<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Strong Security Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/strong-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/strong-security/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Tue, 19 Sep 2017 15:12:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Strong Security Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/strong-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Your Software, such as CCleaner, May Have Backdoors</title>
		<link>https://fosterinstitute.com/your-software-such-as-ccleaner-may-have-backdoors/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 19 Sep 2017 15:12:28 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[CCleaner]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Uninstall]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[malicious code]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Software Breach]]></category>
		<category><![CDATA[software risks]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[uninstall]]></category>
		<category><![CDATA[unsafe program]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2543</guid>

					<description><![CDATA[<p>Can you trust programs you download? Millions of users, including outsourced computer firms, use a program called CCleaner on their own and on customers’ computers. CCleaner just announced that some of its software was compromised and has been stealing data from users’ computers. Every program that you install on your computer is a potential security [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/your-software-such-as-ccleaner-may-have-backdoors/">Your Software, such as CCleaner, May Have Backdoors</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Can you trust programs you download? Millions of users, including outsourced computer firms, use a program called CCleaner on their own and on customers’ computers. CCleaner just announced that some of its software was compromised and has been stealing data from users’ computers.<span id="more-2543"></span></p>
<p>Every program that you install on your computer is a potential security risk.</p>
<p>CCleaner may be installed on your computers, right now, by well meaning, qualified, IT professionals who care about you and your organization. It is a powerful tool with many beneficial features. Yet it has been hacked.</p>
<p>It will not help you to invest energy being angry at your in-house, or outsourced, IT professionals, or to be angry at the developer of CCleaner. They mean well and are using their skills to protect you and your company. CCleaner has undoubtedly added a great deal of value to the world by speeding up computers and removing malware. At some point, IT professionals have to trust that some programs are secure.</p>
<p>But their trust is exactly what attackers are counting on.</p>
<p>What you, as an executive, must do is to ask your IT team for a list of all programs installed on your network. Ask IT to uninstall all programs, that you, with their input, decide are not absolutely essential for you to use to serve your employees and customers. Do not burden them with making that decision on their own.</p>
<p>You owe that to your customers who trust you with their information.</p>
<p>You may decide to stick to using programs from well known and vetted companies, although that is no guarantee that the program is safe. Any program that is installed by millions of users becomes a target for attackers to use as a vector into your organization’s computers.</p>
<p>If you use CCleaner, uninstall it. Know that some of your data, perhaps whole computers, have been compromised. You can read their official announcement here: <a href="https://forum.piriform.com/index.php?showtopic=48869">https://forum.piriform.com/index.php?showtopic=48869</a></p>
<p>Know that uninstalling software does not remove the malicious code imbedded in your computer. And don’t count on your anti-virus to find the code. Attackers know how to hide malware from anti-virus programs. The best thing to do would be to rebuild the computers from scratch. Hackers are counting on the fact that your IT Pros do not have time to reload each computer. Ask your IT Pros if they have time. Either free up some of their time so they can perform the reload, or bring in an outsourced company to help, or choose to accept the risk and go on. That’s a decision for the executives to make. Using a technology called VDI makes the reinstallation process much easier.</p>
<p>If you want to continue to use CCleaner, if there is an executive level decision that the risk is worth the benefit, then you can ask IT to re-install the newest version.</p>
<p>Forward this to every executive you know. Tell them about this crisis, and how they must be involved in identifying all non-essential programs, so that IT can uninstall them.</p>
<p>The post <a href="https://fosterinstitute.com/your-software-such-as-ccleaner-may-have-backdoors/">Your Software, such as CCleaner, May Have Backdoors</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Credit Monitoring is Not Enough &#8211; You Must Place Credit Freezes to Protect Yourself</title>
		<link>https://fosterinstitute.com/credit-monitoring-is-not-enough-you-must-place-credit-freezes-to-protect-yourself/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 18 Sep 2017 16:10:26 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Credit Bureaus]]></category>
		<category><![CDATA[Credit Freeze]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Equifax]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Credit Hack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Dwell Time]]></category>
		<category><![CDATA[Equifax Breach]]></category>
		<category><![CDATA[Experian]]></category>
		<category><![CDATA[FTC]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity Theft Tips]]></category>
		<category><![CDATA[Innovis]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Credit]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Freeze]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Stolen Data]]></category>
		<category><![CDATA[Stolen Identity]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Trans Union]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2538</guid>

					<description><![CDATA[<p>Regarding the Equifax breach, the breach affects about half of America’s population, so take action. Experts agree that one of the best things you can do to protect yourself is to place a credit freeze on your credit reports.Credit monitoring is nice because it can tell you something bad has already happened, but prevention is [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/credit-monitoring-is-not-enough-you-must-place-credit-freezes-to-protect-yourself/">Credit Monitoring is Not Enough &#8211; You Must Place Credit Freezes to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Regarding the Equifax breach, the breach affects about half of America’s population, so take action. Experts agree that one of the best things you can do to protect yourself is to place a credit freeze on your credit reports.<span id="more-2538"></span>Credit monitoring is nice because it can tell you something bad has already happened, but prevention is important too. The FTC provides more info to you about credit freezes and why they help so much: <a href="https://www.consumer.ftc.gov/articles/0497-credit-freeze-faqs" target="_blank" rel="noopener noreferrer">https://www.consumer.ftc.gov/articles/0497-credit-freeze-faqs</a></p>
<p>To save you time, below are shortcuts that worked on Saturday. Freeze all 4; go to all 4 sites:</p>
<p>Experian (888) 397-3742<br />
<a href="https://www.experian.com/freeze/center.html" target="_blank" rel="noopener noreferrer">https://www.experian.com/freeze/center.html</a></p>
<p>TransUnion LLC &#8211; To Freeze: (888) 909-8872<br />
<a href="https://www.transunion.com/credit-freeze" target="_blank" rel="noopener noreferrer">https://www.transunion.com/credit-freeze</a></p>
<p>Equifax Information Services, LLC (800) 685-1111<br />
<a href="https://www.equifax.com/personal/credit-report-services/" target="_blank" rel="noopener noreferrer">https://www.equifax.com/personal/credit-report-services/</a></p>
<p>Innovis &#8211; To Freeze: (800) 540-2505<br />
<a href="https://www.innovis.com/personal/securityFreeze" target="_blank" rel="noopener noreferrer">https://www.innovis.com/personal/securityFreeze</a></p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/credit-monitoring-is-not-enough-you-must-place-credit-freezes-to-protect-yourself/">Credit Monitoring is Not Enough &#8211; You Must Place Credit Freezes to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What You Need to Do to Protect Yourself after the Equifax Breach</title>
		<link>https://fosterinstitute.com/what-you-need-to-do-to-protect-yourself-after-the-equifax-breach/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 08 Sep 2017 20:09:08 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Credit Freeze]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Equifax]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[FTC]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Stolen Data]]></category>
		<category><![CDATA[Website Security]]></category>
		<category><![CDATA[Credit Hack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Dwell Time]]></category>
		<category><![CDATA[Equifax Breach]]></category>
		<category><![CDATA[Experian]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity Theft Tips]]></category>
		<category><![CDATA[Innovis]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Credit]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Freeze]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Stolen Identity]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Trans Union]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2535</guid>

					<description><![CDATA[<p>You may be one of the 143 million people affected by the Equifax hacking breach that was announced yesterday. Data stolen may include contact information, dates of birth, driver’s license information, and Social Security numbers. Attackers can make money selling the information to people who could steal your identity and take out loans in your [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/what-you-need-to-do-to-protect-yourself-after-the-equifax-breach/">What You Need to Do to Protect Yourself after the Equifax Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You may be one of the 143 million people affected by the Equifax hacking breach that was announced yesterday.</p>
<p>Data stolen may include contact information, dates of birth, driver’s license information, and Social Security numbers. Attackers can make money selling the information to people who could steal your identity and take out loans in your name.</p>
<p>Place a credit freeze on your credit report. To do so, contact all four: Experian, Innovis, Trans Union, and, you guessed it, Equifax. In total, you’ll spend less than $75 to place the freeze.</p>
<p>A credit freeze stops people for gaining access to your credit report. It is difficult for an imposter to borrow money if a lender cannot check a credit report first.</p>
<p>Remember, credit monitoring, though good, sometimes only catches bad things when it is too late.</p>
<p>A security freeze is more effective, and lasts longer, than a fraud alert.</p>
<p>Additionally, watch out for anything odd or abnormal on your bank statements. Download your credit reports every quarter to see what is on them. One way to see your credit reports is to use a service such as annualcreditreport dot com</p>
<p>The FTC gives suggestions about avoiding and handling identity theft at consumer.ftc dot gov/features/feature-0014-identity-theft</p>
<p>Equifax has set up a website equifaxsecurity2017 dot com for people to see if their information was part of the breach. However, many people have been experiencing problems with that website.</p>
<p>Executives – FYI: Reports say that the attack did not result from social engineering. In other words, nobody clicked a bad link in an email. The attackers got in because an Equifax website was insecure. Have you had someone check the security of your website lately? If your site simply displays static information, you are at a much lower risk than if your site has a place for someone to login and/or look up information via your site.</p>
<p>Reports say that the breach may have happened as early as May, and Equifax discovered the breach on July 29. The time between when attackers compromise a system, and when it is discovered, is called dwell time. The best thing to do is to stop hackers from getting in to begin with. Keep security a top priority at your organization! The attackers are counting on you to overlook important steps.</p>
<p>Please forward this to anyone you care about…</p>
<p>The post <a href="https://fosterinstitute.com/what-you-need-to-do-to-protect-yourself-after-the-equifax-breach/">What You Need to Do to Protect Yourself after the Equifax Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Make Life Easier &#8211; Go Back to Easy Passwords</title>
		<link>https://fosterinstitute.com/make-life-easier-go-back-to-easy-passwords/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 05 Sep 2017 16:09:08 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST Recommendations]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[NIST passwords]]></category>
		<category><![CDATA[password length]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[password suggestions]]></category>
		<category><![CDATA[pw safety]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2530</guid>

					<description><![CDATA[<p>NIST, the National Institute of Standards and Technology in the US, is releasing new password standards that make passwords so much easier… Using plain letters is enough; numbers and symbols are optional. Passwords need to be long, at least 8 characters. 16 or more is better. You don’t have to reset passwords unless you suspect [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/make-life-easier-go-back-to-easy-passwords/">Make Life Easier &#8211; Go Back to Easy Passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>NIST, the National Institute of Standards and Technology in the US, is releasing new password standards that make passwords so much easier…<span id="more-2530"></span></p>
<p>Using plain letters is enough; numbers and symbols are optional.</p>
<p>Passwords need to be long, at least 8 characters. 16 or more is better.</p>
<p>You don’t have to reset passwords unless you suspect a data breach. Wow!</p>
<p>However, passwords cannot match a database of stolen or easy to guess passwords. And, your login mechanism has to have a way to verify that.</p>
<p>That’s the basic gist. You can read the details in the NIST Special Publication 800-63 at https://pages.nist dot gov/800-63-3/sp800-63-3.html It covers secret questions, two step login, etc.</p>
<p>Now, hopefully PCI and other standards will update their rules too.</p>
<p>Please forward this to anyone who is sick of complicated passwords and having to change them every 90 days.</p>
<p>The post <a href="https://fosterinstitute.com/make-life-easier-go-back-to-easy-passwords/">Make Life Easier &#8211; Go Back to Easy Passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Moms, Dads, and Friends: Take 7 Steps to Secure Your Students’ Computers</title>
		<link>https://fosterinstitute.com/moms-dads-and-friends-take-7-steps-to-secure-your-students-computers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 29 Aug 2017 15:58:37 +0000</pubDate>
				<category><![CDATA[Adobe Flash]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[hotspot safety]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[Student Cyber Security]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[coffee shop wi-fi]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Flash]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[parent cyber safety tips]]></category>
		<category><![CDATA[program safety]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[sandard users]]></category>
		<category><![CDATA[School computers]]></category>
		<category><![CDATA[school laptop]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[Stucent Computers]]></category>
		<category><![CDATA[student cyber-security]]></category>
		<category><![CDATA[Student Safety]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2528</guid>

					<description><![CDATA[<p>School is starting again and many students need computers. Take these important steps to help make them more secure:In addition to how they back up now, they also need to perform image backups that will back up everything, even programs, so that restore operations can go quickly and not interfere with schoolwork. Image backup tools [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/moms-dads-and-friends-take-7-steps-to-secure-your-students-computers/">Moms, Dads, and Friends: Take 7 Steps to Secure Your Students’ Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>School is starting again and many students need computers. Take these important steps to help make them more secure:<span id="more-2528"></span>In addition to how they back up now, they also need to perform image backups that will back up everything, even programs, so that restore operations can go quickly and not interfere with schoolwork. Image backup tools include Shadow Protect Desktop from Storage Craft, and Acronis True Image. For Macs, use Carbon Copy Cloner.</p>
<p>Be sure the “automatic update” feature is turned on in Windows and in Mac OS. Students must have the critical security patches installed to dramatically increase security. They’ll need to patch their browsers separately.</p>
<p>Uninstall all programs that they don’t think they will use. Start with the programs that are easy to recognize and skip the rest for now. Each program is a potential toe-hold for an attacker to gain access to a system. Worst case, if they delete something now that they need later, they can re-install it. In particular, remove Java and Flash. These are two tools that are frequently hacked and may be unnecessary. If a student finds they need either, he or she can reinstall them with the newest version. Make sure they get Java only from java dot com and Flash from get.adobe dot com/flashplayer/</p>
<p>Make sure they make their user account a “standard user” on their computer. This helps block attackers. Steps for Windows and Mac: 1) Create a new user 2) promote that user to be a local administrator 3) Demote your account to a standard user and use your own account.</p>
<p>Turn on two-step verifications on all the websites they visit. The setting is usually in the security settings of the website.</p>
<p>They need to keep their computer physically secure. Someone could access their files, social media, and e-mail accounts easily and without their knowledge. Passwords aren’t that helpful. It is usually trivial to bypass passwords on computers once an attacker gains physical access to a computer.</p>
<p>And though they may not heed this last step, it is a really good idea to avoid connoting to Wi-Fi services at school, coffee shops, etc. It is better if they use their phone or personal hot-spot to connect their computer to the Internet when they need to. The phone charges may be lower than you expect, especially if you call your phone provider and check about new data plan options.</p>
<p>Please forward this to your friends who have students; it can help prevent some big heartaches.</p>
<p>The post <a href="https://fosterinstitute.com/moms-dads-and-friends-take-7-steps-to-secure-your-students-computers/">Moms, Dads, and Friends: Take 7 Steps to Secure Your Students’ Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hacker Convention Starts Later This Week</title>
		<link>https://fosterinstitute.com/hacker-convention-starts-later-this-week/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 24 Jul 2017 13:00:02 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DEF CON]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Hacking Competition]]></category>
		<category><![CDATA[Big Hacker Convention]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Hacker Convention]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hackers in Vegas]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Strong Network]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2523</guid>

					<description><![CDATA[<p>Expect to see an increase in interesting news stories about what can be hacked this week. The big hacker convention DEFCON starts this week and lots of new announcements will be made as part of the program. If you will be in Vegas, leave your laptop and phone at home – lest you end up [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/hacker-convention-starts-later-this-week/">Hacker Convention Starts Later This Week</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Expect to see an increase in interesting news stories about what can be hacked this week. The big hacker convention DEFCON starts this week and lots of new announcements will be made as part of the program.<span id="more-2523"></span></p>
<p>If you will be in Vegas, leave your laptop and phone at home – lest you end up on the infamous wall of shame for being hacked. The website is defcon dot org</p>
<p>The post <a href="https://fosterinstitute.com/hacker-convention-starts-later-this-week/">Hacker Convention Starts Later This Week</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fix A Computer in Minutes and It Works Almost Every Time</title>
		<link>https://fosterinstitute.com/fix-a-computer-in-minutes-and-it-works-almost-every-time/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 21 Jul 2017 15:43:56 +0000</pubDate>
				<category><![CDATA[Acronis True Image]]></category>
		<category><![CDATA[Carbon Copy Cloner]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Restoring]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Shadow Protect Desktop]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[Troubleshooting]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Image backup tools]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Ransomware recovery]]></category>
		<category><![CDATA[restoring computers]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Storeage Craft]]></category>
		<category><![CDATA[Strong Network]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2518</guid>

					<description><![CDATA[<p>I was stranded in the Portland airport last night because of a mechanical failure on the first flight. You’ve had similar situations for sure. What would your travel experience be like if the airlines could immediately reset a plane to be brand new if it breaks? With computers, you can be up and running ASAP. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/fix-a-computer-in-minutes-and-it-works-almost-every-time/">Fix A Computer in Minutes and It Works Almost Every Time</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I was stranded in the Portland airport last night because of a mechanical failure on the first flight. You’ve had similar situations for sure. What would your travel experience be like if the airlines could immediately reset a plane to be brand new if it breaks?<span id="more-2518"></span></p>
<p>With computers, you can be up and running ASAP. Unless there is something broken with the computer’s hardware, a broken computer can be revived in just a few minutes.</p>
<p>In order for this to happen, ask your IT department (if they haven’t already) to create a golden image.</p>
<p>First they will set up a computer and configure it exactly the way it needs to be for your business – and you could do this for home computers too. Second, make an image backup of the computer. Recommended tools are below.</p>
<p>Now, you have a golden image, configured in the way you like with all the right software installed, etc., that can be restored to a computer to reset the computer to be like new again.</p>
<p>From now on, whenever you suspect that a computer is infected with a virus, has been hacked, or is just malfunctioning in general, do not troubleshoot it. Dump a golden image back onto the computer and refresh it to be like new.</p>
<p>Note: All the data will be overwritten when you restore the image. So, for personal computers, be sure to back up the data prior to restoring an image. At the office, all users store their data files on servers, not on workstations, right?</p>
<p>You may find that your IT team can create a single golden image that can be used on different models of computers, or they may need to make separate images for each model. If you use a technology called VDI, this is even easier. VDI is a different topic though.</p>
<p>Image backup tools include Shadow Protect Desktop from Storage Craft, and Acronis True Image. For Macs, use Carbon Copy Cloner.</p>
<p>Please forward this to everyone you know who troubleshoots a computer if it is acting up. There is another way, and troubleshooting may not be able to completely remove a virus if the computer is infected anyway.</p>
<p>The post <a href="https://fosterinstitute.com/fix-a-computer-in-minutes-and-it-works-almost-every-time/">Fix A Computer in Minutes and It Works Almost Every Time</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Recover Quickly if Ransomware Attacks at Remote Worker and Home Computers</title>
		<link>https://fosterinstitute.com/recover-quickly-if-ransomware-attacks-at-remote-worker-and-home-computers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 14 Jul 2017 21:19:21 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Home Computers]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Remote Workers]]></category>
		<category><![CDATA[Acronis True Image]]></category>
		<category><![CDATA[backups]]></category>
		<category><![CDATA[Carbon Copy Cloner]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Image backup tools]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Ransomware recovery]]></category>
		<category><![CDATA[Regular backups]]></category>
		<category><![CDATA[remote worker security]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Shadow Protect Desktop]]></category>
		<category><![CDATA[Storeage Craft]]></category>
		<category><![CDATA[Strong Network]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2512</guid>

					<description><![CDATA[<p>Ransomware is a common problem. If an attacker encrypts all your files and demands that you pay ransom to unlock your files, you will want to be able to recover quickly. Regular backups are not enough. Regular backups, including file backups, can do a great job of protecting your documents, pictures, and other files. But [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/recover-quickly-if-ransomware-attacks-at-remote-worker-and-home-computers/">Recover Quickly if Ransomware Attacks at Remote Worker and Home Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Ransomware is a common problem. If an attacker encrypts all your files and demands that you pay ransom to unlock your files, you will want to be able to recover quickly. Regular backups are not enough.<span id="more-2512"></span></p>
<p>Regular backups, including file backups, can do a great job of protecting your documents, pictures, and other files. But a full restore of a computer after an attack can take a very long time, and often requires you to reset the computer to factory defaults and spend hours reloading your programs.</p>
<p>If you need to restore after an attack, restoring an entire image is much faster than starting a re-installation from scratch. Disk images are a one-to-one copy of everything on your computer&#8217;s internal hard drive. Most often, you will replicate your drives to an external USB hard drive.</p>
<p>Image backup tools include Shadow Protect Desktop from Storage Craft, and Acronis True Image. For Macs, use Carbon Copy Cloner.</p>
<p>Keep using whatever backup method you already use for backup too. Image backup is an addition, not a replacement.</p>
<p>Please forward this to everyone you know who would like to be able to recover their computer quickly in the event of a ransomware attack.</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/recover-quickly-if-ransomware-attacks-at-remote-worker-and-home-computers/">Recover Quickly if Ransomware Attacks at Remote Worker and Home Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The UK Is Preparing to Attack Hackers with Army, Navy and Air Force.</title>
		<link>https://fosterinstitute.com/the-uk-is-preparing-to-attack-hackers-with-army-navy-and-air-force/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 03 Jul 2017 19:09:58 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[Sir Michael Fallon]]></category>
		<category><![CDATA[UK]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Cyber-Criminals]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Strong Network]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[UK Defense]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2514</guid>

					<description><![CDATA[<p>The UK is preparing to attack hackers with Army, Navy and Air Force. Sir Michael Fallon, the UK’s defense secretary, warned attackers that the UK will hunt them down, and respond not just in cyber-space, but also using air, land, and sea forces. Imagine soldiers, drones, and even missiles directed at anyone the UK identifies [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/the-uk-is-preparing-to-attack-hackers-with-army-navy-and-air-force/">The UK Is Preparing to Attack Hackers with Army, Navy and Air Force.</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The UK is preparing to attack hackers with Army, Navy and Air Force.<span id="more-2514"></span></p>
<p>Sir Michael Fallon, the UK’s defense secretary, warned attackers that the UK will hunt them down, and respond not just in cyber-space, but also using air, land, and sea forces.</p>
<p>Imagine soldiers, drones, and even missiles directed at anyone the UK identifies as a cyber-criminal.</p>
<p>Will attackers receive this as a deterrent? Or will attackers respond: &#8220;You realize, of course&#8230; This means war!&#8221; (Bugs Bunny cartoons).</p>
<p>You can read more details at www.bbc dot com/news/uk-politics-40423164</p>
<p>The post <a href="https://fosterinstitute.com/the-uk-is-preparing-to-attack-hackers-with-army-navy-and-air-force/">The UK Is Preparing to Attack Hackers with Army, Navy and Air Force.</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protect Yourself and Your Organization – New Ransomware Outbreak with Added Poison</title>
		<link>https://fosterinstitute.com/protect-yourself-and-your-organization-new-ransomware-outbreak-with-added-poison/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 28 Jun 2017 19:31:37 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Petya]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[Added Poison]]></category>
		<category><![CDATA[Click to Play]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[PETYA]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Strong Network]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2508</guid>

					<description><![CDATA[<p>A new strain of Ransomware, dubbed P e t y a, is gaining momentum infecting companies and home users. Worst of all, in addition to holding files ransom until you pay up, it appears to be infiltrating corporate networks to steal usernames and passwords too. Be sure that you: 1. Apply the most recent security [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/protect-yourself-and-your-organization-new-ransomware-outbreak-with-added-poison/">Protect Yourself and Your Organization – New Ransomware Outbreak with Added Poison</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A new strain of Ransomware, dubbed P e t y a, is gaining momentum infecting companies and home users. Worst of all, in addition to holding files ransom until you pay up, it appears to be infiltrating corporate networks to steal usernames and passwords too. Be sure that you:<span id="more-2508"></span></p>
<p>1. Apply the most recent security patches including the ones for Flash and Java.<br />
2. Use click-to-play in your browsers to stop them from automatically running scripts.<br />
3. Be sure all users are local standard users.</p>
<p>Find more details at https://www.fosterinstitute dot com/blog/patching-10-steps-to-seal-the-holes-in-your-armor/</p>
<p>Please forward this to your friends and business associates so they can be sure that they are protected too.</p>
<p>The post <a href="https://fosterinstitute.com/protect-yourself-and-your-organization-new-ransomware-outbreak-with-added-poison/">Protect Yourself and Your Organization – New Ransomware Outbreak with Added Poison</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
