.int" rel="noopener noreferrer" target="_blank">who.int</a>. It is better for users to manually type those addresses into their browser instead of clicking links.</p>
<p>The post <a href="https://fosterinstitute.com/warn-your-workers-about-attacker-decoy-tactics/">Warn Your Workers about Attacker Decoy Tactics</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protect Your Network Even when Attackers Trick Your Users</title>
		<link>https://fosterinstitute.com/protect-your-network-even-when-attackers-trick-your-users/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 05 Nov 2019 15:11:53 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2997</guid>

					<description><![CDATA[<p>A business contacted our office last week because a bad actor tricked an employee to give them full access to their computer. The bad actor immediately took over the network and started performing highly illegal activities that appeared to come from the victim&#8217;s systems.  User training is not enough. It is essential to take additional [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/protect-your-network-even-when-attackers-trick-your-users/">Protect Your Network Even when Attackers Trick Your Users</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A business contacted our office last week because a bad actor tricked an employee to give them full access to their computer.</p>
<p>The bad actor immediately took over the network and started performing highly illegal activities that appeared to come from the victim&#8217;s systems.  User training is not enough. It is essential to take additional steps to help protect your network when an attacker is crafty enough to trick a user.</p>
<p><span id="more-2997"></span></p>
<p>Firewalls, almost universally, have a feature called web content filtering. There is a possibility that your IT professional configured the firewall to block known gambling, gaming, and sites with people with no clothes.</p>
<p>Unless you do business with every country in the world, tell your IT team to block the firewall from permitting traffic from all countries except those where you do business.</p>
<p>It is possible that some of your third parties use sites in other countries to handle your sensitive data, and this is a great time to find out by blocking other countries to see what happens. Your security is only as good as the security of your third party providers, and they need to disclose to you any risks they take with you, and your customers&#8217; confidential data.</p>
<p>If you want to be super cautious, rather than block everything at once, you can ask your IT professional to dump the contents of your web filter&#8217;s log into a spreadsheet, or some other database, that will identify traffic trends, sources, and destinations.</p>
<p>Now is an excellent time to ask your IT professionals, even if you outsource IT, to devote time to tuning your web content filtering to be restrictive.</p>
<p>You can even update your routers at home if they support web content filtering, and they might. An excellent place to start is at the device manufacturer&#8217;s website. There will be instructions to download and install the most recent firmware. Look at the support site about ways you can enable supported security features in your home devices, including web content filtering.</p>
<p>Please forward this to everyone you know so they can ask their IT professionals to turn up your web content filtering to help protect against social engineering attacks.</p>
<p>The post <a href="https://fosterinstitute.com/protect-your-network-even-when-attackers-trick-your-users/">Protect Your Network Even when Attackers Trick Your Users</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Find Out if You Can Collect a Bundle from the Equifax Breach</title>
		<link>https://fosterinstitute.com/find-out-if-you-can-collect-a-bundle-from-the-equifax-breach/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 24 Jul 2019 19:37:52 +0000</pubDate>
				<category><![CDATA[Credit Freeze]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT review]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[Security expert]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2981</guid>

					<description><![CDATA[<p>There is a strong chance that hackers obtained your identity information in the Equifax breach. It exposed 148 million American&#8217;s sensitive information, and that sets you and your family up for identity theft. If you already suffered identity theft and can prove Equifax was the source, you might get up to twenty thousand dollars. Beware [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/find-out-if-you-can-collect-a-bundle-from-the-equifax-breach/">Find Out if You Can Collect a Bundle from the Equifax Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There is a strong chance that hackers obtained your identity information in the Equifax breach. It exposed 148 million American&#8217;s sensitive information, and that sets you and your family up for identity theft. If you already suffered identity theft and can prove Equifax was the source, you might get up to twenty thousand dollars.<span id="more-2981"></span></p>
<p>Beware of additional fraud. Several sites are claiming to help you find out if you were part of the breach, but of course, the sites ask for personal information. Be safe: Use the contact information provided by <a href="https://www.equifax.com" target="_blank" rel="noopener noreferrer">Equifax</a>. The Equifax FAQ says to visit: <a href="https://www.equifaxsecurity2017.com/" target="_blank" rel="noopener noreferrer">https://www.equifaxsecurity2017.com/</a></p>
<p>To find out if you are affected, that site points you to: <a href="https://www.equifaxbreachsettlement.com/" target="_blank" rel="noopener noreferrer">https://www.equifaxbreachsettlement.com/</a></p>
<p>For identity theft, credit monitoring is helpful, so you know you are a victim, but by then, it is too late.</p>
<p>Placing credit freezes are a critical step in preventing your identity from being stolen.&#8221;</p>
<p>Freeze your credit, everyone in your family&#8217;s, at all major credit bureaus. To save you time, here are four and how to reach them:</p>
<p>Experian (888) 397-3742<br />
<a href="https://www.experian.com/freeze/center.html" target="_blank" rel="noopener noreferrer">https://www.experian.com/freeze/center.html</a></p>
<p>TransUnion LLC – To Freeze: (888) 909-8872<br />
<a href="https://www.transunion.com/credit-freeze" target="_blank" rel="noopener noreferrer">https://www.transunion.com/credit-freeze</a></p>
<p>Equifax Information Services, LLC (800) 685-1111<br />
<a href="https://www.equifax.com/personal/credit-report-services/" target="_blank" rel="noopener noreferrer">https://www.equifax.com/personal/credit-report-services/</a></p>
<p>Innovis – To Freeze: (800) 540-2505<br />
<a href="https://www.innovis.com/personal/securityFreeze" target="_blank" rel="noopener noreferrer">https://www.innovis.com/personal/securityFreeze</a></p>
<p>Please forward this to your friends. If they don&#8217;t understand the importance of a credit freeze, The FTC provides more information at <a href="https://www.consumer.ftc.gov/articles/0497-credit-freeze-faqs" target="_blank" rel="noopener noreferrer">https://www.consumer.ftc.gov/articles/0497-credit-freeze-faqs</a></p>
<p>The post <a href="https://fosterinstitute.com/find-out-if-you-can-collect-a-bundle-from-the-equifax-breach/">Find Out if You Can Collect a Bundle from the Equifax Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Mac Vulnerability Permits Unauthorized Login</title>
		<link>https://fosterinstitute.com/mac-vulnerability-permits-unauthorized-login/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 29 Nov 2017 16:25:29 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[High Sierra]]></category>
		<category><![CDATA[Mac Protection]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[Apple operating system]]></category>
		<category><![CDATA[apple risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[enable root user]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[High Sierra Vulnerability]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Mac security]]></category>
		<category><![CDATA[MacOS High Sierra risk]]></category>
		<category><![CDATA[OS Vulnerability]]></category>
		<category><![CDATA[reset root password]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[unauthorized]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2578</guid>

					<description><![CDATA[<p>Apple’s newest operating system has a serious vulnerability that can allow someone else to logon to your Mac. Here’s what to do:  First, see if you are vulnerable. Click on the apple symbol on the top left of your screen, then choose About This Mac. If you have macOS High Sierra, you are probably vulnerable. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/mac-vulnerability-permits-unauthorized-login/">Mac Vulnerability Permits Unauthorized Login</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Apple’s newest operating system has a serious vulnerability that can allow someone else to logon to your Mac. Here’s what to do: <span id="more-2578"></span></p>
<p>First, see if you are vulnerable. Click on the apple symbol on the top left of your screen, then choose About This Mac. If you have macOS High Sierra, you are probably vulnerable. If you have anything else, stop here.</p>
<p>Second, you can protect yourself by making sure nobody other than you can get to your computer. So far, though theoretically possible, the vulnerability has not been exploited remotely unless you have enabled “Share my Screen.” If you feel confident that no bad actors will have access to your computer, you can stop here.</p>
<p>Third, reset the root password. Apple provides the 8 necessary steps at <a href="http://support.apple.com/en-us/HT204012">support.apple.com/en-us/HT204012</a> , Scroll down to the section entitled: Change the Root Password. In their step 7, if the option Edit &gt; Change Root Password is grayed out on your Mac, then instead click the option Edit &gt; Enable Root User and continue with step 8.</p>
<p>Please forward this to everyone you care about that has a Mac.</p>
<p>The post <a href="https://fosterinstitute.com/mac-vulnerability-permits-unauthorized-login/">Mac Vulnerability Permits Unauthorized Login</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Secret Operating System is Running Inside Your Computers</title>
		<link>https://fosterinstitute.com/a-secret-operating-system-is-running-inside-your-computers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 28 Nov 2017 17:04:01 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[MINIX]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[Ring Potential Three]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[minix]]></category>
		<category><![CDATA[os]]></category>
		<category><![CDATA[ring negative three]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[second operating system]]></category>
		<category><![CDATA[secret operating system]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2570</guid>

					<description><![CDATA[<p>If this gives you a sinking feeling, it should. What most people don’t know is that, if your computer uses an Intel brand CPU, there is a hidden microprocessor dedicated to running a second operating system called MINIX. And MINIX is running right now. That’s right. You have a second computer running inside each of [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/a-secret-operating-system-is-running-inside-your-computers/">A Secret Operating System is Running Inside Your Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If this gives you a sinking feeling, it should. What most people don’t know is that, if your computer uses an Intel brand CPU, there is a hidden microprocessor dedicated to running a second operating system called MINIX. And MINIX is running right now.<span id="more-2570"></span></p>
<p>That’s right. You have a second computer running inside each of your organization’s existing computers. And probably don’t know it.</p>
<p>An attacker’s dream come true:<br />
-A scarcely known operating system<br />
-Hidden in millions of computers<br />
-Using a secret microprocessor<br />
-With priority over everything else on the computer. Something IT Pros refer to as ring negative three.<br />
-With network access<br />
-Patching security flaws are a nightmare<br />
-And there is no anti-virus</p>
<p>Even if the attackers don’t soon find a quick way to access sensitive information, they might find a way to shut down all of your servers. And keep them shut down.</p>
<p>Intel has great intentions. MINIX is part of Intel’s ME Management Engine that has desirable features. MINIX runs on, coexists with, Windows, Linux, or whatever you thought was the only operating system.</p>
<p>The most important thing for you, as an executive, to do is to make sure your IT Team is aware of MINIX. They can read more at <a href="http://www.zdnet.com/article/intel-weve-found-severe-bugs-in-secretive-management-engine-affecting-millions/">www.zdnet.com/article/intel-weve-found-severe-bugs-in-secretive-management-engine-affecting-millions/</a></p>
<p>The race is on: Attackers are looking for ways to use MINIX to their advantage. Intel, Google, and others are working to find ways to make MINIX more secure.</p>
<p>Forward this message to any organizations that you care about, especially organizations upon which you rely to perform services and provide products to your own organization. If they get shut down, or infiltrated, that will affect you too.</p>
<p>The post <a href="https://fosterinstitute.com/a-secret-operating-system-is-running-inside-your-computers/">A Secret Operating System is Running Inside Your Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Portable Radios Can Replace Family Phones</title>
		<link>https://fosterinstitute.com/portable-radios-can-replace-family-phones/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 21 Nov 2017 16:31:05 +0000</pubDate>
				<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[alternative cell phone]]></category>
		<category><![CDATA[Cell Phone Alternative]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[family radio service]]></category>
		<category><![CDATA[family radios]]></category>
		<category><![CDATA[family safety]]></category>
		<category><![CDATA[FCC]]></category>
		<category><![CDATA[FRS]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[radios]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[wireless options]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2567</guid>

					<description><![CDATA[<p>This is the time of the year when youngsters remind parents that all of their friends have phones, the latest model is out, and everyone is getting one! Some parents ask if there is an alternative. Yes. If you want to be able to reach them when they are off playing around the neighborhood, or [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/portable-radios-can-replace-family-phones/">Portable Radios Can Replace Family Phones</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This is the time of the year when youngsters remind parents that all of their friends have phones, the latest model is out, and everyone is getting one! Some parents ask if there is an alternative. Yes.<span id="more-2567"></span></p>
<p>If you want to be able to reach them when they are off playing around the neighborhood, or stay in contact when you all go to holiday festivities, the amusement parks, or about anywhere else, consider the wonderful radios that can be purchased for a fraction of the price of phones.</p>
<p>The FCC set aside frequencies for family radio service (FRS) for free, and for a FCC registration fee, members of the same household can use the more powerful GMRS radios.</p>
<p>Someone loses, or breaks, a radio? Easy to replace. No monthly fees.</p>
<p>We keep several radios right next to the front door. Someone leaves to go play? Grab a radio. The whole family headed for an indoor or outdoor adventure, grab all the radios. The range isn’t unlimited, but we can reach each other easily within a two-mile radius, and usually, since our family travels, and howls, in packs, it is more than enough. Need more range? That’s an option too.</p>
<p>If you want more details, please ask.</p>
<p>The post <a href="https://fosterinstitute.com/portable-radios-can-replace-family-phones/">Portable Radios Can Replace Family Phones</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Wireless Security is Broken &#038; What You Need to Do</title>
		<link>https://fosterinstitute.com/wireless-security-is-broken-what-you-need-to-do/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 17 Oct 2017 13:33:29 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[KRACK]]></category>
		<category><![CDATA[wi-fi best practices]]></category>
		<category><![CDATA[wi-fi safety]]></category>
		<category><![CDATA[wi-fi security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[firmware updates]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Microsoft patch]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Patches]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Wi-fi security]]></category>
		<category><![CDATA[wireless network]]></category>
		<category><![CDATA[WPA2]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2558</guid>

					<description><![CDATA[<p>Many organizations rely on a wireless password to protect their Wi-Fi networks. Behind the scenes, that password is used as part of a security protocol called WPA2. An attack, dubbed KRACK, has been announced that breaks that security. The attack can permit attackers to potentially eavesdrop on your network traffic and your communications, change information, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/wireless-security-is-broken-what-you-need-to-do/">Wireless Security is Broken &#038; What You Need to Do</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Many organizations rely on a wireless password to protect their Wi-Fi networks. Behind the scenes, that password is used as part of a security protocol called WPA2. An attack, dubbed KRACK, has been announced that breaks that security.<span id="more-2558"></span></p>
<p>The attack can permit attackers to potentially eavesdrop on your network traffic and your communications, change information, delete information, and insert information, all to cause problems and cost you money.</p>
<p>The good news is that the attacker needs to be within range of your Wi-Fi network. They could be some distance away if they use a strong antenna or if they plant a remotely controlled device nearby.</p>
<p>Do two things to mitigate this danger:</p>
<p>First: Apply the new patches that address this issue. That can prevent the attack.</p>
<p>Second: Isolate your wireless network from the rest of your network. That can help reduce the damage.</p>
<p>Related to the first step: Apply the most recent critical security patches, often called firmware updates, to your wireless devices. The company brands of your devices should release patches. Additionally, apply patches to your operating systems and applications that use Wi-Fi networking.</p>
<p>Microsoft released a patch a few days ago, on October 10, as part of the expected second Tuesday of every month patches, that solves this problem on their side of the products. At home, your automatic update should have patched your Windows workstations. But you will still need to patch your wireless access point. At the office, your IT team will need to patch the computers and devices. Please give them time to do so – it can take some time. Information about the attack in general, and some of the patches, can be found at: <a href="http://kb.cert.org/vuls/id/228519">kb.cert.org/vuls/id/228519</a> If the manufacturer of your devices does not produce updates, your next step might be to replace the devices with new ones.</p>
<p>For the second step: It is an IT Security best practice to isolate all wireless devices on your network to be away from the wired devices. For years, organizations would add wireless capabilities to their network by connecting wireless access points to the same network as your workstations and servers. That is a very dangerous practice since it can permit wireless devices, perhaps belonging to an attacker in the van outside your building, to access the wired resources on your network. In the case of this specific attack, it makes it easier for the attacker to access the data on the most protected parts of your organization’s network. Isolate all wireless devices on their own, what your IT professionals call a, filtered subnet.</p>
<p>As is often the case with IT Security, this will be a risk vs. expense decision. It is important that the executives of a company make the final decision about whether or not to ask IT to implement the mitigation steps. Your IT Team will appreciate your deciding, and the choice is yours since, if there is a successful cyber-attack, the executives, especially the president, CEO, and owner will suffer the most.</p>
<p>Please forward this to everyone you know who uses wireless networks.</p>
<p>The post <a href="https://fosterinstitute.com/wireless-security-is-broken-what-you-need-to-do/">Wireless Security is Broken &#038; What You Need to Do</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5 Steps to Take Now Even if You do not use Kasperski Anti-Virus</title>
		<link>https://fosterinstitute.com/5-steps-to-take-now-even-if-you-do-not-use-kasperski-anti-virus/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 06 Oct 2017 15:15:09 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Kasperski]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Whitelisting]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[NSA Cyber Defense]]></category>
		<category><![CDATA[Preventative IT Security]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[whitelisting]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2554</guid>

					<description><![CDATA[<p>According to the Wall Street Journal, followed by the Washington Post, Russian hackers used Kaspersky anti-virus to steal NSA cyber defense information off of an employee’s home computer. Even if you do not use Kaspersky, you still need to take 5 important steps. There is no guarantee that other anti-virus software is immune. What can [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/5-steps-to-take-now-even-if-you-do-not-use-kasperski-anti-virus/">5 Steps to Take Now Even if You do not use Kasperski Anti-Virus</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>According to the Wall Street Journal, followed by the Washington Post, Russian hackers used Kaspersky anti-virus to steal NSA cyber defense information off of an employee’s home computer.</p>
<p>Even if you do not use Kaspersky, you still need to take 5 important steps.<span id="more-2554"></span></p>
<p>There is no guarantee that other anti-virus software is immune.</p>
<p>What can you do to better protect your and your customers’ sensitive information when you cannot trust other programs like CCleaner, Kasperski, and who knows what else you will find out is a threat?</p>
<p>First of all, never let employees take sensitive information to their home computers. That’s not a panacea, but according to sources, the attack happened on a worker’s home computer. It is always important to keep sensitive data away from home computers that your IT professionals cannot maintain.</p>
<p>Second, more companies may start to embrace the technology called application whitelisting; it works the opposite of anti-virus tools that look for bad programs. Application whitelisting only lets approved programs run, so all other programs, by default, are not permitted to run. The strategy is that you give a list of approved programs to your computers and those are the only programs permitted to run. Configuring application whitelisting can take time, and time to maintain. And it will involve you meeting with IT to help them know what programs are essential to your organization. And Microsoft has a version, called App Locker, built in for company computers.</p>
<p>Third, limit the number of software vendors you use in your company. Every new company you let in the door is a potential risk. This is an opportunity for Microsoft, Apple, Citrix, VMware, Adobe, and others to really step up their game and offer more complete solutions.</p>
<p>Fourth, companies will just start installing fewer programs to begin with. Make users local standard users so they are unable to install their own programs. Every program, whether intentionally by the manufacturer or not, is a potential foothold for attackers to use to get into your systems. The whole movement for simplicity may overlap into the cyber world too.</p>
<p>Once upon a time, many years ago, I had the opportunity to work in South Africa for several weeks. While in Johannesburg, a taxi driver told me that the company with yellow colored taxis was very successful competing against the company with blue taxis. People chose to ride in yellow taxis more often than blue.</p>
<p>So, in order to increase business, the drivers with blue colored taxis started shooting guns at people riding in the yellow colored taxis. That was an incentive for riders to choose to ride in blue taxis. And it worked. More people chose the blue cab company over the yellow cab company. However, as you can imagine, the strategy was adopted by other taxi drivers too, so it became very dangerous to ride in any colored taxis.</p>
<p>The driver told me that taxi passengers became so fearful for their lives, that they all started taking the train. The trains got very busy. How did some taxi drivers respond? He told me that the taxi drivers, if they were having a slow day, would throw people off trains in order to make people more afraid of riding trains than riding in taxis.</p>
<p>Now, in 2017, according to the news, taxi drivers are attacking uber drivers for a similar reason.</p>
<p>This isn’t about South Africa. I love the people I met there – they had extreme kindness, integrity, hard working – there are people there that epitomize ideal friends, work associates, and customers. I have great feelings just thinking back to the amazing people and the experiences.</p>
<p>How this relates to cyber security is that bad actors use cyber-security tools, and other programs that your organization trusts, to launch attacks. If we allow it to, this can get out of hand. Do you remember the story about the Greeks who built a big horse, loaded their soldiers inside quietly, and managed to get the citizens of the ancient city of Troy to bring the horse into their city walls? According to the story, the trick worked very well and the trusting citizens had a very bad day when the soldiers poured out of the horse and attacked.</p>
<p>If programs were like big wooden horses, most of them would not contain attackers. But the lesson here is that it is difficult to know for sure. It may be best for organizations to be careful to not let so many programs, like horses, enter their gates at all. Trim back the number of programs you have installed at your company.</p>
<p>Fifth, stop storing data on computers and networks if you do not need the data readily accessible. Sure, a lot of your data does need to be instantly accessible. But think about it, strategize about it, is there any data that your team doesn’t use on a regular basis? Store that information offline. You can copy the information back onto your servers when you need it, but it isn’t there all the time. Data that that is not stored in servers cannot be stolen from the servers, nor can it be encrypted if ransomware encrypts the files on your servers.</p>
<p>Please forward this to your friends so that they can start protecting their systems with the 5 steps above.</p>
<p>The post <a href="https://fosterinstitute.com/5-steps-to-take-now-even-if-you-do-not-use-kasperski-anti-virus/">5 Steps to Take Now Even if You do not use Kasperski Anti-Virus</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Please Alert Your IT Pros – Increase Your Security Log File Capacity</title>
		<link>https://fosterinstitute.com/please-alert-your-it-pros-increase-your-security-log-file-capacity/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 06 Oct 2017 13:00:17 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Security Logs]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[failed logon attempts]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Log File Capacity]]></category>
		<category><![CDATA[Log File Recommendations]]></category>
		<category><![CDATA[Log File Size]]></category>
		<category><![CDATA[Microsoft Recommendations]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Log File]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2552</guid>

					<description><![CDATA[<p>Windows computers can keep a log of security events, such as failed logon attempts. It is helpful to know if attackers are trying to gain access to your network. When the log fills up, it overwrites itself with the oldest events first. By default, the log files are very small, and that makes it much [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/please-alert-your-it-pros-increase-your-security-log-file-capacity/">Please Alert Your IT Pros – Increase Your Security Log File Capacity</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Windows computers can keep a log of security events, such as failed logon attempts. It is helpful to know if attackers are trying to gain access to your network. When the log fills up, it overwrites itself with the oldest events first. By default, the log files are very small, and that makes it much easier for attackers to cover their tracks.<span id="more-2552"></span></p>
<p>Almost universally, security log files are too small and have overwritten themselves, making it impractical, and sometimes impossible, to see what security events have been happening on the network for more than a few hours.</p>
<p>Ask your IT Pros to be sure that the security log file size is set to at least 256 Megabytes.</p>
<p>Your IT Pros probably already know all about security logs, and can find out all the details on Microsoft’s site. Someday, as time permits, they may be interested in monitoring more than the default events, and that’s good. Microsoft provides detailed recommendations about events to monitor.</p>
<p>Please forward this to every executive you know so that they can forward it to their IT professionals and outsourced IT companies. Experience has shown that the majority of companies are still configured to use the tiny default size, and attackers love that.</p>
<p>The post <a href="https://fosterinstitute.com/please-alert-your-it-pros-increase-your-security-log-file-capacity/">Please Alert Your IT Pros – Increase Your Security Log File Capacity</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
