Blog

SUBSCRIBE TO OUR Blog UPDATES

3 Key things to make your MSSP relationship a success

There is a lot of confusion around the term MSSP (Managed Services Security Provider). What are they? What do they do? What is their value? Can’t I just do that myself? The term MSSP had its genesis in the internet service providers (ISPs) in the 1990s the ISP...

Auditing and logging for HIPAA

Auditing and logging are an important part of the HIPAA Security Rule, but the rule contains no specifics on this requirement. According to HIPAA Security Rule - 164.312(b):“Implement hardware, software, and/or procedural mechanisms that record and examine activity in...

What is cyber threat hunting?

A buzz term of today’s cybersecurity is ‘threat hunting’. It gives you images of clandestine agents hiding in the shadows, ready to spring into action to neutralize a threat. Well that’s not exactly what cyber threat hunting is, but it’s also not necessarily what many...

3 Key Steps to Effective Patch Management

Patch Management is reviled, impossible and critical. It’s technically difficult if not impossible, it’s prone to issues that can lead to disruption, and it’s absolutely required from a security and compliance standpoint. Let’s look at why each of these statements is...

Record fines come on the heels of warnings about cyber risk

Record fines come on the heels of warnings from US Intelligence warning of a growing risk to our utility providers.  Similar warnings have been issued for law firms, higher education, and small businesses, so this information is relevant to a wide spectrum of...

Special Directive on Domain Name System (DNS) Compromise

Last week the USA’s Department of Homeland Security (DHS) sent out a directive for all agencies to upgrade their Domain Name System (DNS) security in light of a wave of Iranian hack attempts specifically targeted at compromising DNS. The compromise The Iranian...

New data breach notification legislation effective in 2019

State's are passing legislation to address the concerns of the public over protection of data and notifications and remedies when personal data is breached.  So far in 2019,  Vermont began regulating data brokers and South Carolina’s adoption of the National...

Growing Revenue with Foresite

We are very excited about 2019 as our Reseller Channel continues to grow. We know that in addition to wanting to solve cybersecurity and compliance problems for your clients, you also partnered (or are considering partnering) with Foresite to grow revenue.   Here...

Threat Intelligence – Real or Hype?

Threat intelligence, we keep hearing about it from security vendors, but what is it really? Is it hype or marketing speak that will be promoted by those without a real grasp of what it means, or is it the real deal? One problem in defining threat intelligence is that...

Giving Thanks

It seems appropriate for this week's blog to give thanks to our Resellers, Distributors and our Clients for all of your support in 2018.  Foresite continues to expand our staff and our offerings (including a new patch management service for 2019) and we could not do...

SOC2 for Small Businesses

More and more we see small businesses being asked by their clients for some sort of assurance that the data shared with them is kept secure and private. Many times a SOC 2 certification is being requested.  If this happens to you (or your client), the question is...

Zero Trust Networks

What is a zero trust network? Traditionally networks were built for the purpose of communication and collaboration. Due to the increasing cyber threat and the ability of criminals to exploit this openness it has grown increasingly necessary that the networks be...

Higher education one of the worst sectors at handling cyber attacks

The higher education sector ranks highest among the worst business sectors for handling cyberthreats, with 73% of organizations taking three or more days to apply a patch.—EfficientIP Report released  9/10/2018 The higher ed sector is an attractive target for hackers...

INTERESTED IN WHAT FORESITE CAN DO FOR YOU?

At Foresite, we like to consider each client’s needs individually, in order to determine the best approach to your unique requirements. So let’s talk! Contact Foresite to request a scoping call today.