Blog

Poorly Written Ransomware Still Infects Unpatched Systems

WannaCry malware hit the news in 2017 when reports of the damaging attack spread through more than 150 countries.  The National Health Service in the UK, and FedEx where two of the worst hit organizations, but countless others, including small business, schools, and...

Are your Application Programing Interfaces (API) Secured?

Today we delve into the world of Application Programing Interface or "API" security. These interfaces are typically used to share information between applications, such as a CRM like Salesforce and mobile applications that your sales team may want to use. These are...

Protection from Ransomware

Ransomware or other malicious software that destroys or prevents access to files is wreaking havoc on small business, local governments, education, and even larger enterprises.  The estimated damages from ransomware attacks are expected to exceed $11.5 billion this...

What do our clients say about working with Foresite?

Sometimes it's just best to let our clients do the talking - after all, no one understands the value of our services more than they do! This week's post focuses on a client who faced a number of challenges when we first met, including: Identifying and remediating...

Where are your data protection blindspots?

Data security and privacy were named as top issues for 2019. Data loss prevention requires a comprehensive strategy to identify, protect and monitor sensitive information.  As most organizations do not 100% know what data they have stored (often over many years and...

3 Key things to make your MSSP relationship a success

There is a lot of confusion around the term MSSP (Managed Services Security Provider). What are they? What do they do? What is their value? Can’t I just do that myself? The term MSSP had its genesis in the internet service providers (ISPs) in the 1990s the ISP...

Auditing and logging for HIPAA

Auditing and logging are an important part of the HIPAA Security Rule, but the rule contains no specifics on this requirement. According to HIPAA Security Rule - 164.312(b):“Implement hardware, software, and/or procedural mechanisms that record and examine activity in...

What is cyber threat hunting?

A buzz term of today’s cybersecurity is ‘threat hunting’. It gives you images of clandestine agents hiding in the shadows, ready to spring into action to neutralize a threat. Well that’s not exactly what cyber threat hunting is, but it’s also not necessarily what many...

3 Key Steps to Effective Patch Management

Patch Management is reviled, impossible and critical. It’s technically difficult if not impossible, it’s prone to issues that can lead to disruption, and it’s absolutely required from a security and compliance standpoint. Let’s look at why each of these statements is...

Record fines come on the heels of warnings about cyber risk

Record fines come on the heels of warnings from US Intelligence warning of a growing risk to our utility providers.  Similar warnings have been issued for law firms, higher education, and small businesses, so this information is relevant to a wide spectrum of...

Special Directive on Domain Name System (DNS) Compromise

Last week the USA’s Department of Homeland Security (DHS) sent out a directive for all agencies to upgrade their Domain Name System (DNS) security in light of a wave of Iranian hack attempts specifically targeted at compromising DNS. The compromise The Iranian...

New data breach notification legislation effective in 2019

State's are passing legislation to address the concerns of the public over protection of data and notifications and remedies when personal data is breached.  So far in 2019,  Vermont began regulating data brokers and South Carolina’s adoption of the National...

Growing Revenue with Foresite

We are very excited about 2019 as our Reseller Channel continues to grow. We know that in addition to wanting to solve cybersecurity and compliance problems for your clients, you also partnered (or are considering partnering) with Foresite to grow revenue.   Here...

Threat Intelligence – Real or Hype?

Threat intelligence, we keep hearing about it from security vendors, but what is it really? Is it hype or marketing speak that will be promoted by those without a real grasp of what it means, or is it the real deal? One problem in defining threat intelligence is that...

Giving Thanks

It seems appropriate for this week's blog to give thanks to our Resellers, Distributors and our Clients for all of your support in 2018.  Foresite continues to expand our staff and our offerings (including a new patch management service for 2019) and we could not do...

INTERESTED IN WHAT FORESITE CAN DO FOR YOU?

At Foresite, we like to consider each client’s needs individually, in order to determine the best approach to your unique requirements. So let’s talk! Contact Foresite to request a scoping call today.