Blog

SUBSCRIBE TO OUR Blog UPDATES

The Future MSP

The Future MSP

Managed Service Providers (MSPs) are facing increasing challenges to support their customers as cybersecurity and compliance needs continue to grow.  Many look to build their own Security Operation Center (SOC), select and purchase a SIEM tool and staff the SOC to...

Deception Technology – Fooling the Enemy

Deception Technology – Fooling the Enemy

As the allies prepared for the D-Day invasion they employed deception to trick the enemy into fortifying the wrong place. To give the appearance of a massive troop buildup in southeast England, the Allies created a largely phantom fighting force. In later discovery it...

Poorly Written Ransomware Still Infects Unpatched Systems

Poorly Written Ransomware Still Infects Unpatched Systems

Many businesses focus so much on protecting their data from outside threats that they give little thought to inside threats - namely their own staff.  For a manufacturer in Chicago, that turned out to be a very costly mistake! The company hired an engineer in 2014 and...

Are your Application Programing Interfaces (API) Secured?

Are your Application Programing Interfaces (API) Secured?

As the allies prepared for the D-Day invasion they employed deception to trick the enemy into fortifying the wrong place. To give the appearance of a massive troop buildup in southeast England, the Allies created a largely phantom fighting force. In later discovery it...

Protection from Ransomware

Protection from Ransomware

We've all heard the phrase "there is no silver bullet", especially when it comes to cyber protection.  There are so many different methods of attack and avenues of exposure, and they constantly evolve.  So how do you protect your customer's data and your organization...

What do our clients say about working with Foresite?

What do our clients say about working with Foresite?

Ransomware attacks are spreading and ransom demands are growing.  22 cities across Texas were recently held hostage for millions after their networks were infiltrated and data was encrypted, and that's just the latest in a string of cities and businesses being...

Where are your data protection blindspots?

Where are your data protection blindspots?

The third or fourth step in any breach (depending on who you talk to) is that an attacker must ‘gain authority’. Think of it like a bank; if the criminal breaks into the vestibule they have little or nothing to steal, they have to get from the vestibule to the main...

3 Key things to make your MSSP relationship a success

3 Key things to make your MSSP relationship a success

One challenge that has been faced by many DevOps teams is the challenge of managing large enterprise environments in a secure and predictable manner. Imagine a situation where there are hundreds or thousands of servers and trying to make certain each one meets a...

Auditing and logging for HIPAA

Auditing and logging for HIPAA

The NIST Cyber Security Framework, or NIST CSF,  is the result of a February 2013 Executive Order titled “Improving Critical Infrastructure Cybersecurity” and 10 months of collaborative discussions with more than 3,000 security professionals. It comprises a risk-based...

INTERESTED IN WHAT FORESITE CAN DO FOR YOU?

At Foresite, we like to consider each client’s needs individually, in order to determine the best approach to your unique requirements. So let’s talk! Contact Foresite to request a scoping call today.