FoxPointe Security Hub

Uncategorized

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

The cyber-threat landscape has evolved dramatically over recent years, becoming more sophisticated and unpredictable. Organizations worldwide face an array of challenges—from advanced persistent threats and ransomware attacks to insider threats and vulnerabilities introduced by remote work. In this context, traditional security models that rely on perimeter defenses are no longer...

This article was written by Kate Gottermeier, Senior Consultant at The Bonadio Group. Introduction Fraud risk mitigation is crucial in business operations to safeguard assets, maintain financial integrity, and uphold the trust of stakeholders. The impact of fraud can be devastating, leading to significant financial losses, reputational damage, and legal...

This article was written by Courtney Caryl & Allison Stowers.   A SOC 1 report, also known as the Statement on Standards for Attestation Engagements (SSAE) 21, focuses on a service organization’s controls that are likely to be relevant to an examination of a user entity’s (customer’s) financial statements. SOC...

Incident Management Efficiency This article was written by Heather Brownson. Recently, the NYS Office for People with Developmental Disabilities (OPWDD) has been placing a stronger focus on Incident Management, primarily surrounding timely completion of investigations of reportable incidents. The following is a high-level overview of OPWDD’s Part 624 Regulations. OPWDD...

This article was written by James Farr, Senior Security Consultant Privacy vs. Security Privacy and security often work hand in hand to support each other, but each has its own distinct role. Data privacy includes policies and procedures that define how information is gathered, stored, accessed, and destroyed. Security is...

Why Your Organization Needs a Gap Assessment Today and the Top Benefits of Partnering with a QSA This article was written by Ryan Bigelow, Director at FoxPointe Solutions. The Payment Card Industry Security Standards Council (PCI SSC) has released version 4 of the Data Security Standard (DSS). This is the...

This article was written by Brandon Agostinelli- Managing Security Consultant at FoxPointe Solutions, a division of The Bonadio Group With 2024 upon us, it is time for us to assess the current trends across the cybersecurity landscape, identify new risks and new solutions, and speculate about what next year may...

This article was written by Carl Cadregari, Executive Vice President, FoxPointe Solutions & Brandon Agostinelli, Managing Security Consultant at FoxPointe Solutions. Without a doubt, supporting the continually cyber-attacked infrastructures of our healthcare providers is on the minds of every person in leadership roles at every health system. Anything that can...

This article was written by Heather Brownson, Senior Consultant, Compliance Solutions Division of The Bonadio Group. Maintaining an effective compliance program should be a key component within any organization’s overarching strategy. In this article, we will be reviewing the importance of maintaining an effective compliance program and ways in which...

This article was written by James Farr, Senior Security Consultant. The sky is falling and Artificial Intelligence (AI) is the reason, or so it has been said. In reality, threats from phishing, malware, and data exfiltration have been around for years. The introduction of AI is just the next phase...