Notice: Undefined variable: content in /home/fosterinstitute/public_html/wp-content/themes/divi-child/functions.php on line 364
Notice: Undefined variable: post in /home/fosterinstitute/public_html/wp-content/themes/divi-child/functions.php on line 374
Notice: Trying to get property 'ID' of non-object in /home/fosterinstitute/public_html/wp-content/themes/divi-child/functions.php on line 374
Notice: Undefined variable: post in /home/fosterinstitute/public_html/wp-content/themes/divi-child/functions.php on line 374
Notice: Trying to get property 'ID' of non-object in /home/fosterinstitute/public_html/wp-content/themes/divi-child/functions.php on line 374
Notice: Undefined variable: post in /home/fosterinstitute/public_html/wp-content/themes/divi-child/functions.php on line 374
Notice: Trying to get property 'ID' of non-object in /home/fosterinstitute/public_html/wp-content/themes/divi-child/functions.php on line 374
Notice: Undefined variable: post in /home/fosterinstitute/public_html/wp-content/themes/divi-child/functions.php on line 374
Notice: Trying to get property 'ID' of non-object in /home/fosterinstitute/public_html/wp-content/themes/divi-child/functions.php on line 374
Warning: Use of undefined constant custom_pagination - assumed 'custom_pagination' (this will throw an Error in a future version of PHP) in /home/fosterinstitute/public_html/wp-content/themes/divi-child/functions.php on line 387
-
The Next Time You’re Bored or Waiting, Delete Some Unused Apps from your Android or iPhone
You see the headlines: “App discovered to be spying on you,” or “App removed from the store because it was downloading private information.” Delete your third-party apps. You can always reinstall them if you decide to use them. Your phone and tablet are more secure the fewer apps you have. Most people only use 20% […]
Continue Reading -
Anatomy of a Password Attack, and How to Prevent Them
Password attacks against businesses happen all the time. You can protect your organization. Imagine that your firewall has doors to allow connections into your network. Usernames and passwords are the keys to unlocking the doors. An effective cybersecurity control is to remove the doors. When there is no door, there is no keyhole for an […]
Continue Reading -
Vacationing? Use Safer Internet Connections
If you are traveling on vacation, it will be tempting to use W-Fi wireless connections in airports, coffee shops, hotels, and in-flight Wi-Fi. Many people do not realize that using public Wi-Fi can be very dangerous. Use the data-sharing function of your phone. Most phones these days permit you to connect your laptop through the […]
Continue Reading -
Tell People about Covering Cameras, and You Might Save a Life
Have you ever noticed you are in a video conference call and did not realize your camera was capturing you? Or maybe you have two cameras, and your software unexpectedly selected the wrong one and broadcast an unflattering camera angle or showed something in the background you thought was out of frame? Embarrassing. Cover up […]
Continue Reading