Blog

Are you spending enough (or too much) on cybersecurity?

Are you spending enough (or too much) on cybersecurity?

What is the right amount to spend on cybersecurity?  Gartner reports average spend of 5-8%, but a CIO survey showed closer to 15% of the IT budget with almost a quarter of the respondents allocating more than 20% of their IT budget to securing their data. Now that...

Master Agents Fighting Cybercrime

Master Agents Fighting Cybercrime

As cybercrime continues to increase, master agents are expanding their services to help protect their customers from losses related to cyber incidents. Telarus recently added Foresite's cybersecurity testing, compliance assessments, audits and consulting, and SOCaaS...

10 things the C-Suite needs to understand about cybersecurity

10 things the C-Suite needs to understand about cybersecurity

Executive involvement is a critical component to any organization's cybersecurity. Why?  The IT department may not have all of the knowledge about what data could have a critical impact on the business if it was lost or exposed, IT can recommend security controls, but...

SUBSCRIBE TO OUR Blog UPDATES

What basics do I need to know about quantum computing?

What basics do I need to know about quantum computing?

We keep hearing about quantum computing and how it is going to change cybersecurity as we know it, but what is it? Today’s computing is made up of binary bits either 0 or 1, therefore if we ask a computer to guess a number 0-9 it will try 0000, then 0001, 0010,0100,...

What is the government doing to protect us from cybercrime?

What is the government doing to protect us from cybercrime?

A question we have been hearing a lot lately is "what is the government doing to protect business from cyber threats", after all, cyber attacks are often coming from other countries and have been compared to another form of warfare or terrorism. Here in the U.S., the...

How has COVID changed cybersecurity?

How has COVID changed cybersecurity?

Priorities have shifted a bit as COVID drastically changed the way work is being done for so many organizations.  Now that it's become clear that it will not be as short-term a change as we first thought, how does this impact cybersecurity?  Based on our insights and...

Case study – The evolution of a solution

Case study – The evolution of a solution

The time had come for a contract renewal with one of our Managed Security Services clients, and we started the conversation with a look back at what we have accomplished together since 2015 when the relationship began. At that time, the main focus was on replacing...

5 Tips for Effective Log Analysis

5 Tips for Effective Log Analysis

The technologies that you have invested in can provide even more value if you are able to analyze the log data effectively.  Here are 5 key tips: Know which logs to monitor and which not to monitor.  With the average infrastructure generating millions of log events,...

What is Cyber Security as a Service (CSaaS)

What is Cyber Security as a Service (CSaaS)

When you think about information technology implementation and support, the optimal solution is often the combination of internal resource(s) who know the business, the culture and the current technologies and controls and an outside resource who specializes in the...

A Third Party Claims You Have Been Breached, What Do You Do?

A Third Party Claims You Have Been Breached, What Do You Do?

Organizations sometimes ignore breach notifications because of a loophole in virtually all privacy regulations – they do not address third-party notifications, so companies feel free to ignore them. Whether deliberate or a casualty of the notification overload...

Serverless Computing Security Considerations

Serverless Computing Security Considerations

One of the latest approaches to client server computing is going ‘serverless" - a move from ‘DevOps’ to ‘NoOps’. In serverless computing, the developers use code to simply create instances.  Serverless computing is a cloud computing execution model in which the cloud...

States look to Feds for cybersecurity funding

States look to Feds for cybersecurity funding

The recent pandemic has left state and local governments with budget shortfalls as cyber threats continue to rise, leaving state asking the federal government for funding to help them protect their data. A coalition of Governors, Comptrollers, CIOs and Emergency...

Cyber insurers increase scrutiny of policyholders

Cyber insurers increase scrutiny of policyholders

COVID-19 has changed our world in many ways, and the Wall Street Journal reports that due to the heightened security risk from the increased remote workforce, commercial insurers are taking a closer look at their policyholders and new applicants for cyber coverage....

Demystifying SOC Opinions and Exceptions

Demystifying SOC Opinions and Exceptions

The difference in how well a SOC 2 organization measures up is in the details. CPA firms who audit for SOC 2 compliance use exceptions and opinions, so it's important to understand how these apply. Exceptions Audit exceptions are simply deviations from the expected...

Is your SOC ready for the future?

Is your SOC ready for the future?

A reported by Ponemon on The Economics of Security Operations Centers: What Is the True Cost for Effective Results" included a number of key findings to consider if you are looking at setting up a SOC, reviewing the value of your current SOC or considering outsourcing...

What does this story about celebrity data mean for you?

What does this story about celebrity data mean for you?

A ransomware attack has hit a prominent NYC law firm with a client list that includes top celebrities, musicians, sports stars and media companies.  The attackers are demanding an undisclosed ransom or they will begin leaking data in a phased approach, putting the...

Should You Rely On Your Cyber Insurer for Incident Response?

Should You Rely On Your Cyber Insurer for Incident Response?

If your business suffered a fire, who would you want to call first, your commercial insurer to file a claim or the fire department to come put out the flames?  When a cyber incident occurs, the same thinking should apply, but it is being complicated by organizations...

What is MITRE ATT&CK?

What is MITRE ATT&CK?

MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations of cyberattacks. They’re displayed in matrices that are arranged by attack stages, from initial system access to data theft or machine...

What grade would your school get in cybersecurity?

What grade would your school get in cybersecurity?

Cyberattacks that focus on schools are becoming more frequent. Why? Schools are considered an easy target as lack of funding for proactive cybersecurity means that the IT team is woefully outgunned and often already overwhelmed with providing the day-to-day support...

Classifying the severity of a cyber incident

Classifying the severity of a cyber incident

Ideally you would already have classified your data and be aligned with a cybersecurity or compliance framework to be able to effectively classify the severity level of various types of incidents.  This quick reference model can help with communication and next steps...

Should you do your own cybersecurity monitoring?

Should you do your own cybersecurity monitoring?

Should you do your own cybersecurity monitoring?  It's a fair question. You may already be paying for IT staff and many tools exist to collect logs. There are important considerations when you make this decision. Let's start with your staff.  If they are like most IT...

IT Vendor Risk Management Guide

IT Vendor Risk Management Guide

Let's take a look at the different issues that are classified as vendor risks. Of course, the risks for your business may differ from those listed here. At Foresite, we're happy to work with you to provide services that make sense for your company. If you have a need...

The rush to allow users to work from home due to the COVID-19 virus opens up an increased threat vector. As companies struggle to allow their employees to work from home creating social distancing, security may not be sufficiently considered. Before just turning on...

What Are HIPAA Log Requirements?

What Are HIPAA Log Requirements?

The Health Insurance Portability and Accountability Act is a federal law that extends far beyond what you would expect given the name. It involves a lot more than just health insurers, and it covers much more than simple portability and accountability. Overall, HIPAA...