Reimagining the way software is bought, sold, managed and secured
Foresite helps organizations meet their information security and compliance objectives, providing flexible fully managed network security and infrastructure services.
Keep up with the rapid pace of technological change and ensure your customers security resources grow and adapt with the industry.
We hear a lot about the latest data breach, but we don’t always hear so much about the aftermath. Let’s look at some examples from 2017 to drive home the impact that a cyber incident can have on an organization. Uber was a classic study in what not to do in response to a breach. After learning that almost 60 million user and driver account had been exposed via ransomware, Uber execs decided to pay the ransom instead of reporting the breach. As a result, the CISO was immediately fired, and the CEO followed shortly thereafter. Several Senators submitted a…Read More
This week’s post was contributed by Loren Dealy Mahler, President at Dealy Maher Strategies. If 2017 taught us anything, it’s that the actions taken in the wake of a cyber incident impact a company as much, if not more, than the actual incident itself. Sound a little extreme? Ask any customer, shareholder or executive at Equifax, Uber or Yahoo. These aren’t examples of technical responses that just fell short. They are examples of companies who greatly increased the impact on their organization by fumbling their incident response. Whether by neglecting to notify customers in a timely fashion, providing incomplete or…Read More
The General Data Protection Regulation has many organizations concerned, and with good reason. Although the requirements don’t take effect until May 2018, they may be challenging to address. The first step is to gain a better understanding of them through our frequently asked questions. Where do we start to prepare for an audit? The first step is to determine what data you hold. Think about your HR files, client database(s), vendor records, etc. If you maintain any records that include information on citizens protected under GDPR, you need to document not only which systems, but also the data flow. Isn’t…Read More
These days you would be hard-pressed to find any organization who felt they had adequate staff and financial resources to stand up to the constant barrage of cyber threats. The education sector has been especially hard hit due to their reliance on public funding. A K-12 school system approached one of our Resellers with several concerns. With only a handful of IT staff, they couldn’t monitor their network for threats 24/7 and keep up with day-to-day support requests and implementation projects. They were also finding it challenging to stay on top of change requests on the district’s firewalls. Investing in…Read More