<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>tech support Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/tech-support/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/tech-support/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Fri, 19 Oct 2018 18:56:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>tech support Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/tech-support/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Can you Trust the Kindness of Tech Support Strangers?</title>
		<link>https://fosterinstitute.com/can-you-trust-the-kindness-of-tech-support-strangers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 19 Oct 2018 18:56:51 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Tech Support]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[program safety]]></category>
		<category><![CDATA[remote access]]></category>
		<category><![CDATA[remote access safety]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[tech support imposters]]></category>
		<category><![CDATA[tech support safety]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2673</guid>

					<description><![CDATA[<p>If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your computer, think twice. Their program already installed on your computer should be able to give them all the information that [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/can-you-trust-the-kindness-of-tech-support-strangers/">Can you Trust the Kindness of Tech Support Strangers?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your computer, think twice.<br />
<span id="more-2892"></span></p>
<p>Their program already installed on your computer should be able to give them all the information that they need. Even if the tech support person does require you to install another program, there is a possibility that the diagnostic program has an undiscovered security vulnerability.</p>
<p>If you do decide to install the program, at least make sure that the file location they offer you is on their main website, not a misspelled version such as qickbooks.com or abode.com.</p>
<p>Additionally, refuse to permit tech support to log in to your computer, even if you were the one who called them. Do you want to trust the security of your computer to a stranger?</p>
<p>Ask if there is some other way to provide them with the information they need.</p>
<p>Beware of imposters asking you to provide remote access or asking you to download diagnostic software.</p>
<p>The post <a href="https://fosterinstitute.com/can-you-trust-the-kindness-of-tech-support-strangers/">Can you Trust the Kindness of Tech Support Strangers?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Patching Nightmare – Please Forward to Your IT Pros</title>
		<link>https://fosterinstitute.com/patching-nightmare-please-forward-to-your-it-pros/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 23 Jan 2018 17:55:51 +0000</pubDate>
				<category><![CDATA[Adobe]]></category>
		<category><![CDATA[Adobe Flash]]></category>
		<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Patch Updates]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[CPU Chip Flaws]]></category>
		<category><![CDATA[CPU Chips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[deploying patches]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Intel]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[Java SE patch]]></category>
		<category><![CDATA[Oracle patches]]></category>
		<category><![CDATA[patching nightmare]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2607</guid>

					<description><![CDATA[<p>Intel says, again, to stop deploying patches. Java and other new patches need handling. Intel advises that IT Professionals stop deploying the current versions of patches for the recently discovered security flaws in CPU chips. Find details, just updated, by searching: Root Cause of Reboot Issue Identified Updated Guidance for Customers and Partners site:intel.com Do [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/patching-nightmare-please-forward-to-your-it-pros/">Patching Nightmare – Please Forward to Your IT Pros</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Intel says, again, to stop deploying patches. Java and other new patches need handling.<span id="more-2607"></span></p>
<p>Intel advises that IT Professionals stop deploying the current versions of patches for the recently discovered security flaws in CPU chips. Find details, just updated, by searching:<br />
Root Cause of Reboot Issue Identified Updated Guidance for Customers and Partners site:intel.com</p>
<p>Do not insert a space after the colon.</p>
<p>For most of you, deploying Microsoft patches is easy compared to managing Flash, Java, and browser updates. Oracle is releasing multiple security patches for Java SE. Additionally, if you are upgrading Chrome to the 64 bit version, Google is releasing new patches for that browser.</p>
<p>For executives wondering what to do at home, you may find it best to download fresh versions of any non-Microsoft browsers you use, and reinstall the most recent versions of Flash and Java, if you still use either, from <a href="https://get.adobe.com/flashplayer/">https://get.adobe dot com/flashplayer/</a> or <a href="https://www.java.com/en/">java dot com</a> . Your Microsoft and/or Apple patches are likely configured to install automatically.</p>
<p>For both organizations and home office users, if you can remove Flash and/or Java from some or all of your computers, then you can forget about patching them. If you haven’t already, try it on a few computers. You may find that all of the websites essential to your business no longer require either. Worst case, you can re-install the most recent version.</p>
<p>Executives, please forward this to your IT Professionals. Be sure to, if you have not already, have a conversation with them about how aggressive you want them to be with patching. They can share the pros and cons with you. These days, an aggressive posture related to patches can increase your security dramatically, when handled properly. Provide them time to test the patches, test un-installing the patches, and then to deploy the patches in stages. They will also need to contact your cloud providers to discuss how they are handling the flaws and patches.</p>
<p>The post <a href="https://fosterinstitute.com/patching-nightmare-please-forward-to-your-it-pros/">Patching Nightmare – Please Forward to Your IT Pros</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Three Serious Trends to Watch Out for in Cyber Security</title>
		<link>https://fosterinstitute.com/three-serious-trends-to-watch-out-for-in-cyber-security/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 18 Jan 2018 20:37:23 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Backup]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[CCleaner]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Data Restoration]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[attack tools]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[C-Cleaner]]></category>
		<category><![CDATA[cloud storage]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[data storage]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[healthcare breaches]]></category>
		<category><![CDATA[healthcare security]]></category>
		<category><![CDATA[insecure programs]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[online backup]]></category>
		<category><![CDATA[restore data quickly]]></category>
		<category><![CDATA[restore process]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[server back up]]></category>
		<category><![CDATA[servers]]></category>
		<category><![CDATA[software attacks]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2604</guid>

					<description><![CDATA[<p>First, are your servers backed up to the cloud? The use of online backup will continue to grow. Organizations are finding out, sometimes the hard way, the importance of being able to restore data quickly. Downtime can be extremely expensive for some organizations, so make sure you can restore quickly enough, especially if your data is [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/three-serious-trends-to-watch-out-for-in-cyber-security/">Three Serious Trends to Watch Out for in Cyber Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>First, are your servers backed up to the cloud? The use of online backup will continue to grow. Organizations are finding out, sometimes the hard way,<span id="more-2604"></span> the importance of being able to restore data quickly. Downtime can be extremely expensive for some organizations, so make sure you can restore quickly enough, especially if your data is stored in the cloud. Test your restore process.</p>
<p>Second, attackers will target, more than ever before, organizations who store protected health information. If you are in healthcare, or even if your company name makes it sound like you are in healthcare, ramp up security to unprecedented levels and have a plan of what to do when you are breached.</p>
<p>Third, more attackers will use trusted security software as a vector to infect networks. Attackers already infected the program called C-Cleaner, used by millions of people to, among other things, speed up slow Windows computers. C-Cleaner is a very useful, and trusted, security program. Unfortunately, this tool became a powerful attack tool when attackers took over the update server. What program, one that you trust, will attackers take over to use as a vector to hack your computer?</p>
<p>Please forward this to your friends who can be on the lookout too.</p>
<p>The post <a href="https://fosterinstitute.com/three-serious-trends-to-watch-out-for-in-cyber-security/">Three Serious Trends to Watch Out for in Cyber Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Major Flaw in Computer Processors Affects Security</title>
		<link>https://fosterinstitute.com/major-flaw-in-computer-processors-affects-security/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 04 Jan 2018 22:39:33 +0000</pubDate>
				<category><![CDATA[Computer Processor]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Linux Patch]]></category>
		<category><![CDATA[Microsoft Patch]]></category>
		<category><![CDATA[computer performance degradation]]></category>
		<category><![CDATA[Computer Processor Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Linux patch]]></category>
		<category><![CDATA[Microsoft patch]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2600</guid>

					<description><![CDATA[<p>A security vulnerability, that has existed for 10 years, has only recently been discovered. A patch for Linux has been released and Microsoft plans to release a patch next Tuesday. Apple will release a patch for OSX. For understandable reasons, many organizations are significantly behind schedule in applying patches. The patch won’t help protect your [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/major-flaw-in-computer-processors-affects-security/">Major Flaw in Computer Processors Affects Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A security vulnerability, that has existed for 10 years, has only recently been discovered.<span id="more-2600"></span></p>
<p>A patch for Linux has been released and Microsoft plans to release a patch next Tuesday. Apple will release a patch for OSX.</p>
<p>For understandable reasons, many organizations are significantly behind schedule in applying patches. The patch won’t help protect your organization until the patch is applied to your computers.</p>
<p>A big concern is that the patch is predicted to have a major impact on performance. Estimates of the degradation in the performance range from 0% to 30%. If you have computers that are slow anyway, this will matter to you.</p>
<p>Additionally, this vulnerability affects computers in the cloud too. Amazon and Microsoft have announced that they are working on patching their cloud servers.</p>
<p>Ask IT what the status is of your patches for all of your operating systems, and make a plan for getting your patches up to date.</p>
<p>The post <a href="https://fosterinstitute.com/major-flaw-in-computer-processors-affects-security/">Major Flaw in Computer Processors Affects Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protecting and Restricting iPads, iPhones, and Android Devices</title>
		<link>https://fosterinstitute.com/protecting-and-restricting-ipads-iphones-and-android-devices/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 02 Jan 2018 22:55:09 +0000</pubDate>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Children]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Cyber Security Trends]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Parental Controls]]></category>
		<category><![CDATA[protecting devices]]></category>
		<category><![CDATA[restricting devices]]></category>
		<category><![CDATA[Restricting internet access]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[technology safety]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2594</guid>

					<description><![CDATA[<p>Because many families, and business professionals, received new tablets for the holidays, it is important to consider security. Families, as well as businesses, may choose to restrict permissions on devices. Here’s how: Set a passcode on the device. Even a 4-digit code is much better than nothing. Just avoid 0000, 1111, 1234, 2580, or other [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/protecting-and-restricting-ipads-iphones-and-android-devices/">Protecting and Restricting iPads, iPhones, and Android Devices</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Because many families, and business professionals, received new tablets for the holidays, it is important to consider security. Families, as well as businesses, may choose to restrict permissions on devices. Here’s how:<span id="more-2594"></span></p>
<p>Set a passcode on the device. Even a 4-digit code is much better than nothing. Just avoid 0000, 1111, 1234, 2580, or other easily guessed codes. Keeping the device in your possession, or in a secure place, is just as essential since is can prevent the opportunity for someone to guess your password.</p>
<p>Keep the device backed up, and apply security patches as soon as they are released. The patches often protect against attacks that are already happening in the wild.</p>
<p>Do not connect to Wi-Fi networks without weighing the risk of convenience versus your potential benefits. When you connect to any Wi-Fi network, there is a chance that attackers can exploit your device in many ways. Because bad actors can trick your device into connecting to their malicious access points without your knowledge, consider using your device’s settings to disable Wi-Fi when you are not using it. Re-enable Wi-Fi only when you are at your office, home, or in another trusted environment.</p>
<p>At the office, there is technology that will allow your IT team to implement MDM, Mobile Device Management, to restrict your team members’ activity on their devices. This can help protect against one of your team members accidentally becoming a vector for attackers to access, and potentially interfere with, your entire organization’s network.</p>
<p>For families, keep these three possibilities in mind:</p>
<p>First, use the internal parental controls and restrictions that are built into the device. The settings and features are very effective, and well documented on the support sites. More features can be added with security and feature updates, so review the settings periodically. The best strategy for using these restriction settings is to use steps A, B, and C.</p>
<ul>
<li>Step A: As you apply security and privacy restrictions to a device for a family member, keep reminding yourself that you are restricting that device for their, not your, needs. It is easy to think about how you might want to use wireless payment options, and then you avoid restricting the options accordingly. When in doubt, restrict. You can always re-enable features later.</li>
<li>Step B: Before applying parental control restrictions, first configure the other settings on the device. If you apply parental control restrictions first, you may find that you’ve restricted your own ability to adjust these settings.</li>
<li>Step C: Wait until you finish steps A and B before you apply the restrictions designed to protect family members. You’ll be prompted to create your own unique password so that, in theory, only you can adjust the parental controls.</li>
</ul>
<p>Second, when protecting families, consider commercially available tools designed to enhance your ability to, not only restrict, but also monitor usage. Many reviews place a product named Qustodio at the top of the list. We receive no compensation in any way for recommending this, or any other product or service. We just want you to have a place to start. It seems that, for many of the control tools available, parents either love them or hate them, depending on their expectations. To help ensure a good outcome for you, research the features and read comments from other parents. Restrict your search to comments made in 2017. Each product’s features, and approval ratings, tend to change from year to year. Some products will even permit you to restrict laptops and desktop computers in addition to tablets and phones. Interestingly, you may find that third party software is able to restrict Android devices more than Apple devices. This is because Apple’s own internal controls are already so restrictive, they can partially block the parental control software too.</p>
<p>Third, consider restricting the Internet access at your home, too. For example, you may choose to set a time limit on usage duration or time of day. This can help ensure that youngsters get enough sleep. A very powerful tool is called Circle with Disney. Again, we receive no compensation for recommending products or services. This tool is widely accepted as being one of the best. If nothing else, check out its features to help you get an idea of what you may want to control. It has a feature that can restrict access even when the device uses a cellular connection or connects to a different network. That added protection can prevent family members from simply going to someone else’s house to operate without restrictions. Bear in mind that Internet filtering tools do not restrict the ability for family members to use apps, except for apps that need to connect to the Internet in order to function. The afore mentioned products can control both apps and Internet usage. But sometimes having two products can be helpful too.</p>
<p>When implementing family control tools, remember that all of them include privacy risks. While restricting apps and Internet usage, software is able to monitor your family members’ electronic behavior too. That information can be sold to marketing firms who already build a profile on each consumer. Do you want to contribute to what they know about your family members? What if bad actors gain access to information that helps them target a family member? You may decide the risks are worth the benefits.</p>
<p>Please forward this information to everyone you know who might want to place restrictions on Apple and Android based devices. Thank you for helping make the world a safer place to live and work! Happy New Year!</p>
<p>The post <a href="https://fosterinstitute.com/protecting-and-restricting-ipads-iphones-and-android-devices/">Protecting and Restricting iPads, iPhones, and Android Devices</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Three Biggest Cyber Security Trends Right Now</title>
		<link>https://fosterinstitute.com/the-three-biggest-cyber-security-trends-right-now/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 21 Dec 2017 13:00:56 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Service Provider Breach]]></category>
		<category><![CDATA[Breach Audit]]></category>
		<category><![CDATA[Contractor Breaches]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Cyber Security Trends]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[security awareness training]]></category>
		<category><![CDATA[Service Provider Breaches]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Third Party Audit]]></category>
		<category><![CDATA[Vendor Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2589</guid>

					<description><![CDATA[<p>First, the attacker population is outpacing the ability to control them. Attacks are trending higher at an ever-increasing rate. Be extra security-diligent. Second, ransomware, software that prevents you from accessing your information until you pay a ransom, incidences are accelerating. People still blame attackers for ransomware. Mostly thats an excuse. The solution is to be [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/the-three-biggest-cyber-security-trends-right-now/">The Three Biggest Cyber Security Trends Right Now</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>First, the attacker population is outpacing the ability to control them. Attacks are trending higher at an ever-increasing rate. Be extra security-diligent.<span id="more-2589"></span></p>
<p>Second, ransomware, software that prevents you from accessing your information until you pay a ransom, incidences are accelerating. People still blame attackers for ransomware. Mostly thats an excuse. The solution is to be more proactive and increase security before the ransomware can attack. And test your speedy restore capability regularly, just in case.</p>
<p>Last, about half of the breaches we see started with some service provider. All companies that provide you with goods and services might have infections on their networks that lead to a breach of data or an interruption in their ability to serve you, which may interfere with your ability to serve your customers. If they have a connection to your network, or exchange data with you in any way, they may unwittingly do something that compromises your organizations security. Be sure your vendors and service providers are security minded and have audits by qualified independent auditors.</p>
<p>Forward this to all the executives you know. Together we can make the world a safer place.</p>
<p>The post <a href="https://fosterinstitute.com/the-three-biggest-cyber-security-trends-right-now/">The Three Biggest Cyber Security Trends Right Now</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>About Half of All Breaches are Caused by a Contractor or Service Provider</title>
		<link>https://fosterinstitute.com/about-half-of-all-breaches-are-caused-by-a-contractor-or-service-provider/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 14 Dec 2017 18:48:31 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Breach Audit]]></category>
		<category><![CDATA[Contractor Breaches]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[security awareness training]]></category>
		<category><![CDATA[Service Provider Breaches]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Third Party Audit]]></category>
		<category><![CDATA[Vendor Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2585</guid>

					<description><![CDATA[<p>In our experience of auditing after breaches have happened, about half were caused by a service provider working for the company that gets breached. Almost always, the vendor or contractor had no malicious intent. Their organization’s own IT systems were not secure, and/or their team members performed actions in a non-secure way. Be sure the [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/about-half-of-all-breaches-are-caused-by-a-contractor-or-service-provider/">About Half of All Breaches are Caused by a Contractor or Service Provider</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In our experience of auditing after breaches have happened, about half were caused by a service provider working for the company that gets breached.<span id="more-2585"></span></p>
<p>Almost always, the vendor or contractor had no malicious intent. Their organization’s own IT systems were not secure, and/or their team members performed actions in a non-secure way.</p>
<p>Be sure the service providers you use are working every day to be more secure too. Ask them about their security awareness training program. Ask them how often they are audited by independent third party firms that are interested in helping them increase their own security. If you want to, encourage them to sign up for our newsletter.</p>
<p>Remember, your IT security relies on their IT security too.</p>
<p>The post <a href="https://fosterinstitute.com/about-half-of-all-breaches-are-caused-by-a-contractor-or-service-provider/">About Half of All Breaches are Caused by a Contractor or Service Provider</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>One Setting Can Protect Your Network from Ransomware</title>
		<link>https://fosterinstitute.com/one-setting-can-protect-your-network-from-ransomware/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 05 Dec 2017 17:19:37 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[firewall settings]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[how ransomware spreads]]></category>
		<category><![CDATA[infected computers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[local firewall]]></category>
		<category><![CDATA[multiple machine attacks]]></category>
		<category><![CDATA[preventing ransomware]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[workstation commmunication]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2582</guid>

					<description><![CDATA[<p>Once an attacker accesses one computer, they attempt to traverse the network and infect other computers too. That’s how ransomware spreads on a network. By default, all of your computers permit communication between each other, and attackers use those same communication channels to spread attacks from one machine to the next. The solution is so [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/one-setting-can-protect-your-network-from-ransomware/">One Setting Can Protect Your Network from Ransomware</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Once an attacker accesses one computer, they attempt to traverse the network and infect other computers too. That’s how ransomware spreads on a network.<span id="more-2582"></span></p>
<p>By default, all of your computers permit communication between each other, and attackers use those same communication channels to spread attacks from one machine to the next.</p>
<p>The solution is so basic that it is often overlooked: Computers do not need to talk to each other anyway, just to servers. Block the communication between workstations, and you take away a major vector used by ransomware to spread.</p>
<p>Ask your IT team to use local firewall settings on each computer to prohibit communication between workstations. They can make the setting once, and your servers will propagate that message to the other computers on the network. Give them a little time to complete this, because they will want to test their settings.</p>
<p>Please forward this message to help make the world a safer place. And remember, the more secure your service providers are, the more secure you are too.</p>
<p>The post <a href="https://fosterinstitute.com/one-setting-can-protect-your-network-from-ransomware/">One Setting Can Protect Your Network from Ransomware</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Mac Vulnerability Permits Unauthorized Login</title>
		<link>https://fosterinstitute.com/mac-vulnerability-permits-unauthorized-login/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 29 Nov 2017 16:25:29 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[High Sierra]]></category>
		<category><![CDATA[Mac Protection]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[Apple operating system]]></category>
		<category><![CDATA[apple risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[enable root user]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[High Sierra Vulnerability]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Mac security]]></category>
		<category><![CDATA[MacOS High Sierra risk]]></category>
		<category><![CDATA[OS Vulnerability]]></category>
		<category><![CDATA[reset root password]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[unauthorized]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2578</guid>

					<description><![CDATA[<p>Apple’s newest operating system has a serious vulnerability that can allow someone else to logon to your Mac. Here’s what to do:  First, see if you are vulnerable. Click on the apple symbol on the top left of your screen, then choose About This Mac. If you have macOS High Sierra, you are probably vulnerable. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/mac-vulnerability-permits-unauthorized-login/">Mac Vulnerability Permits Unauthorized Login</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Apple’s newest operating system has a serious vulnerability that can allow someone else to logon to your Mac. Here’s what to do: <span id="more-2578"></span></p>
<p>First, see if you are vulnerable. Click on the apple symbol on the top left of your screen, then choose About This Mac. If you have macOS High Sierra, you are probably vulnerable. If you have anything else, stop here.</p>
<p>Second, you can protect yourself by making sure nobody other than you can get to your computer. So far, though theoretically possible, the vulnerability has not been exploited remotely unless you have enabled “Share my Screen.” If you feel confident that no bad actors will have access to your computer, you can stop here.</p>
<p>Third, reset the root password. Apple provides the 8 necessary steps at <a href="http://support.apple.com/en-us/HT204012">support.apple.com/en-us/HT204012</a> , Scroll down to the section entitled: Change the Root Password. In their step 7, if the option Edit &gt; Change Root Password is grayed out on your Mac, then instead click the option Edit &gt; Enable Root User and continue with step 8.</p>
<p>Please forward this to everyone you care about that has a Mac.</p>
<p>The post <a href="https://fosterinstitute.com/mac-vulnerability-permits-unauthorized-login/">Mac Vulnerability Permits Unauthorized Login</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Secret Operating System is Running Inside Your Computers</title>
		<link>https://fosterinstitute.com/a-secret-operating-system-is-running-inside-your-computers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 28 Nov 2017 17:04:01 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[MINIX]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[Ring Potential Three]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[minix]]></category>
		<category><![CDATA[os]]></category>
		<category><![CDATA[ring negative three]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[second operating system]]></category>
		<category><![CDATA[secret operating system]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2570</guid>

					<description><![CDATA[<p>If this gives you a sinking feeling, it should. What most people don’t know is that, if your computer uses an Intel brand CPU, there is a hidden microprocessor dedicated to running a second operating system called MINIX. And MINIX is running right now. That’s right. You have a second computer running inside each of [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/a-secret-operating-system-is-running-inside-your-computers/">A Secret Operating System is Running Inside Your Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If this gives you a sinking feeling, it should. What most people don’t know is that, if your computer uses an Intel brand CPU, there is a hidden microprocessor dedicated to running a second operating system called MINIX. And MINIX is running right now.<span id="more-2570"></span></p>
<p>That’s right. You have a second computer running inside each of your organization’s existing computers. And probably don’t know it.</p>
<p>An attacker’s dream come true:<br />
-A scarcely known operating system<br />
-Hidden in millions of computers<br />
-Using a secret microprocessor<br />
-With priority over everything else on the computer. Something IT Pros refer to as ring negative three.<br />
-With network access<br />
-Patching security flaws are a nightmare<br />
-And there is no anti-virus</p>
<p>Even if the attackers don’t soon find a quick way to access sensitive information, they might find a way to shut down all of your servers. And keep them shut down.</p>
<p>Intel has great intentions. MINIX is part of Intel’s ME Management Engine that has desirable features. MINIX runs on, coexists with, Windows, Linux, or whatever you thought was the only operating system.</p>
<p>The most important thing for you, as an executive, to do is to make sure your IT Team is aware of MINIX. They can read more at <a href="http://www.zdnet.com/article/intel-weve-found-severe-bugs-in-secretive-management-engine-affecting-millions/">www.zdnet.com/article/intel-weve-found-severe-bugs-in-secretive-management-engine-affecting-millions/</a></p>
<p>The race is on: Attackers are looking for ways to use MINIX to their advantage. Intel, Google, and others are working to find ways to make MINIX more secure.</p>
<p>Forward this message to any organizations that you care about, especially organizations upon which you rely to perform services and provide products to your own organization. If they get shut down, or infiltrated, that will affect you too.</p>
<p>The post <a href="https://fosterinstitute.com/a-secret-operating-system-is-running-inside-your-computers/">A Secret Operating System is Running Inside Your Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
