Blog

What is Cyber Security as a Service (CSaaS)

What is Cyber Security as a Service (CSaaS)

When you think about information technology implementation and support, the optimal solution is often the combination of internal resource(s) who know the business, the culture and the current technologies and controls and an outside resource who specializes in the...

A Third Party Claims You Have Been Breached, What Do You Do?

A Third Party Claims You Have Been Breached, What Do You Do?

Organizations sometimes ignore breach notifications because of a loophole in virtually all privacy regulations – they do not address third-party notifications, so companies feel free to ignore them. Whether deliberate or a casualty of the notification overload...

Serverless Computing Security Considerations

Serverless Computing Security Considerations

One of the latest approaches to client server computing is going ‘serverless" - a move from ‘DevOps’ to ‘NoOps’. In serverless computing, the developers use code to simply create instances.  Serverless computing is a cloud computing execution model in which the cloud...

SUBSCRIBE TO OUR Blog UPDATES

States look to Feds for cybersecurity funding

States look to Feds for cybersecurity funding

The recent pandemic has left state and local governments with budget shortfalls as cyber threats continue to rise, leaving state asking the federal government for funding to help them protect their data. A coalition of Governors, Comptrollers, CIOs and Emergency...

Cyber insurers increase scrutiny of policyholders

Cyber insurers increase scrutiny of policyholders

COVID-19 has changed our world in many ways, and the Wall Street Journal reports that due to the heightened security risk from the increased remote workforce, commercial insurers are taking a closer look at their policyholders and new applicants for cyber coverage....

Demystifying SOC Opinions and Exceptions

Demystifying SOC Opinions and Exceptions

The difference in how well a SOC 2 organization measures up is in the details. CPA firms who audit for SOC 2 compliance use exceptions and opinions, so it's important to understand how these apply. Exceptions Audit exceptions are simply deviations from the expected...

Is your SOC ready for the future?

Is your SOC ready for the future?

A reported by Ponemon on The Economics of Security Operations Centers: What Is the True Cost for Effective Results" included a number of key findings to consider if you are looking at setting up a SOC, reviewing the value of your current SOC or considering outsourcing...

What does this story about celebrity data mean for you?

What does this story about celebrity data mean for you?

A ransomware attack has hit a prominent NYC law firm with a client list that includes top celebrities, musicians, sports stars and media companies.  The attackers are demanding an undisclosed ransom or they will begin leaking data in a phased approach, putting the...

Should You Rely On Your Cyber Insurer for Incident Response?

Should You Rely On Your Cyber Insurer for Incident Response?

If your business suffered a fire, who would you want to call first, your commercial insurer to file a claim or the fire department to come put out the flames?  When a cyber incident occurs, the same thinking should apply, but it is being complicated by organizations...

What is MITRE ATT&CK?

What is MITRE ATT&CK?

MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations of cyberattacks. They’re displayed in matrices that are arranged by attack stages, from initial system access to data theft or machine...

What grade would your school get in cybersecurity?

What grade would your school get in cybersecurity?

Cyberattacks that focus on schools are becoming more frequent. Why? Schools are considered an easy target as lack of funding for proactive cybersecurity means that the IT team is woefully outgunned and often already overwhelmed with providing the day-to-day support...

Classifying the severity of a cyber incident

Classifying the severity of a cyber incident

Ideally you would already have classified your data and be aligned with a cybersecurity or compliance framework to be able to effectively classify the severity level of various types of incidents.  This quick reference model can help with communication and next steps...

Should you do your own cybersecurity monitoring?

Should you do your own cybersecurity monitoring?

Should you do your own cybersecurity monitoring?  It's a fair question. You may already be paying for IT staff and many tools exist to collect logs. There are important considerations when you make this decision. Let's start with your staff.  If they are like most IT...

IT Vendor Risk Management Guide

IT Vendor Risk Management Guide

Let's take a look at the different issues that are classified as vendor risks. Of course, the risks for your business may differ from those listed here. At Foresite, we're happy to work with you to provide services that make sense for your company. If you have a need...

The rush to allow users to work from home due to the COVID-19 virus opens up an increased threat vector. As companies struggle to allow their employees to work from home creating social distancing, security may not be sufficiently considered. Before just turning on...

What Are HIPAA Log Requirements?

What Are HIPAA Log Requirements?

The Health Insurance Portability and Accountability Act is a federal law that extends far beyond what you would expect given the name. It involves a lot more than just health insurers, and it covers much more than simple portability and accountability. Overall, HIPAA...

One Cyber Incident – Three Possible Outcomes

One Cyber Incident – Three Possible Outcomes

Scenario #1: A dental practice manager arrives at the office and starts up her computer. Her screen flashes a notice that the system has been locked and demands a ransom of $4,900 to provide the key to access the data. She panics - patients will be arriving in less...

Managed Service Provider vs. Managed Security Services Provider

Managed Service Provider vs. Managed Security Services Provider

You care about the security of your business and the data of your customers, and you know how important it is to work with security operations providers you can trust. It can be hard to understand the difference between MSSPs and MSPs. As a busy professional, you know...

State Of Cybersecurity In 2020

State Of Cybersecurity In 2020

To keep your company safe from cyber criminals, it is important to become at least as knowledgeable as the perpetrators in the best practices of system security. Smarter is always better, but the latest security threats evolve so quickly that it becomes extremely...

8 Tips for Cybersecurity in Healthcare

8 Tips for Cybersecurity in Healthcare

The healthcare sector is unique in its position regarding cybersecurity. In very few other industries is access to good data in a timely manner a life or death situation. This would lead you to think that cybersecurity must be top of mind for healthcare organizations,...

The Missing Pieces of Your MSP Practice

The Missing Pieces of Your MSP Practice

You have built a Managed Service Provider (MSP) practice and you provide IT support, cloud and back up services, and maybe even some testing and network monitoring for your customers. What are you missing? One piece that may be missing is "Detection".  Without...

INTERESTED IN WHAT FORESITE CAN DO FOR YOU?

At Foresite, we like to consider each client’s needs individually, in order to determine the best approach to your unique requirements. So let’s talk! Contact Foresite to request a scoping call today.