FoxPointe Security Hub

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

This article was written by Rebecca Renna, Consulting Manager, Fox Pointe Solutions – a Division of The Bonadio Group The purpose of a Compliance Program in any industry is to ensure that an organization is following all applicable laws, regulations, and ethical practices. The laws and regulations governing compliance are...

The cyber-threat landscape has evolved dramatically over recent years, becoming more sophisticated and unpredictable. Organizations worldwide face an array of challenges—from advanced persistent threats and ransomware attacks to insider threats and vulnerabilities introduced by remote work. In this context, traditional security models that rely on perimeter defenses are no longer...

This article was written by Brendan Horton, Senior Consultant. In today’s dynamic and increasingly complex cyber landscape, organizations need a holistic, strategic approach that brings together people, processes, and technology. At FoxPointe Solutions, we understand that effective cybersecurity is about more than technical solutions; it’s about integrating expertise, structured processes,...

This article was written by Paul Mayer and Heather Brownson. The past two years have been very eventful for Compliance Professionals, starting with changes to the Office of Medicaid Inspector General’s (OMIG) Title 18 NYCRR Part 521 regulations. 18 NYCRR Part 521 was first made effective in 2009 and the...

Cyber liability insurance can be a critical weapon in your war against cyber criminals. We often get asked by our clients, “Do I really need cyber liability insurance?” It is often prefaced with the comment ‘I have general business insurance coverage and a really good IT team.’ The short answer...

This article was written by Emily Mosack, Analyst. Insider threats pose a significant risk to organizations, involving individuals with access to critical systems and data. These threats can come from malicious insiders intent to cause harm, careless employees who unknowingly compromise security, or those whose credentials have been stolen by...

This article was written by James Farr, Consulting Manager & Jack Hunter, Intern. Multi-Factor Authentication (MFA) is a comprehensive approach to authenticating users, relying on two or more credentials to verify an individual’s identity. Typically, these credentials are chosen to be: Something you know (i.e., a memorized password) Something you...

This article was written by Kate Gottermeier, Senior Consultant at The Bonadio Group. Introduction Fraud risk mitigation is crucial in business operations to safeguard assets, maintain financial integrity, and uphold the trust of stakeholders. The impact of fraud can be devastating, leading to significant financial losses, reputational damage, and legal...

Since 2004, October has been marked as National Cybersecurity Awareness Month. This month raises awareness about the importance of cybersecurity and how to protect yourself from cybercrime. Perform third-party due diligence on all critical vendors. Ensure that they have either a SOC2 report or a similar certification that covers the...

A SOC 3 report, also known as the Statement on Standards for Attestation Engagements (SSAE) 21, focuses on a service organization’s controls that are likely relevant to examining a user entity’s (customer’s) service commitments and system requirements. SOC 3 reports cover a service organization’s security, availability, processing integrity, confidentiality, and...