InfoSight’s Blog

InfoSight, Inc is a leader in cyber security & compliance for regulated industries. Our blog covers the latest innovative and leading-edge information on IT, managed security & network infrastructure to help organizations optimize how business-critical information is processed, managed and stored.

Social Engineering: Pretexting

Social engineering is a hacker’s clever manipulation of the natural human tendency to trust, with the goal of obtaining information that will allow him/her to gain unauthorized access to a valued system and the information that resides on that system. Pretexting is the act of using an invented scenario to persuade a targeted victim to release information or perform some action, usually over the telephone. The ultimate goal is to get enough information from enough people to either sell this [...]

By | February 12th, 2016
Categories: Security Awareness|Tags: , , , , |Comments Off on Social Engineering: Pretexting

Social Engineering: Impersonation

No matter how secure a system is, there’s always a way to break in. While software companies are learning how to strengthen their programs, hackers and malicious social engineers are turning to the weakest part of the infrastructure – the people. Impersonation is when a person plays the role of someone you are likely to trust or obey convincingly enough to fool you into allowing access to your office, to information, or to your information systems. This type of social [...]

By | January 29th, 2016
Categories: Security Awareness|Comments Off on Social Engineering: Impersonation

How to Protect Yourself from Identity Theft Tax Refund Fraud

Identity Theft Tax Refund Fraud Tax season is officially upon us. It’s time to gather your W-2s, crunch numbers and mail your annual income taxes to Uncle Sam. It’s also time to learn about the number one fraud of the season: identity theft tax refund fraud. Understanding how cyber criminals pull it off and what the consequences are for victims can help protect yourself. Identity theft tax refund fraud occurs when someone uses another person’s Social Security number to file [...]

2015’s Consumer Risk Index

A survey conducted by Hart Research Associates, from June 24 to July 26, 2015, among 1,029 USA participants ages 18-69, for Travelers tallied 2015's Consumer Risk Index. This annual survey, third year ongoing, includes findings of consumer’s awareness on finances, privacy, cyber threat, and physical risks. The top three consumer risks in 2015 were: Financial Concerns & Risks- 66% of contributors showed a priority in this area. Personal Privacy or Identity Theft- 60%, or six out of ten people, worry about having [...]

By | December 2nd, 2015
Categories: Security Awareness|Comments Off on 2015’s Consumer Risk Index

Shop Safely Online!

The Holiday Season is officially upon us, and with its magnificent splendor, the joyous music and glistening lights comes the shopping rush. In the midst of all the celebration we must keep in mind the holidays are also prime season for cyber thieves. As we have seen in the past with Target's huge Data Breach last Christmas, where 40 million debit and credit card numbers were stolen, we are all at risk. So, here are some tips for a safe [...]

By | November 27th, 2015
Categories: Security Awareness|Comments Off on Shop Safely Online!

How to effectively manage Technology Service Providers (TSPs), reduce cyber risk, and ensure compliance

Data breaches continue to make headlines – it’s important to make sure that third-party vendors are not putting your business at risk.  By Brian Smith   Vendor risk is real. Two out of three companies rely on third parties. The value that third-party technology service providers (TSPs) bring can quickly be eroded by the associated cyber risks. You need to know what’s happening and what to do before the problem strikes.  The Federal Financial Institutions Examination Council (FFIEC) expects financial institutions [...]

By | November 17th, 2015
Categories: Compliance & Business Continuity|Comments Off on How to effectively manage Technology Service Providers (TSPs), reduce cyber risk, and ensure compliance