Receive articles and resources from the information risk management experts at FoxPointe.
This article was written by Emily Mosack, Analyst. Insider threats pose a significant risk to organizations, involving individuals with access to critical systems and data. These threats can come from malicious insiders intent to cause harm, careless employees who unknowingly compromise security, or those whose credentials have been stolen by...
This article was written by James Farr, Consulting Manager & Jack Hunter, Intern. Multi-Factor Authentication (MFA) is a comprehensive approach to authenticating users, relying on two or more credentials to verify an individual’s identity. Typically, these credentials are chosen to be: Something you know (i.e., a memorized password) Something you...
By Brendan Horton, Analyst In today’s business world, companies depend on third-party vendors for everything from IT support to supply chain logistics. While these partnerships offer many benefits and efficiencies, they also come with added risks. Effective Vendor Risk Management helps businesses continually identify and manage risks, protecting them from...
By Ryan Krawczyk, Senior Consultant Remote workers come with many benefits, such as improved work life balance and increased productivity. However, there are some security risks that are unique to employees working remotely. A better understanding of the potential risks can develop procedures to better protect your business. Personal Computers...
Recently, the Federal Deposit Insurance Corporation (FDIC), the Board of Governors of the Federal Reserve System (FRB), and the Office of the Comptroller of the Currency (OCC) issued the Third-Party Risk Management: A Guide for Community Banks (the guide). A community bank’s reliance on third parties does introduce operational, compliance,...
This article was written by Charlie Wood, FoxPointe Practice Leader Purchasing or selling a business is fraught with complexities, from financial statement due diligence, to ensuring that the right resources are in place before, during, and after the transaction. Legal and even environmental considerations also can be complex, time consuming,...
This article was written by Jeffery Travis, Director, FoxPointe Solutions. Whether they’re ensuring high quality care and patient safety, managing costs or complying with regulations, healthcare organizations have a lot to consider in order to run properly. One strategic tool that healthcare organizations can adopt to enhance efficiency is Artificial...
In today’s rapidly evolving digital landscape, the protection of sensitive information and the preservation of digital assets have become paramount, as has a full and accurate understanding of the controls in place. As organizations navigate the intricate realm of cybersecurity, the role of a Chief Information Security Officer (CISO) has...
Yesterday, the Board of Governors of the Federal Reserve System (Federal Reserve), the Federal Deposit Insurance Corporation (FDIC), and the Office of the Comptroller of the Currency (OCC, and together with the Federal Reserve and the FDIC, the Agencies), finalized previously proposed interagency guidance on how banking organizations should manage...