FoxPointe Security Hub

Subscribe to the blog

Receive articles and resources from the information risk management experts at FoxPointe.

The toll on life in the United States and the world left by COVID-19 has been great. The impact on our families, health, businesses, and the world economy will be felt by many for years to come. Hospitals of every type — private and public, urban and rural — are...

COVID-19 Contact Tracing You know you are living in a crazy time when there is a pandemic consuming the entire world and it mysteriously causes all the toilet paper to disappear off the shelves. But the true indication of craziness is when Apple and Google, notorious technology rivals, come together...

Cyber Criminals Take Advantage of COVID-19 As part of our everyday lives, both in and out of the workplace, having a heightened awareness for information security is getting more important by the day. As innovation in technology heavily influences how our government, business, and day to day lives operate, new...

In all of my years in information technology and information security, I was trained to reduce the risks of a computer virus. Never in my wildest imagination did I think I would have to deal with risks related to a different type of virus – a biological one. While it...

Patch Management This past December, the Office of the Comptroller of Currency (OCC) released the fall edition of its Semiannual Risk Perspective, a report that addresses key issues facing Financial Institutions, focusing on those that pose threats to the safety and soundness of banks and their compliance with applicable laws...

CrowdStrike Software CrowdStrike, an industry-leading next generation anti-virus software as a service solution provider, recently published a report of its observations from its incident response investigations that it conducted during 2019. The report is the product of numerous investigations, pulling in data from a variety of countries and sectors. In...

Investment Risk Management Investment risk management is ultimately about protecting and growing your assets over your time horizon. This involves addressing the aspects of your investment program that can be controlled and then minimizing your exposure to what cannot be controlled. Information Technology (IT) risk management is also about protecting...

Cybersecurity for Healthcare The healthcare industry is one of the biggest targets of cybersecurity attacks, both domestically and internationally. With the amount of private data that these organizations have, including protected health information (PHI), healthcare organizations should learn from previous attacks and/or mistakes and remain diligent to combat threats or...

Two weeks ago, the United States launched an air strike targeted at the Iranian Military and subsequently led to the assassination of the Iranian military leader Qassem Soleimani. In a response from Esmail Ghaani, Soleimani’s replacement as the head of the Iranian Army, promised harsh revenge against the United States....

Dridex Malware Last week, the Department of the Treasury Financial Sector Cyber Information Group (CIG) and the Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) released a joint alert focused on notifying financial institutions that an increasing number of cyberattacks utilizing the Dridex malware and several variants of that...