Blog

What is Cyber Security as a Service (CSaaS)

What is Cyber Security as a Service (CSaaS)

When you think about information technology implementation and support, the optimal solution is often the combination of internal resource(s) who know the business, the culture and the current technologies and controls and an outside resource who specializes in the...

A Third Party Claims You Have Been Breached, What Do You Do?

A Third Party Claims You Have Been Breached, What Do You Do?

Organizations sometimes ignore breach notifications because of a loophole in virtually all privacy regulations – they do not address third-party notifications, so companies feel free to ignore them. Whether deliberate or a casualty of the notification overload...

SUBSCRIBE TO OUR Blog UPDATES

8 Tips for Cybersecurity in Healthcare

8 Tips for Cybersecurity in Healthcare

The healthcare sector is unique in its position regarding cybersecurity. In very few other industries is access to good data in a timely manner a life or death situation. This would lead you to think that cybersecurity must be top of mind for healthcare organizations,...

The Missing Pieces of Your MSP Practice

The Missing Pieces of Your MSP Practice

You have built a Managed Service Provider (MSP) practice and you provide IT support, cloud and back up services, and maybe even some testing and network monitoring for your customers. What are you missing? One piece that may be missing is "Detection".  Without...

What is SASE?

What is SASE?

In information security there is a new term pronounced ‘sassy’ but written as SASE (Secure Service Access Edge).  Gartner depicts SASE as “transformational” which addresses traditional networking being concentrated into the cloud.  Many think this will become standard...

5 Cybersecurity Tips From Lawyers

5 Cybersecurity Tips From Lawyers

A question that often comes up around cybersecurity and incident response is when to involve legal.  The best time to get advice from your attorney is before an incident.  Here are 5 tips from legal resources of steps to take NOW: 1) Obtain verification from key...

Inefficient Incident Response Costing Billions

Inefficient Incident Response Costing Billions

Inefficient incident response to email attacks is costing billions in losses every year. Barracuda researchers found that, on average, a business takes three and a half hours (212 minutes) to remediate an attack. In fact, 11% of organizations spend more than six hours...

4 Cybersecurity Budget Focus Areas for Higher Education in 2020

4 Cybersecurity Budget Focus Areas for Higher Education in 2020

Chief information security officers are grappling with a variety of issues as they try to keep their campuses safe from cyber criminals. In fact, the No. 1 issue for higher ed IT leaders this year is information security, according to EDUCAUSE, a nonprofit association...

NIST CSF – Part 4 – Respond

NIST CSF – Part 4 – Respond

Today we continue down the National Institute of Standards and Technology Cyber Security Framework (NIST CSF).  In our earlier blog posts, we learned how to identify our assets and then we did our best to protect them. Then since nothing is 100% secure, we detected...

Cybersecurity Risks Are Threatening Deals

Cybersecurity Risks Are Threatening Deals

Recent acquisitions highlight the threat that cyber risks can pose to a company’s reputation and bottom line.  When Verizon was making a bid for Yahoo's internet business, the sale price was discounted $350,000 million after Yahoo's security breaches were discovered. ...

Why Do You Need Dark Web Monitoring?

Why Do You Need Dark Web Monitoring?

Have you ever Googled your own name and been surprised by some of the information you found?  Comments on a blog post from years back, maybe an old email address from a past job, or an article about your involvement in a charity event.  Now imagine you were searching...

The Future MSP

The Future MSP

Managed Service Providers (MSPs) are facing increasing challenges to support their customers as cybersecurity and compliance needs continue to grow.  Many look to build their own Security Operation Center (SOC), select and purchase a SIEM tool and staff the SOC to...

Deception Technology – Fooling the Enemy

Deception Technology – Fooling the Enemy

As the allies prepared for the D-Day invasion they employed deception to trick the enemy into fortifying the wrong place. To give the appearance of a massive troop buildup in southeast England, the Allies created a largely phantom fighting force. In later discovery it...

INTERESTED IN WHAT FORESITE CAN DO FOR YOU?

At Foresite, we like to consider each client’s needs individually, in order to determine the best approach to your unique requirements. So let’s talk! Contact Foresite to request a scoping call today.