Blog

3 Key Steps to Effective Patch Management

Patch Management is reviled, impossible and critical. It’s technically difficult if not impossible, it’s prone to issues that can lead to disruption, and it’s absolutely required from a security and compliance standpoint. Let’s look at why each of these statements is...

Record fines come on the heels of warnings about cyber risk

Record fines come on the heels of warnings from US Intelligence warning of a growing risk to our utility providers.  Similar warnings have been issued for law firms, higher education, and small businesses, so this information is relevant to a wide spectrum of...

SUBSCRIBE TO OUR Blog UPDATES

Special Directive on Domain Name System (DNS) Compromise

Last week the USA’s Department of Homeland Security (DHS) sent out a directive for all agencies to upgrade their Domain Name System (DNS) security in light of a wave of Iranian hack attempts specifically targeted at compromising DNS. The compromise The Iranian...

New data breach notification legislation effective in 2019

State's are passing legislation to address the concerns of the public over protection of data and notifications and remedies when personal data is breached.  So far in 2019,  Vermont began regulating data brokers and South Carolina’s adoption of the National...

Growing Revenue with Foresite

We are very excited about 2019 as our Reseller Channel continues to grow. We know that in addition to wanting to solve cybersecurity and compliance problems for your clients, you also partnered (or are considering partnering) with Foresite to grow revenue.   Here are...

Threat Intelligence – Real or Hype?

Threat intelligence, we keep hearing about it from security vendors, but what is it really? Is it hype or marketing speak that will be promoted by those without a real grasp of what it means, or is it the real deal? One problem in defining threat intelligence is that...

Giving Thanks

It seems appropriate for this week's blog to give thanks to our Resellers, Distributors and our Clients for all of your support in 2018.  Foresite continues to expand our staff and our offerings (including a new patch management service for 2019) and we could not do...

SOC2 for Small Businesses

More and more we see small businesses being asked by their clients for some sort of assurance that the data shared with them is kept secure and private. Many times a SOC 2 certification is being requested.  If this happens to you (or your client), the question is...

Zero Trust Networks

What is a zero trust network? Traditionally networks were built for the purpose of communication and collaboration. Due to the increasing cyber threat and the ability of criminals to exploit this openness it has grown increasingly necessary that the networks be...

Higher education one of the worst sectors at handling cyber attacks

The higher education sector ranks highest among the worst business sectors for handling cyberthreats, with 73% of organizations taking three or more days to apply a patch.—EfficientIP Report released  9/10/2018 The higher ed sector is an attractive target for hackers...

California Consumer Privacy Act of 2018 (CCPA) vs the EU General Data Protection Regulation (GDPR)

 The passage of the California Consumer Privacy Act (CCPA) has now raised the question as to whether the measures companies have implemented to comply with the General Data Protection Regulation (GDPR) will satisfy the CCPA. Unfortunately, the answer is largely, "No."...

Case Study: Fully Managed SIEM service

Our Reseller had a client who was looking at Security Information and Event Management (SIEM) options, however they had concerns about their ability to manage and monitor a SIEM with their internal staff.  Their Reseller suggested that they talk to us to see if our...

Financial sector must be prepared for more sophisticated threats

The increased security measures that most financial organizations now have in place have caused hackers targeting the financial sector to up the ante, deploying more sophisticated malware.  This new breed of malware avoids detection by signature-based tools and is...

INTERESTED IN WHAT FORESITE CAN DO FOR YOU?

At Foresite, we like to consider each client’s needs individually, in order to determine the best approach to your unique requirements. So let’s talk! Contact Foresite to request a scoping call today.