Home / Blog / Cybersecurity
Receive articles and resources from the information risk management experts at FoxPointe.
This article was written by Brendan Horton, Security Analyst. Cloud security encompasses the policies, technologies, and practices designed to protect cloud-based resources, including data, applications, and infrastructure, from a wide range of cyber threats. Cloud computing has become the technology of choice for organizations wanting scalability and flexibility to meet...
In today’s rapidly evolving digital landscape, the protection of sensitive information and the preservation of digital assets have become paramount, as has a full and accurate understanding of the controls in place. As organizations navigate the intricate realm of cybersecurity, the role of a Chief Information Security Officer (CISO) has...
Today’s organizations face numerous cybersecurity challenges, and one of the most insidious threats is social engineering. Cybersecurity is often associated with technical vulnerabilities and sophisticated defenses; however, social engineering leverages human reactions and psychology to gather information and perform attacks. This article aims to shed light on the key principles...
The FTC Safeguards Rule requires covered companies to develop, implement, and maintain an information security program with over 20 implemented, documented and risk assessed administrative, technical, and physical safeguards designed to protect customer information. Are your clients up on what the revised Rule requires? Are they ready to be compliant...
Building a cyber resilient workforce for is critical to a cyber security program for all companies. According to Verizon’s 2022 Data Breach Investigations Report “This year (2022) 82% of breaches involved the human element. Whether it is the Use of stolen credentials, Phishing, Misuse, or simply an Error, people continue...
Cybersecurity Challenges in an Interconnected World In the ever-changing ecosystems that organizations operate in, business needs can change as rapidly as the weather. It’s abundantly clear that organizations must be agile so they can adapt and react to the business storms on the horizon. Budgetary constraints and increased transaction velocity...
Brandon Agostinelli – September 12, 2022 Managing Medical Devices Cybersecurity Within the healthcare industry, there is a variety of environments that utilize many different types of medical devices to deliver services to patients. As reliance on technology within the healthcare industry continues to grow, an increase in information security risk...
Remaining Cyber Secure While Traveling On September 15, 2022, WebMD, a credible medical news source, issued a statement that the end of the COVID-19 pandemic is approaching. The WebMD news brief noted that the World Health Organization reported COVID-19 deaths dropping to their lowest count since March 2020. With the...
Cybersecurity Awareness Month Every October since 2004 marks National Cybersecurity Awareness Month. This month raises awareness about the importance of cybersecurity and how to protect yourself from cybercrime. Use multi-factor authentication wherever possible. Traditional authentication requires an ID and password, multi-factor requires an additional layer of protection such as entering...
This article was written by Brendan Horton, Security Analyst at The Bonadio Group Small or large, it is not uncommon to hear about a new sophisticated attack carried out on an organization. In the era of digital change, it is no surprise that threat actors have begun exploiting new...