Quantcast
Channel: Cyber Security Consultant – Mike Foster, CEH, CISA, CISSP
Browsing all 113 articles
Browse latest View live

Microsoft Will Stop Protecting Windows 7 on January 14, 2020

Windows 7 computers will still run, your anti-virus will still work, as will your other programs. But you are taking a significant risk because Microsoft will no longer provide security updates that...

View Article


Avoid Opening Word Attachments – Check with IT First

When you receive an email message with a PDF attached, it is always best to confirm that you are expecting the attachment before opening it.  However, if you receive a Word, Excel, or another file type...

View Article


Protect Your Network Even when Attackers Trick Your Users

A business contacted our office last week because a bad actor tricked an employee to give them full access to their computer. The bad actor immediately took over the network and started performing...

View Article

What Will You Do if Your Customers’ Spam Filters Block Your Messages?

One of the ways your spam filter helps to stop unwanted messages is to block messages from mail servers with a bad reputation for spamming. What will you do if your company gets labeled as a spammer?...

View Article

Good News for Windows 7 Users

Microsoft stops supporting Windows 7 on January 14, 2020. If you are not going to upgrade, there are options. Of course, in most circumstances, it is best to upgrade. Windows 7 is dated and missing the...

View Article


Remember to Give Your IT Pros a Holiday Gift

Your IT Team pours out so much time and energy. If you aren’t already, you can brighten their holidays by giving them a gift. The work they do is often so complicated, yet they make it look easy....

View Article

Adobe Flash Stops on December 31, 2020. Are You Ready?

For more than 20 years, Adobe Flash helped websites deliver video content to your screen. However, attackers use Flash to inject ransomware and other malicious code into computers. The bad actors are...

View Article

Information that You Need to Know About the California Consumer Privacy Act

California’s CCPA act went into effect on January 1, but you have until July 1, 2020 when it is enforced. Get started now. First, you need to Add a footer to all of your web pages to the effect of “The...

View Article


Executives Appreciate it when IT Professionals Communicate Effectively

Today, an IT Guru called to gather more information as he prepared to meet with his executives. His methodology was impressive, and executives might want to forward this to your IT professionals. IT...

View Article


Prepare Your Organization for a Reaction to Coronavirus

The city of San Francisco just declared a state of emergency over the Coronavirus. Other cities will follow suit – maybe yours. I’m in San Francisco right now at the RSA cybersecurity conference. Hand...

View Article

Recommendations for Cybersecurity for Remote Workers During Coronavirus

The rapidly changing situation of potential school closures, self-quarantines, and public reaction to the coronavirus guarantees that at some point you will have employees who need to work from home....

View Article

Alert Your Team – USB Devices, Login Prompts, and Apps

Warn your users about three ways attackers continue to exploit the COVID-19 crisis: USB: A new ploy is bad actors mailing USB devices, appearing to be from your company to your users. Once plugged in,...

View Article

Follow Along to Set Zoom Security Settings

This video is for non-technical people who need to make Zoom more secure today. So, if that’s you, open up your zoom account settings on your screen, and keep this video where you can see it...

View Article


Zoom Security Issues – Protect Yourself

Every business is concerned and should be, about cybersecurity during online meetings. Due to its popularity, Zoom is an attractive target for the bad actors. There are hundreds, maybe more, people...

View Article

Zoom Security Settings – The Concise Details

Zoom has many security settings. This is a detailed but concise guide to the settings and how they work. Fasten your seatbelt. There are lots of security settings in Zoom. You must change default...

View Article


Zoom Security – Set Up Two-Step Login

Protect your Zoom account. If someone discovers your username and password for Zoom, two-step login should block them from logging in as you. This video walks you through setting up the two step login...

View Article

Video Conferencing – Avoid Installing Meeting Programs When Possible

CEOs and Executives: Avoid installing video conferencing software on your computer just because some other company tells you to. When you launch video conferencing programs, many of them ask you to...

View Article


Two Tips to Make Your Online Meetings Better

Everyone is concerned about video conferencing security, and they should be. But when the hardware and software are not working right, safety seems like a distraction. Use at least two monitors. You...

View Article

Power Down to Boost Security

One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don’t want to power it down, at least disconnect from your network. You’ll make your...

View Article

Your Work From Home Users are Like a Box of Chocolates

Because of so many work from home users, the Internet is like a box of chocolates for attackers. Step 1: Attackers compromise work-from-home users. Step 2: They gain access to their company. Step 3:...

View Article
Browsing all 113 articles
Browse latest View live