Blog

SUBSCRIBE TO OUR Blog UPDATES

Poorly Written Ransomware Still Infects Unpatched Systems

Poorly Written Ransomware Still Infects Unpatched Systems

Ah the rise of the cybersecurity industry. So many tools, so many ‘silver bullets’. Don’t get me wrong this is not necessarily a bad thing. There are gaps and problems and tools are built to solve these problems and address these gaps. The issue is when a security...

Are your Application Programing Interfaces (API) Secured?

Are your Application Programing Interfaces (API) Secured?

The third or fourth step in any breach (depending on who you talk to) is that an attacker must ‘gain authority’. Think of it like a bank; if the criminal breaks into the vestibule they have little or nothing to steal, they have to get from the vestibule to the main...

Protection from Ransomware

Protection from Ransomware

Today we delve into the world of Application Programing Interface or "API" security. These interfaces are typically used to share information between applications, such as a CRM like Salesforce and mobile applications that your sales team may want to use. These are...

What do our clients say about working with Foresite?

What do our clients say about working with Foresite?

WannaCry malware hit the news in 2017 when reports of the damaging attack spread through more than 150 countries.  The National Health Service in the UK, and FedEx where two of the worst hit organizations, but countless others, including small business, schools, and...

Where are your data protection blindspots?

Where are your data protection blindspots?

Sometimes it's just best to let our clients do the talking - after all, no one understands the value of our services more than they do! This week's post focuses on a client who faced a number of challenges when we first met, including: Identifying and remediating...

3 Key things to make your MSSP relationship a success

3 Key things to make your MSSP relationship a success

The NIST Cyber Security Framework (NIST CSF) is the result of a February 2013 Executive Order titled “Improving Critical Infrastructure Cybersecurity” and 10 months of collaborative discussions with more than 3,000 security professionals. It comprises a risk-based...

Auditing and logging for HIPAA

Auditing and logging for HIPAA

As the number of attack vectors increases, making it easier for cyber criminals to find ways around the controls it is more important than ever to have a proactive and layered approach to cybersecurity.  However, organizations of all sizes need to face an...

What is cyber threat hunting?

What is cyber threat hunting?

Today we delve into the world of Application Programing Interface or "API" security. These interfaces are typically used to share information between applications, such as a CRM like Salesforce and mobile applications that your sales team may want to use. These are...

Record fines come on the heels of warnings about cyber risk

Record fines come on the heels of warnings about cyber risk

Patch Management is reviled, impossible and critical. It’s technically difficult if not impossible, it’s prone to issues that can lead to disruption, and it’s absolutely required from a security and compliance standpoint. Let’s look at why each of these statements is...

Special Directive on Domain Name System (DNS) Compromise

Special Directive on Domain Name System (DNS) Compromise

Patch Management is reviled, impossible and critical. It’s technically difficult if not impossible, it’s prone to issues that can lead to disruption, and it’s absolutely required from a security and compliance standpoint. Let’s look at why each of these statements is...

New data breach notification legislation effective in 2019

New data breach notification legislation effective in 2019

Record fines come on the heels of warnings from US Intelligence warning of a growing risk to our utility providers.  Similar warnings have been issued for law firms, higher education, and small businesses, so this information is relevant to a wide spectrum of...

Growing Revenue with Foresite

Growing Revenue with Foresite

State's are passing legislation to address the concerns of the public over protection of data and notifications and remedies when personal data is breached.  So far in 2019,  Vermont began regulating data brokers and South Carolina’s adoption of the National...

INTERESTED IN WHAT FORESITE CAN DO FOR YOU?

At Foresite, we like to consider each client’s needs individually, in order to determine the best approach to your unique requirements. So let’s talk! Contact Foresite to request a scoping call today.