Blog

8 Tips for Cybersecurity in Healthcare

8 Tips for Cybersecurity in Healthcare

The healthcare sector is unique in its position regarding cybersecurity. In very few other industries is access to good data in a timely manner a life or death situation. This would lead you to think that cybersecurity must be top of mind for healthcare organizations,...

The Missing Pieces of Your MSP Practice

The Missing Pieces of Your MSP Practice

You have built a Managed Service Provider (MSP) practice and you provide IT support, cloud and back up services, and maybe even some testing and network monitoring for your customers. What are you missing? One piece that may be missing is "Detection".  Without...

SUBSCRIBE TO OUR Blog UPDATES

What is SASE?

What is SASE?

In information security there is a new term pronounced ‘sassy’ but written as SASE (Secure Service Access Edge).  Gartner depicts SASE as “transformational” which addresses traditional networking being concentrated into the cloud.  Many think this will become standard...

5 Cybersecurity Tips From Lawyers

5 Cybersecurity Tips From Lawyers

A question that often comes up around cybersecurity and incident response is when to involve legal.  The best time to get advice from your attorney is before an incident.  Here are 5 tips from legal resources of steps to take NOW: 1) Obtain verification from key...

Inefficient Incident Response Costing Billions

Inefficient Incident Response Costing Billions

Inefficient incident response to email attacks is costing billions in losses every year. Barracuda researchers found that, on average, a business takes three and a half hours (212 minutes) to remediate an attack. In fact, 11% of organizations spend more than six hours...

4 Cybersecurity Budget Focus Areas for Higher Education in 2020

4 Cybersecurity Budget Focus Areas for Higher Education in 2020

Chief information security officers are grappling with a variety of issues as they try to keep their campuses safe from cyber criminals. In fact, the No. 1 issue for higher ed IT leaders this year is information security, according to EDUCAUSE, a nonprofit association...

NIST CSF – Part 4 – Respond

NIST CSF – Part 4 – Respond

Recently a customer asked us to compare Privileged Access Management (PAM) and Password Manager (PM) products, thinking they were the same thing. Single Sign-On (SSO) is also often confused for these other two types of products. Let's look at each and their...

Cybersecurity Risks Are Threatening Deals

Cybersecurity Risks Are Threatening Deals

Today we continue down the National Institute of Standards and Technology Cyber Security Framework (NIST CSF).  In our earlier blog posts, we learned how to identify our assets and then we did our best to protect them. Then since nothing is 100% secure, we detected...

Why Do You Need Dark Web Monitoring?

Why Do You Need Dark Web Monitoring?

Recent acquisitions highlight the threat that cyber risks can pose to a company’s reputation and bottom line.  When Verizon was making a bid for Yahoo's internet business, the sale price was discounted $350,000 million after Yahoo's security breaches were discovered. ...

The Future MSP

The Future MSP

We've all heard the phrase "there is no silver bullet", especially when it comes to cyber protection.  There are so many different methods of attack and avenues of exposure, and they constantly evolve.  So how do you protect your customer's data and your organization...

Deception Technology – Fooling the Enemy

Deception Technology – Fooling the Enemy

Managed Service Providers (MSPs) are facing increasing challenges to support their customers as cybersecurity and compliance needs continue to grow.  Many look to build their own Security Operation Center (SOC), select and purchase a SIEM tool and staff the SOC to...

INTERESTED IN WHAT FORESITE CAN DO FOR YOU?

At Foresite, we like to consider each client’s needs individually, in order to determine the best approach to your unique requirements. So let’s talk! Contact Foresite to request a scoping call today.