What grade would your school get in cybersecurity?

What grade would your school get in cybersecurity?

Cyberattacks that focus on schools are becoming more frequent. Why? Schools are considered an easy target as lack of funding for proactive cybersecurity means that the IT team is woefully outgunned and often already overwhelmed with providing the day-to-day support...
Classifying the severity of a cyber incident

Classifying the severity of a cyber incident

Ideally you would already have classified your data and be aligned with a cybersecurity or compliance framework to be able to effectively classify the severity level of various types of incidents.  This quick reference model can help with communication and next steps...
Should you do your own cybersecurity monitoring?

Should you do your own cybersecurity monitoring?

Should you do your own cybersecurity monitoring?  It’s a fair question. You may already be paying for IT staff and many tools exist to collect logs. There are important considerations when you make this decision. Let’s start with your staff.  If they are...
Shift to remote workers – minimize risk and maintain compliance

Shift to remote workers – minimize risk and maintain compliance

Change Management is really risk management. Change management is viewed as a set of rigid standards and processes, but really change management should be an enabler of change and not an obstacle. The point of change management is to ensure that any type of change is...
IT Vendor Risk Management Guide

IT Vendor Risk Management Guide

Let’s take a look at the different issues that are classified as vendor risks. Of course, the risks for your business may differ from those listed here. At Foresite, we’re happy to work with you to provide services that make sense for your company. If you...