SMBs are huge targets for cyber breaches – What can be done?

SMBs are huge targets for cyber breaches – What can be done?

A 2017 Ponemon study confirmed that Small-Medium Businesses (SMBs) are key targets for cyber breaches, mainly due to employee error that allows in malware and ransomware.  What is even more alarming is that the damages are now averaging over $1M, a price few SMBs can...
Case study in retail cybersecurity

Case study in retail cybersecurity

The highest compliment we can get is when an engagement comes to us via a referral, and that’s how we connected with the CFO for a grocery chain.  He explained that while the stores were in the midst of working with their Point-of-Sale vendor on updating the...
The importance of being vigilant

The importance of being vigilant

This week’s post courtesy of Simon Dawson, Foresite Security Analyst Not all attacks to your network come from the cyber world. Some attacks come physically, and if employees aren’t vigilant or trained well, they could unknowingly allow a potential breach....
Be Careful Who You Share That Report With

Be Careful Who You Share That Report With

This is a true story will details changed to protect the client. Recently Foresite was engaged to perform a very in-depth review of an organization’s cybersecurity and compliance.  We looked at everything from flow of sensitive data throughout the network,...
A look back at 2015 cybersecurity and compliance engagements

A look back at 2015 cybersecurity and compliance engagements

This week’s post was written by Tracy Fox, Foresite Channel Director. It’s always exciting to start a new engagement (especially with a client we have never worked with before) but the most rewarding part for me is the project debrief call when we confirm...
The CIA email hack and the danger lurking in your organization

The CIA email hack and the danger lurking in your organization

The first rule of cyber security is identifying what data you need to protect and where it resides.  Hillary Clinton was using private email for official business and her sensitive files exist on a backup server not controlled or protected by the government’s IT...