Blog

Should you do your own cybersecurity monitoring?

Should you do your own cybersecurity monitoring?

Should you do your own cybersecurity monitoring?  It's a fair question. You may already be paying for IT staff and many tools exist to collect logs. There are important considerations when you make this decision. Let's start with your staff.  If they are like most IT...

SUBSCRIBE TO OUR Blog UPDATES

IT Vendor Risk Management Guide

IT Vendor Risk Management Guide

Let's take a look at the different issues that are classified as vendor risks. Of course, the risks for your business may differ from those listed here. At Foresite, we're happy to work with you to provide services that make sense for your company. If you have a need...

The rush to allow users to work from home due to the COVID-19 virus opens up an increased threat vector. As companies struggle to allow their employees to work from home creating social distancing, security may not be sufficiently considered. Before just turning on...

What Are HIPAA Log Requirements?

What Are HIPAA Log Requirements?

A technology provider is meeting with a company that they provide IT support for, and the client brings up cybersecurity. "We're not concerned," says the company's President, "We're too small to be a target. It will never happen to us. A commercial insurance agent is...

One Cyber Incident – Three Possible Outcomes

One Cyber Incident – Three Possible Outcomes

Boardman Molded Products is an Ohio based manufacturing company who has filed a lawsuit against Involta, MSP (their Managed Services Provider) after a phishing scam. Based on reports, access was gained to one of Boardman's internal email accounts and used to send...

State Of Cybersecurity In 2020

State Of Cybersecurity In 2020

You care about the security of your business and the data of your customers, and you know how important it is to work with security operations providers you can trust. It can be hard to understand the difference between MSSPs and MSPs. As a busy professional, you know...

8 Tips for Cybersecurity in Healthcare

8 Tips for Cybersecurity in Healthcare

The proposed "Hack Back" bill is officially called the Active Cyber Defense Certainty Act (ACDC) to allow organizations who are victims of hackers to take aggressive action in defense. While this may sound like a positive step in the fight against cyber crime, there...

The Missing Pieces of Your MSP Practice

The Missing Pieces of Your MSP Practice

Acts by staff, whether malicious or not, account for well over half of all reported data breaches.  While many organizations already monitor email or network use, how do you really know what your employees are doing with your data?
What is SASE?

What is SASE?

A technology provider is meeting with a company that they provide IT support for, and the client brings up cybersecurity. "We're not concerned," says the company's President, "We're too small to be a target. It will never happen to us. A commercial insurance agent is...

5 Cybersecurity Tips From Lawyers

5 Cybersecurity Tips From Lawyers

The Health Insurance Portability and Accountability Act is a federal law that extends far beyond what you would expect given the name. It involves a lot more than just health insurers, and it covers much more than simple portability and accountability. Overall, HIPAA...

Inefficient Incident Response Costing Billions

Inefficient Incident Response Costing Billions

The rush to allow users to work from home due to the COVID-19 virus opens up an increased threat vector. As companies struggle to allow their employees to work from home creating social distancing, security may not be sufficiently considered. Before just turning on...

How Is FTC Data Security Enforcement Changing?

How Is FTC Data Security Enforcement Changing?

The "Stop Hacks and Improve Electronic Data Security" or SHIELD Act signed by New York Governor Andrew Cuomo is effective as of 3/21/20, and will apply to you if you own or license provate information on New York residents. What are the requirements?  Simply put, you...

4 Cybersecurity Budget Focus Areas for Higher Education in 2020

4 Cybersecurity Budget Focus Areas for Higher Education in 2020

To keep your company safe from cyber criminals, it is important to become at least as knowledgeable as the perpetrators in the best practices of system security. Smarter is always better, but the latest security threats evolve so quickly that it becomes extremely...

NIST CSF – Part 4 – Respond

NIST CSF – Part 4 – Respond

A question that often comes up around cybersecurity and incident response is when to involve legal.  The best time to get advice from your attorney is before an incident.  Here are 5 tips from legal resources of steps to take NOW: 1) Obtain verification from key...

Cybersecurity Risks Are Threatening Deals

Cybersecurity Risks Are Threatening Deals

Today we continue down the National Institute of Standards and Technology Cyber Security Framework (NIST CSF).  In our earlier blog posts, we learned how to identify our assets and then we did our best to protect them. Then since nothing is 100% secure, we detected...

Why Do You Need Dark Web Monitoring?

Why Do You Need Dark Web Monitoring?

Recent acquisitions highlight the threat that cyber risks can pose to a company’s reputation and bottom line.  When Verizon was making a bid for Yahoo's internet business, the sale price was discounted $350,000 million after Yahoo's security breaches were discovered. ...

INTERESTED IN WHAT FORESITE CAN DO FOR YOU?

At Foresite, we like to consider each client’s needs individually, in order to determine the best approach to your unique requirements. So let’s talk! Contact Foresite to request a scoping call today.